This bug was fixed in the package linux-azure - 5.15.0-1092.101
---------------
linux-azure (5.15.0-1092.101) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1092.101 -proposed tracker (LP: #2114350)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
* Request to allow variable-sized MANA indirection table (LP: #2100902)
- net: mana: Allow variable size indirection table
* [Arm64] High reboot time for 96 core Linux VMs (LP: #2114218)
- arm64: mm: Don't remap pgtables per-cont(pte|pmd) block
- arm64: mm: Batch dsb and isb when populating pgtables
- arm64: mm: Don't remap pgtables for allocate vs populate
* CVE-2025-37750
- smb: client: fix UAF in decryption with multichannel
* CVE-2024-53185
- smb: client: fix NULL ptr deref in crypto_aead_setkey()
* CVE-2024-50047
- smb: client: fix UAF in async decryption
* Backport request of tools: hv: Enable debug logs for hv_kvp_daemon
(LP: #2112609)
- tools: hv: Enable debug logs for hv_kvp_daemon
* KVM-AMD Crash in GitHub Actions (LP: #2106673)
- SAUCE (no-up): KVM: SVM: Workaround overly strict CR3 check by Hyper-V
[ Ubuntu: 5.15.0-143.153 ]
* jammy/linux: 5.15.0-143.153 -proposed tracker (LP: #2114401)
* Packaging resync (LP: #1786013)
- [Packaging] update variants
- [Packaging] update annotations scripts
* CVE-2024-53051
- drm/i915/hdcp: Add encoder check in intel_hdcp_get_capability
* CVE-2024-46787
- userfaultfd: fix checks for huge PMDs
* CVE-2025-37890
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child
qdisc
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
* CVE-2025-37997
- netfilter: ipset: fix region locking in hash types
* CVE-2025-37798
- sch_htb: make htb_qlen_notify() idempotent
- sch_htb: make htb_deactivate() idempotent
- sch_drr: make drr_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
- sch_ets: make est_qlen_notify() idempotent
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
* CVE-2025-37750
- smb: client: fix UAF in decryption with multichannel
* CVE-2024-53185
- smb: client: fix NULL ptr deref in crypto_aead_setkey()
* CVE-2024-50047
- smb: client: fix UAF in async decryption
-- John Cabaj <[email protected]> Fri, 27 Jun 2025 17:50:24
-0500
** Changed in: linux-azure (Ubuntu Jammy)
Status: Fix Committed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-46787
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-50047
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53051
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-53185
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37750
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/2112609
Title:
Backport request of tools: hv: Enable debug logs for hv_kvp_daemon
Status in linux-azure package in Ubuntu:
Fix Released
Status in linux-azure source package in Jammy:
Fix Released
Status in linux-azure source package in Noble:
Fix Released
Status in linux-azure source package in Oracular:
Fix Released
Status in linux-azure source package in Plucky:
Fix Released
Status in linux-azure source package in Questing:
Fix Released
Bug description:
SRU Justification
[ Impact ]
* Microsoft request ability to increase logging for hv_kvp_daemon
[ Fix ]
* Clean cherry-pick of a9c0b33ef230: "tools: hv: Enable debug logs for
hv_kvp_daemon" upstream
[ Test Plan ]
* Compile tested
* Microsoft to test further
[ Where problems could occur ]
* Regression risk is light, particularly since this impacts source in
the tool/ directory of the source tree. Still, a regression could
cause issues with the hv_kvp_daemon tool.
[ Other info ]
* SF#00412136
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/2112609/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp