Activity log for bug #2017691

Date Who What changed Old value New value Message
2023-04-25 18:58:57 Luke Nowakowski-Krijger bug added bug
2023-04-25 18:58:59 Luke Nowakowski-Krijger linux (Ubuntu): status New Confirmed
2023-04-25 18:58:59 Luke Nowakowski-Krijger tags kernel-stable-tracking-bug
2023-04-25 18:59:00 Luke Nowakowski-Krijger bug added subscriber SRU Verification
2023-04-25 18:59:02 Luke Nowakowski-Krijger bug added subscriber Ubuntu Stable Release Updates Team
2023-04-25 18:59:05 Luke Nowakowski-Krijger nominated for series Ubuntu Focal
2023-04-25 18:59:06 Luke Nowakowski-Krijger bug task added linux (Ubuntu Focal)
2023-04-25 19:05:02 Luke Nowakowski-Krijger linux (Ubuntu): status Confirmed Invalid
2023-04-25 19:05:05 Luke Nowakowski-Krijger linux (Ubuntu Focal): assignee Luke Nowakowski-Krijger (lukenow)
2023-04-25 19:05:08 Luke Nowakowski-Krijger linux (Ubuntu Focal): status New In Progress
2023-04-25 19:05:28 Luke Nowakowski-Krijger summary Focal update: upstream stable patchset 2023-04-25 Focal update: v5.4.234 upstream stable release
2023-04-25 19:05:43 Luke Nowakowski-Krijger description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2023-04-25 from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.4.233 upstream stable release        from git://git.kernel.org/
2023-04-25 19:07:39 Luke Nowakowski-Krijger description SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.4.233 upstream stable release        from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.4.234 upstream stable release        from git://git.kernel.org/
2023-04-25 19:11:58 Luke Nowakowski-Krijger description SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.4.234 upstream stable release        from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.4.234 upstream stable release        from git://git.kernel.org/ arm64: dts: rockchip: drop unused LED mode property from rk3328-roc-cc ARM: dts: rockchip: add power-domains property to dp node on rk3288 ACPI: NFIT: fix a potential deadlock during NFIT teardown btrfs: send: limit number of clones and allocated memory size IB/hfi1: Assign npages earlier neigh: make sure used and confirmed times are valid HID: core: Fix deadloop in hid_apply_multiplier. bpf: bpf_fib_lookup should not return neigh in NUD_FAILED state net: Remove WARN_ON_ONCE(sk->sk_forward_alloc) from sk_stream_kill_queues(). vc_screen: don't clobber return value in vcs_read dmaengine: sh: rcar-dmac: Check for error num after dma_set_max_seg_size USB: serial: option: add support for VW/Skoda "Carstick LTE" USB: core: Don't hold device lock while reading the "descriptors" sysfs file Linux 5.4.234 UBUNTU: Upstream stable to v5.4.234
2023-04-25 19:12:13 Luke Nowakowski-Krijger linux (Ubuntu Focal): importance Undecided Medium
2023-05-03 08:05:08 Stefan Bader linux (Ubuntu Focal): status In Progress Fix Committed
2023-06-15 22:16:08 Launchpad Janitor linux (Ubuntu Focal): status Fix Committed Fix Released
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-0461
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-1380
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-1670
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-1859
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-2612
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-30456
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-31436
2023-06-15 22:16:08 Launchpad Janitor cve linked 2023-32233