Activity log for bug #2032688

Date Who What changed Old value New value Message
2023-08-22 18:52:14 Kamal Mostafa bug added bug
2023-08-22 18:52:15 Kamal Mostafa linux (Ubuntu): status New Confirmed
2023-08-22 18:52:16 Kamal Mostafa tags kernel-stable-tracking-bug
2023-08-22 18:52:17 Kamal Mostafa bug added subscriber SRU Verification
2023-08-22 18:52:18 Kamal Mostafa bug added subscriber Ubuntu Stable Release Updates Team
2023-08-22 18:52:21 Kamal Mostafa nominated for series Ubuntu Jammy
2023-08-22 18:52:22 Kamal Mostafa bug task added linux (Ubuntu Jammy)
2023-08-22 18:53:39 Kamal Mostafa linux (Ubuntu): status Confirmed Invalid
2023-08-22 18:53:44 Kamal Mostafa linux (Ubuntu Jammy): status New In Progress
2023-08-22 18:53:46 Kamal Mostafa linux (Ubuntu Jammy): importance Undecided Medium
2023-08-22 18:53:48 Kamal Mostafa linux (Ubuntu Jammy): assignee Kamal Mostafa (kamalmostafa)
2023-08-22 18:54:11 Kamal Mostafa description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.15.120 upstream stable release from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.15.120 upstream stable release        from git://git.kernel.org/ mptcp: fix possible divide by zero in recvmsg() mptcp: consolidate fallback and non fallback state machine mm, hwpoison: try to recover from copy-on write faults mm, hwpoison: when copy-on-write hits poison, take page offline drm/amdgpu: Set vmbo destroy after pt bo is created x86/microcode/AMD: Load late on both threads too x86/smp: Use dedicated cache-line for mwait_play_dead() can: isotp: isotp_sendmsg(): fix return error fix on TX path bpf: ensure main program has an extable HID: wacom: Use ktime_t rather than int when dealing with timestamps HID: logitech-hidpp: add HIDPP_QUIRK_DELAYED_INIT for the T651. Revert "thermal/drivers/mediatek: Use devm_of_iomap to avoid resource leak in mtk_thermal_probe" perf symbols: Symbol lookup with kcore can fail if multiple segments match stext scripts/tags.sh: Resolve gtags empty index generation drm/amdgpu: Validate VM ioctl flags. parisc: Delete redundant register definitions in <asm/assembly.h> nubus: Partially revert proc_create_single_data() conversion Linux 5.15.120 UBUNTU: Upstream stable to v5.15.120
2023-08-25 13:39:44 Stefan Bader linux (Ubuntu Jammy): status In Progress Fix Committed
2023-10-03 20:40:56 Launchpad Janitor linux (Ubuntu Jammy): status Fix Committed Fix Released
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-1206
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-20569
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-20588
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-3863
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-40283
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-4128
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-4155
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-4194
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-4273
2023-10-03 20:40:56 Launchpad Janitor cve linked 2023-4569