** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.72 upstream stable release + from git://git.kernel.org/ - v5.4.72 upstream stable release - from git://git.kernel.org/ + perf cs-etm: Move definition of 'traceid_list' global variable from header file + btrfs: don't pass system_chunk into can_overcommit + btrfs: take overcommit into account in inc_block_group_ro + ARM: 8939/1: kbuild: use correct nm executable + ACPI: Always build evged in + Bluetooth: Consolidate encryption handling in hci_encrypt_cfm + Bluetooth: Fix update of connection state in `hci_encrypt_cfm` + Bluetooth: Disconnect if E0 is used for Level 4 + media: usbtv: Fix refcounting mixup + USB: serial: option: add Cellient MPL200 card + USB: serial: option: Add Telit FT980-KS composition + staging: comedi: check validity of wMaxPacketSize of usb endpoints found + USB: serial: pl2303: add device-id for HP GC device + USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters + reiserfs: Initialize inode keys properly + reiserfs: Fix oops during mount + xen/events: don't use chip_data for legacy IRQs + crypto: bcm - Verify GCM/CCM key length in setkey + crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA + Linux 5.4.72 + UBUNTU: upstream stable to v5.4.72
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1902111 Title: Focal update: v5.4.72 upstream stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Focal: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.72 upstream stable release from git://git.kernel.org/ perf cs-etm: Move definition of 'traceid_list' global variable from header file btrfs: don't pass system_chunk into can_overcommit btrfs: take overcommit into account in inc_block_group_ro ARM: 8939/1: kbuild: use correct nm executable ACPI: Always build evged in Bluetooth: Consolidate encryption handling in hci_encrypt_cfm Bluetooth: Fix update of connection state in `hci_encrypt_cfm` Bluetooth: Disconnect if E0 is used for Level 4 media: usbtv: Fix refcounting mixup USB: serial: option: add Cellient MPL200 card USB: serial: option: Add Telit FT980-KS composition staging: comedi: check validity of wMaxPacketSize of usb endpoints found USB: serial: pl2303: add device-id for HP GC device USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters reiserfs: Initialize inode keys properly reiserfs: Fix oops during mount xen/events: don't use chip_data for legacy IRQs crypto: bcm - Verify GCM/CCM key length in setkey crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA Linux 5.4.72 UBUNTU: upstream stable to v5.4.72 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1902111/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp