Public bug reported:

    SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.15.160 upstream stable release
       from git://git.kernel.org/

drm/amd/display: Fix division by zero in setup_dsc_config
pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
nfsd: don't allow nfsd threads to be signalled.
KEYS: trusted: Fix memory leak in tpm2_key_encode()
Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
net: bcmgenet: synchronize UMAC_CMD access
netlink: annotate lockless accesses to nlk->max_recvmsg_len
netlink: annotate data-races around sk->sk_err
KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
drm/amdgpu: Fix possible NULL dereference in 
amdgpu_ras_query_error_status_helper()
binder: fix max_thread type inconsistency
usb: typec: ucsi: displayport: Fix potential deadlock
serial: kgdboc: Fix NMI-safety problems from keyboard reset code
remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
KEYS: trusted: Do not use WARN when encode fails
admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
docs: kernel_include.py: Cope with docutils 0.21
Linux 5.15.160
UBUNTU: Upstream stable to v5.15.160

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid

** Affects: linux (Ubuntu Jammy)
     Importance: Medium
     Assignee: Manuel Diewald (diewald)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Jammy)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

** Changed in: linux (Ubuntu Jammy)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Jammy)
       Status: New => In Progress

** Changed in: linux (Ubuntu Jammy)
     Assignee: (unassigned) => Manuel Diewald (diewald)

** Description changed:

  
      SRU Justification
  
      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:
  
         v5.15.160 upstream stable release
         from git://git.kernel.org/
  
-             
+ drm/amd/display: Fix division by zero in setup_dsc_config
+ pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
+ nfsd: don't allow nfsd threads to be signalled.
+ KEYS: trusted: Fix memory leak in tpm2_key_encode()
+ Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
+ net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
+ net: bcmgenet: synchronize UMAC_CMD access
+ netlink: annotate lockless accesses to nlk->max_recvmsg_len
+ netlink: annotate data-races around sk->sk_err
+ KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
+ drm/amdgpu: Fix possible NULL dereference in 
amdgpu_ras_query_error_status_helper()
+ binder: fix max_thread type inconsistency
+ usb: typec: ucsi: displayport: Fix potential deadlock
+ serial: kgdboc: Fix NMI-safety problems from keyboard reset code
+ remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
+ KEYS: trusted: Do not use WARN when encode fails
+ admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
+ docs: kernel_include.py: Cope with docutils 0.21
  Linux 5.15.160
- docs: kernel_include.py: Cope with docutils 0.21
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
- KEYS: trusted: Do not use WARN when encode fails
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code
- usb: typec: ucsi: displayport: Fix potential deadlock
- binder: fix max_thread type inconsistency
- drm/amdgpu: Fix possible NULL dereference in 
amdgpu_ras_query_error_status_helper()
- KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
- netlink: annotate data-races around sk->sk_err
- netlink: annotate lockless accesses to nlk->max_recvmsg_len
- net: tls: handle backlogging of crypto requests
- tls: fix race between async notify and socket close
- net: tls: factor out tls_*crypt_async_wait()
- tls: extract context alloc/initialization out of tls_set_sw_offload
- tls: rx: simplify async wait
- net: bcmgenet: synchronize UMAC_CMD access
- net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
- Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
- KEYS: trusted: Fix memory leak in tpm2_key_encode()
- nfsd: don't allow nfsd threads to be signalled.
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
- drm/amd/display: Fix division by zero in setup_dsc_config
+ UBUNTU: Upstream stable to v5.15.160

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070292

Title:
  Jammy update: v5.15.160 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2070292/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to