Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.15.160 upstream stable release
from git://git.kernel.org/
drm/amd/display: Fix division by zero in setup_dsc_config
pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
nfsd: don't allow nfsd threads to be signalled.
KEYS: trusted: Fix memory leak in tpm2_key_encode()
Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
net: bcmgenet: synchronize UMAC_CMD access
netlink: annotate lockless accesses to nlk->max_recvmsg_len
netlink: annotate data-races around sk->sk_err
KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
drm/amdgpu: Fix possible NULL dereference in
amdgpu_ras_query_error_status_helper()
binder: fix max_thread type inconsistency
usb: typec: ucsi: displayport: Fix potential deadlock
serial: kgdboc: Fix NMI-safety problems from keyboard reset code
remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
KEYS: trusted: Do not use WARN when encode fails
admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
docs: kernel_include.py: Cope with docutils 0.21
Linux 5.15.160
UBUNTU: Upstream stable to v5.15.160
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Jammy)
Importance: Medium
Assignee: Manuel Diewald (diewald)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Jammy)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Jammy)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Jammy)
Status: New => In Progress
** Changed in: linux (Ubuntu Jammy)
Assignee: (unassigned) => Manuel Diewald (diewald)
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.15.160 upstream stable release
from git://git.kernel.org/
-
+ drm/amd/display: Fix division by zero in setup_dsc_config
+ pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
+ nfsd: don't allow nfsd threads to be signalled.
+ KEYS: trusted: Fix memory leak in tpm2_key_encode()
+ Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
+ net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
+ net: bcmgenet: synchronize UMAC_CMD access
+ netlink: annotate lockless accesses to nlk->max_recvmsg_len
+ netlink: annotate data-races around sk->sk_err
+ KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
+ drm/amdgpu: Fix possible NULL dereference in
amdgpu_ras_query_error_status_helper()
+ binder: fix max_thread type inconsistency
+ usb: typec: ucsi: displayport: Fix potential deadlock
+ serial: kgdboc: Fix NMI-safety problems from keyboard reset code
+ remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
+ KEYS: trusted: Do not use WARN when encode fails
+ admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
+ docs: kernel_include.py: Cope with docutils 0.21
Linux 5.15.160
- docs: kernel_include.py: Cope with docutils 0.21
- admin-guide/hw-vuln/core-scheduling: fix return type of PR_SCHED_CORE_GET
- KEYS: trusted: Do not use WARN when encode fails
- remoteproc: mediatek: Make sure IPI buffer fits in L2TCM
- serial: kgdboc: Fix NMI-safety problems from keyboard reset code
- usb: typec: ucsi: displayport: Fix potential deadlock
- binder: fix max_thread type inconsistency
- drm/amdgpu: Fix possible NULL dereference in
amdgpu_ras_query_error_status_helper()
- KVM: x86: Clear "has_error_code", not "error_code", for RM exception injection
- netlink: annotate data-races around sk->sk_err
- netlink: annotate lockless accesses to nlk->max_recvmsg_len
- net: tls: handle backlogging of crypto requests
- tls: fix race between async notify and socket close
- net: tls: factor out tls_*crypt_async_wait()
- tls: extract context alloc/initialization out of tls_set_sw_offload
- tls: rx: simplify async wait
- net: bcmgenet: synchronize UMAC_CMD access
- net: bcmgenet: synchronize EXT_RGMII_OOB_CTRL access
- Revert "selftests: mm: fix map_hugetlb failure on 64K page size systems"
- KEYS: trusted: Fix memory leak in tpm2_key_encode()
- nfsd: don't allow nfsd threads to be signalled.
- pinctrl: core: handle radix_tree_insert() errors in pinctrl_register_one_pin()
- drm/amd/display: Fix division by zero in setup_dsc_config
+ UBUNTU: Upstream stable to v5.15.160
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070292
Title:
Jammy update: v5.15.160 upstream stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2070292/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs