Series Detail
Show a series.
GET /api/series/502365/?format=api
{ "id": 502365, "url": "http://patchwork.ozlabs.org/api/series/502365/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=502365", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "name": "CVE-2026-31431", "date": "2026-04-30T19:28:04", "submitter": { "id": 89057, "url": "http://patchwork.ozlabs.org/api/people/89057/?format=api", "name": "Massimiliano Pellizzer", "email": "massimiliano.pellizzer@canonical.com" }, "version": 2, "total": 6, "received_total": 6, "received_all": true, "mbox": "http://patchwork.ozlabs.org/series/502365/mbox/", "cover_letter": { "id": 2231510, "url": "http://patchwork.ozlabs.org/api/covers/2231510/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/cover.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<cover.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:04", "name": "[SRU,Q,v2,0/6] CVE-2026-31431", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/cover.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, "patches": [ { "id": 2231513, "url": "http://patchwork.ozlabs.org/api/patches/2231513/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/323e6bcd1191cc21faadf9ac8323b94fdb803109.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<323e6bcd1191cc21faadf9ac8323b94fdb803109.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:05", "name": "[SRU,Q,v2,1/6] crypto: algif_aead - Revert to operating out-of-place", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/323e6bcd1191cc21faadf9ac8323b94fdb803109.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, { "id": 2231512, "url": "http://patchwork.ozlabs.org/api/patches/2231512/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/82d89f32da0a78886a4a4b34c4dfbde1009c2028.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<82d89f32da0a78886a4a4b34c4dfbde1009c2028.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:06", "name": "[SRU,Q,v2,2/6] crypto: algif_aead - snapshot IV for async AEAD requests", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/82d89f32da0a78886a4a4b34c4dfbde1009c2028.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, { "id": 2231516, "url": "http://patchwork.ozlabs.org/api/patches/2231516/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/03a7c4efef3fce974ec8106bc0cdd5995a99f45e.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<03a7c4efef3fce974ec8106bc0cdd5995a99f45e.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:07", "name": "[SRU,Q,v2,3/6] crypto: authencesn - Do not place hiseq at end of dst for out-of-place decryption", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/03a7c4efef3fce974ec8106bc0cdd5995a99f45e.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, { "id": 2231515, "url": "http://patchwork.ozlabs.org/api/patches/2231515/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/0be15c11c3c526bbf6caf035b4530a9126bee133.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<0be15c11c3c526bbf6caf035b4530a9126bee133.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:08", "name": "[SRU,Q,v2,4/6] crypto: authencesn - Fix src offset when decrypting in-place", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/0be15c11c3c526bbf6caf035b4530a9126bee133.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, { "id": 2231514, "url": "http://patchwork.ozlabs.org/api/patches/2231514/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/e34b2f5a09d7afdd4854c0d8a4d33a8b09886eee.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<e34b2f5a09d7afdd4854c0d8a4d33a8b09886eee.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:09", "name": "[SRU,Q,v2,5/6] crypto: af_alg - Fix page reassignment overflow in af_alg_pull_tsgl", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/e34b2f5a09d7afdd4854c0d8a4d33a8b09886eee.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" }, { "id": 2231517, "url": "http://patchwork.ozlabs.org/api/patches/2231517/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/24ce4338c53947b72e0c9566a11e07972be7bba8.1777576284.git.massimiliano.pellizzer@canonical.com/", "msgid": "<24ce4338c53947b72e0c9566a11e07972be7bba8.1777576284.git.massimiliano.pellizzer@canonical.com>", "list_archive_url": null, "date": "2026-04-30T19:28:10", "name": "[SRU,Q,v2,6/6] crypto: algif_aead - Fix minimum RX size check for decryption", "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/patch/24ce4338c53947b72e0c9566a11e07972be7bba8.1777576284.git.massimiliano.pellizzer@canonical.com/mbox/" } ] }