jammy/linux-gkeop: 5.15.0-1046.53 -proposed tracker

Bug #2063731 reported by Roxana Nicolescu
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
In Progress
Medium
Unassigned
Abi-testing
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Boot-testing
Fix Released
Medium
Unassigned
Certification-testing
Invalid
Medium
Unassigned
New-review
Fix Released
Medium
Timo Aaltonen
Prepare-package
Fix Released
Medium
Joseph Salisbury
Prepare-package-generate
Fix Released
Medium
Joseph Salisbury
Prepare-package-meta
Fix Released
Medium
Joseph Salisbury
Prepare-package-signed
Fix Released
Medium
Joseph Salisbury
Promote-signing-to-proposed
Invalid
Medium
Unassigned
Promote-to-proposed
Fix Released
Medium
Ubuntu Stable Release Updates Team
Promote-to-security
Confirmed
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Fix Released
Medium
Andy Whitcroft
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Rodrigo Figueiredo Zaiden
Sru-review
Fix Released
Medium
Andy Whitcroft
Verification-testing
Fix Released
Medium
Canonical Kernel Team
canonical-signing-jobs
Task00
Fix Released
Medium
Timo Aaltonen
linux-gkeop (Ubuntu)
Jammy
Fix Released
Medium
Unassigned

Bug Description

This bug will contain status and test results related to a kernel source (or snap) as stated in the title.

For an explanation of the tasks and the associated workflow see:
  https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
built:
  from: 7bffe7e9df0052f4
  route-entry: 1
comments:
  abi-testing: 1
delta:
  promote-to-proposed: [main, meta, signed, generate]
  promote-to-security: []
  promote-to-updates: [main, meta, signed]
flag:
  boot-testing-requested: true
  bugs-spammed: true
  proposed-announcement-sent: true
  proposed-testing-requested: true
  stream-from-cycle: true
issue: KSRU-12286
kernel-stable-master-bug: 2065898
packages:
  generate: linux-generate-gkeop
  main: linux-gkeop
  meta: linux-meta-gkeop
  signed: linux-signed-gkeop
phase: Ready for Promote to Security
phase-changed: Thursday, 06. June 2024 20:30 UTC
reason:
  promote-to-security: Pending -- ready to copy
synthetic:
  :promote-to-as-proposed: Fix Released
trackers:
  focal/linux-gkeop-5.15: bug 2063730
variant: debs
versions:
  main: 5.15.0-1046.53
  meta: 5.15.0.1046.45
  signed: 5.15.0-1046.53
~~:
  announce:
    swm-transition-crankable: 2024-05-09 13:26:14.466032
  clamps:
    new-review: 7bffe7e9df0052f4
    promote-to-proposed: 7bffe7e9df0052f4
    self: 5.15.0-1046.53
    sru-review: 7bffe7e9df0052f4
  tracker:
    last-message: '2024-06-06 17:51:03.102947+00:00'

tags: added: kernel-release-tracking-bug-live
description: updated
tags: added: kernel-sru-cycle-2024.04.29-1
description: updated
tags: added: kernel-sru-derivative-of-2063763
Changed in kernel-sru-workflow:
status: New → Confirmed
importance: Undecided → Medium
Changed in linux-gkeop (Ubuntu Jammy):
importance: Undecided → Medium
Changed in kernel-sru-workflow:
status: Confirmed → Triaged
description: updated
Changed in kernel-sru-workflow:
status: Triaged → In Progress
description: updated
tags: added: kernel-jira-issue-ksru-12286
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
summary: - jammy/linux-gkeop: <version to be filled> -proposed tracker
+ jammy/linux-gkeop: 5.15.0-1046.53 -proposed tracker
description: updated
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Ubuntu Kernel Ancillary Bot (ubuntu-kernel-ancillary-bot) wrote : ABI testing

amd64/gkeop canonical-certs.pem unchanged
amd64/gkeop canonical-revoked-certs.pem unchanged
amd64/gkeop fwinfo unchanged
amd64/gkeop modules differs
  @@ -4558,14 +4558,11 @@
   sch5627
   sch5636
   sch56xx-common
  -sch_atm (accepted)
   sch_cake
  -sch_cbq (accepted)
   sch_cbs
   sch_choke
   sch_codel
   sch_drr
  -sch_dsmark (accepted)
   sch_etf
   sch_ets
   sch_fq
amd64/gkeop retpoline unchanged

description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
description: updated
tags: added: regression-testing-passed
description: updated
description: updated
description: updated
tags: added: automated-testing-passed
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (46.9 KiB)

This bug was fixed in the package linux-gkeop - 5.15.0-1046.53

---------------
linux-gkeop (5.15.0-1046.53) jammy; urgency=medium

  * jammy/linux-gkeop: 5.15.0-1046.53 -proposed tracker (LP: #2063731)

  [ Ubuntu: 5.15.0-111.121 ]

  * jammy/linux: 5.15.0-111.121 -proposed tracker (LP: #2063763)
  * RTL8852BE fw security fail then lost WIFI function during suspend/resume
    cycle (LP: #2063096)
    - wifi: rtw89: download firmware with five times retry
  * Mount CIFS fails with Permission denied (LP: #2061986)
    - cifs: fix ntlmssp auth when there is no key exchange
  * USB stick can't be detected (LP: #2040948)
    - usb: Disable USB3 LPM at shutdown
  * Jammy update: v5.15.153 upstream stable release (LP: #2063290)
    - io_uring/unix: drop usage of io_uring socket
    - io_uring: drop any code related to SCM_RIGHTS
    - selftests: tls: use exact comparison in recv_partial
    - ASoC: rt5645: Make LattePanda board DMI match more precise
    - x86/xen: Add some null pointer checking to smp.c
    - MIPS: Clear Cause.BD in instruction_pointer_set
    - HID: multitouch: Add required quirk for Synaptics 0xcddc device
    - gen_compile_commands: fix invalid escape sequence warning
    - RDMA/mlx5: Fix fortify source warning while accessing Eth segment
    - RDMA/mlx5: Relax DEVX access upon modify commands
    - riscv: dts: sifive: add missing #interrupt-cells to pmic
    - x86/mm: Move is_vsyscall_vaddr() into asm/vsyscall.h
    - x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault()
    - net/iucv: fix the allocation size of iucv_path_table array
    - parisc/ftrace: add missing CONFIG_DYNAMIC_FTRACE check
    - block: sed-opal: handle empty atoms when parsing response
    - dm-verity, dm-crypt: align "struct bvec_iter" correctly
    - scsi: mpt3sas: Prevent sending diag_reset when the controller is ready
    - ALSA: hda/realtek - ALC285 reduce pop noise from Headphone port
    - drm/amdgpu: Enable gpu reset for S3 abort cases on Raven series
    - Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security
    - firewire: core: use long bus reset on gap count error
    - ASoC: Intel: bytcr_rt5640: Add an extra entry for the Chuwi Vi8 tablet
    - Input: gpio_keys_polled - suppress deferred probe error for gpio
    - ASoC: wm8962: Enable oscillator if selecting WM8962_FLL_OSC
    - ASoC: wm8962: Enable both SPKOUTR_ENA and SPKOUTL_ENA in mono mode
    - ASoC: wm8962: Fix up incorrect error message in wm8962_set_fll
    - do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak
    - s390/dasd: put block allocation in separate function
    - s390/dasd: add query PPRC function
    - s390/dasd: add copy pair setup
    - s390/dasd: add autoquiesce feature
    - s390/dasd: Use dev_*() for device log messages
    - s390/dasd: fix double module refcount decrement
    - fs/select: rework stack allocation hack for clang
    - md: Don't clear MD_CLOSING when the raid is about to stop
    - lib/cmdline: Fix an invalid format specifier in an assertion msg
    - time: test: Fix incorrect format specifier
    - rtc: test: Fix invalid format specifier.
    - aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts
    - time...

Changed in linux-gkeop (Ubuntu Jammy):
status: New → Fix Released
description: updated
description: updated
description: updated
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.