Hi David,
All derivative kernels, e.g. -aws, -aws-fips, -azure, -gcp, the list goes on,
are based on -generic, and match -generic for that particular SRU cycle.
The next -aws-fips kernel is 5.15.0-1091-aws-fips, and it is based off of
5.15.0-153-generic. It has the patch.
The kernel is currently in fips-proposed2, since it is a Security SRU cycle
kernel, but it will be released at the same time as -generic. Here's its
changelog.
linux-aws-fips (5.15.0-1091.98+fips1) jammy; urgency=medium
* jammy/linux-aws-fips: 5.15.0-1091.98+fips1 -proposed tracker (LP:
#2119820)
[ Ubuntu-aws: 5.15.0-1091.98 ]
* jammy/linux-aws: 5.15.0-1091.98 -proposed tracker (LP: #2119822)
[ Ubuntu: 5.15.0-153.163 ]
* jammy/linux: 5.15.0-153.163 -proposed tracker (LP: #2119877)
* CVE-2024-57996 // CVE-2025-37752
- net_sched: sch_sfq: annotate data-races around q->perturb_period
- net_sched: sch_sfq: handle bigger packets
- net_sched: sch_sfq: don't allow 1 packet limit
- net_sched: sch_sfq: use a temporary work area for validating
configuration
- net_sched: sch_sfq: move the limit validation
* CVE-2025-38350
- net/sched: Always pass notifications when child class becomes empty
* CVE-2024-27407
- fs/ntfs3: Fixed overflow check in mi_enum_attr()
* watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134] with
5.15.0-144-generic (LP: #2118407)
- fs/proc: do_task_stat: use __for_each_thread()
-- Magali Lemes <[email protected]> Thu, 14 Aug 2025 17:35:48 -0300
So don't worry, you don't have to open a new ticket or anything, it will get
fixed at the same time.
Thanks,
Matthew
** CVE added: https://cve.org/CVERecord?id=CVE-2024-27407
** CVE added: https://cve.org/CVERecord?id=CVE-2024-57996
** CVE added: https://cve.org/CVERecord?id=CVE-2025-37752
** CVE added: https://cve.org/CVERecord?id=CVE-2025-38350
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2118407
Title:
watchdog: BUG: soft lockup - CPU#6 stuck for 5718s! [wdavdaemon:1134]
with 5.15.0-144-generic
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2118407/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs