** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.72 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.72 upstream stable release
-        from git://git.kernel.org/
+ perf cs-etm: Move definition of 'traceid_list' global variable from header 
file
+ btrfs: don't pass system_chunk into can_overcommit
+ btrfs: take overcommit into account in inc_block_group_ro
+ ARM: 8939/1: kbuild: use correct nm executable
+ ACPI: Always build evged in
+ Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
+ Bluetooth: Fix update of connection state in `hci_encrypt_cfm`
+ Bluetooth: Disconnect if E0 is used for Level 4
+ media: usbtv: Fix refcounting mixup
+ USB: serial: option: add Cellient MPL200 card
+ USB: serial: option: Add Telit FT980-KS composition
+ staging: comedi: check validity of wMaxPacketSize of usb endpoints found
+ USB: serial: pl2303: add device-id for HP GC device
+ USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters
+ reiserfs: Initialize inode keys properly
+ reiserfs: Fix oops during mount
+ xen/events: don't use chip_data for legacy IRQs
+ crypto: bcm - Verify GCM/CCM key length in setkey
+ crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA
+ Linux 5.4.72
+ UBUNTU: upstream stable to v5.4.72

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1902111

Title:
  Focal update: v5.4.72 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Focal:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v5.4.72 upstream stable release
         from git://git.kernel.org/

  perf cs-etm: Move definition of 'traceid_list' global variable from header 
file
  btrfs: don't pass system_chunk into can_overcommit
  btrfs: take overcommit into account in inc_block_group_ro
  ARM: 8939/1: kbuild: use correct nm executable
  ACPI: Always build evged in
  Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
  Bluetooth: Fix update of connection state in `hci_encrypt_cfm`
  Bluetooth: Disconnect if E0 is used for Level 4
  media: usbtv: Fix refcounting mixup
  USB: serial: option: add Cellient MPL200 card
  USB: serial: option: Add Telit FT980-KS composition
  staging: comedi: check validity of wMaxPacketSize of usb endpoints found
  USB: serial: pl2303: add device-id for HP GC device
  USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters
  reiserfs: Initialize inode keys properly
  reiserfs: Fix oops during mount
  xen/events: don't use chip_data for legacy IRQs
  crypto: bcm - Verify GCM/CCM key length in setkey
  crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA
  Linux 5.4.72
  UBUNTU: upstream stable to v5.4.72

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1902111/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to