Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       upstream stable patchset 2019-11-27

                Ported from the following upstream stable releases:
                        v4.19.86, v5.3.13

       from git://git.kernel.org/

i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf()
Revert "OPP: Protect dev_list with opp_table lock"
net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
mm/memory_hotplug: fix updating the node span
arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
fbdev: Ditch fb_edid_add_monspecs
bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0
bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0
bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
bpf: btf: Fix a missing check bug
UBUNTU: upstream stable to v4.19.86, v5.3.13

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Confirmed

** Affects: linux (Ubuntu Disco)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Disco)
       Status: New => In Progress

** Changed in: linux (Ubuntu Disco)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        upstream stable patchset 2019-11-27
  
-        upstream stable patchset 2019-11-27
-        from git://git.kernel.org/
+                 Ported from the following upstream stable releases:
+                         v4.19.86, v5.3.13
+ 
+        from git://git.kernel.org/
+ 
+ i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf()
+ Revert "OPP: Protect dev_list with opp_table lock"
+ net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
+ mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
+ mm/memory_hotplug: fix updating the node span
+ arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
+ fbdev: Ditch fb_edid_add_monspecs
+ bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
+ bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0
+ bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0
+ bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
+ bpf: btf: Fix a missing check bug
+ UBUNTU: upstream stable to v4.19.86, v5.3.13

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854229

Title:
  Disco update: upstream stable patchset 2019-11-27

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Disco:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         upstream stable patchset 2019-11-27

                  Ported from the following upstream stable releases:
                          v4.19.86, v5.3.13

         from git://git.kernel.org/

  i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf()
  Revert "OPP: Protect dev_list with opp_table lock"
  net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
  mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
  mm/memory_hotplug: fix updating the node span
  arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
  fbdev: Ditch fb_edid_add_monspecs
  bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
  bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0
  bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0
  bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
  bpf: btf: Fix a missing check bug
  UBUNTU: upstream stable to v4.19.86, v5.3.13

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854229/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to