Activity log for bug #2039610

Date Who What changed Old value New value Message
2023-10-17 21:29:37 Kamal Mostafa bug added bug
2023-10-17 21:29:38 Kamal Mostafa linux (Ubuntu): status New Confirmed
2023-10-17 21:29:39 Kamal Mostafa tags kernel-stable-tracking-bug
2023-10-17 21:29:39 Kamal Mostafa bug added subscriber SRU Verification
2023-10-17 21:29:42 Kamal Mostafa bug added subscriber Ubuntu Stable Release Updates Team
2023-10-17 21:29:45 Kamal Mostafa nominated for series Ubuntu Jammy
2023-10-17 21:29:46 Kamal Mostafa bug task added linux (Ubuntu Jammy)
2023-10-17 21:30:05 Kamal Mostafa linux (Ubuntu): status Confirmed Invalid
2023-10-17 21:30:08 Kamal Mostafa linux (Ubuntu Jammy): status New In Progress
2023-10-17 21:30:11 Kamal Mostafa linux (Ubuntu Jammy): importance Undecided Medium
2023-10-17 21:30:13 Kamal Mostafa linux (Ubuntu Jammy): assignee Kamal Mostafa (kamalmostafa)
2023-10-17 21:31:33 Kamal Mostafa description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.15.131 upstream stable release from git://git.kernel.org/ SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The following upstream        stable patches should be included in the Ubuntu kernel:        v5.15.131 upstream stable release        from git://git.kernel.org/ erofs: ensure that the post-EOF tails are all zeroed ksmbd: fix wrong DataOffset validation of create context ksmbd: replace one-element array with flex-array member in struct smb2_ea_info ARM: pxa: remove use of symbol_get() mmc: au1xmmc: force non-modular build and remove symbol_get usage net: enetc: use EXPORT_SYMBOL_GPL for enetc_phc_index rtc: ds1685: use EXPORT_SYMBOL_GPL for ds1685_rtc_poweroff modules: only allow symbol_get of EXPORT_SYMBOL_GPL modules USB: serial: option: add Quectel EM05G variant (0x030e) USB: serial: option: add FOXCONN T99W368/T99W373 product ALSA: usb-audio: Fix init call orders for UAC1 usb: dwc3: meson-g12a: do post init to fix broken usb after resumption usb: chipidea: imx: improve logic if samsung,picophy-* parameter is 0 HID: wacom: remove the battery when the EKR is off staging: rtl8712: fix race condition Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition wifi: mt76: mt7921: do not support one stream on secondary antenna only serial: qcom-geni: fix opp vote on shutdown serial: sc16is7xx: fix broken port 0 uart init serial: sc16is7xx: fix bug when first setting GPIO direction firmware: stratix10-svc: Fix an NULL vs IS_ERR() bug in probe fsi: master-ast-cf: Add MODULE_FIRMWARE macro tcpm: Avoid soft reset when partner does not support get_status nilfs2: fix general protection fault in nilfs_lookup_dirty_data_buffers() nilfs2: fix WARNING in mark_buffer_dirty due to discarded buffer reuse pinctrl: amd: Don't show `Invalid config param` errors usb: typec: tcpci: move tcpci.h to include/linux/usb/ usb: typec: tcpci: clear the fault status bit Linux 5.15.131 UBUNTU: Upstream stable to v5.15.131
2023-10-20 09:19:11 Stefan Bader linux (Ubuntu Jammy): status In Progress Fix Committed
2023-12-07 20:58:34 Launchpad Janitor linux (Ubuntu Jammy): status Fix Committed Fix Released
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-25775
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-31085
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-37453
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-39189
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-39192
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-39193
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-42754
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-45871
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-5158
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-5178
2023-12-07 20:58:34 Launchpad Janitor cve linked 2023-5717