[Kernel-packages] [Bug 1960452] Re: Impish update: upstream stable patchset 2022-02-09
This bug was fixed in the package linux - 5.13.0-37.42 --- linux (5.13.0-37.42) impish; urgency=medium * impish/linux: 5.13.0-37.42 -proposed tracker (LP: #1964959) * CVE-2022-0742 - ipv6: fix skb drops in igmp6_event_query() and igmp6_event_report() linux (5.13.0-36.41) impish; urgency=medium * Packaging resync (LP: #1786013) - [Packaging] resync getabis - debian/dkms-versions -- update from kernel-versions (main/2022.02.21) * Broken network on some AWS instances with focal/impish kernels (LP: #1961968) - SAUCE: Revert "PCI/MSI: Mask MSI-X vectors only on success" * [SRU]PCI: vmd: Do not disable MSI-X remapping if interrupt remapping is enabled by IOMMU (LP: #1937295) - PCI: vmd: Do not disable MSI-X remapping if interrupt remapping is enabled by IOMMU * [UBUNTU 20.04] kernel: Add support for CPU-MF counter second version 7 (LP: #1960182) - s390/cpumf: Support for CPU Measurement Facility CSVN 7 - s390/cpumf: Support for CPU Measurement Sampling Facility LS bit * [UBUNTU 21.10] s390/cio: verify the driver availability for path_event call (LP: #1960875) - s390/cio: verify the driver availability for path_event call * Impish update: upstream stable patchset 2022-02-14 (LP: #1960861) - devtmpfs regression fix: reconfigure on each mount - orangefs: Fix the size of a memory allocation in orangefs_bufmap_alloc() - remoteproc: qcom: pil_info: Don't memcpy_toio more than is provided - perf: Protect perf_guest_cbs with RCU - KVM: x86: Register Processor Trace interrupt hook iff PT enabled in guest - KVM: s390: Clarify SIGP orders versus STOP/RESTART - 9p: only copy valid iattrs in 9P2000.L setattr implementation - video: vga16fb: Only probe for EGA and VGA 16 color graphic cards - media: uvcvideo: fix division by zero at stream start - rtlwifi: rtl8192cu: Fix WARNING when calling local_irq_restore() with interrupts enabled - firmware: qemu_fw_cfg: fix sysfs information leak - firmware: qemu_fw_cfg: fix NULL-pointer deref on duplicate entries - firmware: qemu_fw_cfg: fix kobject leak in probe error path - KVM: x86: remove PMU FIXED_CTR3 from msrs_to_save_all - ALSA: hda/realtek: Add speaker fixup for some Yoga 15ITL5 devices - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Master after reboot from Windows - ALSA: hda: ALC287: Add Lenovo IdeaPad Slim 9i 14ITL5 speaker quirk - ALSA: hda/realtek: Add quirk for Legion Y9000X 2020 - ALSA: hda/realtek: Re-order quirk entries for Lenovo - powerpc/pseries: Get entry and uaccess flush required bits from H_GET_CPU_CHARACTERISTICS - mtd: fixup CFI on ixp4xx - KVM: x86: don't print when fail to read/write pv eoi memory - remoteproc: qcom: pas: Add missing power-domain "mxc" for CDSP - perf annotate: Avoid TUI crash when navigating in the annotation of recursive functions - ALSA: hda/realtek: Use ALC285_FIXUP_HP_GPIO_LED on another HP laptop - ALSA: hda/tegra: Fix Tegra194 HDA reset failure * CVE-2022-0516 - KVM: s390: Return error on SIDA memop on normal guest * CVE-2022-0435 - tipc: improve size validations for received domain records * CVE-2022-0492 - cgroup-v1: Require capabilities to set release_agent * jammy 5.15 kernel soft lockup when zfs.ko is loaded on s390x w/ gcc >= 11.2.0-10ubuntu1 / gcc-11 PLT regression on s390x (LP: #1954676) - s390/module: fix loading modules with a lot of relocations * Impish update: upstream stable patchset 2022-02-09 (LP: #1960452) - workqueue: Fix unbind_workers() VS wq_worker_running() race - Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() - Bluetooth: btusb: Add two more Bluetooth parts for WCN6855 - Bluetooth: btusb: Add support for Foxconn QCA 0xe0d0 - Bluetooth: bfusb: fix division by zero in send path - ARM: dts: exynos: Fix BCM4330 Bluetooth reset polarity in I9100 - USB: core: Fix bug in resuming hub's handling of wakeup requests - USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status - ath11k: Fix buffer overflow when scanning with extraie - mmc: sdhci-pci: Add PCI ID for Intel ADL - mfd: intel-lpss: Fix too early PM enablement in the ACPI ->probe() - can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data - can: isotp: convert struct tpcon::{idx,len} to unsigned int - can: gs_usb: gs_can_start_xmit(): zero-initialize hf->{flags,reserved} - random: fix data race on crng_node_pool - random: fix data race on crng init time - random: fix crash on multiple early calls to add_bootloader_randomness() - media: Revert "media: uvcvideo: Set unique vdev name based in type" - staging: wlan-ng: Avoid bitwise vs logical OR warning in hfa384x_usb_throttlefn() - drm/i915: Avoid bitwise vs logical OR warning in
[Kernel-packages] [Bug 1960452] Re: Impish update: upstream stable patchset 2022-02-09
Skipped (already applied): - bpf: Fix out of bounds access from invalid *_or_null type verification ** Changed in: linux (Ubuntu Impish) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1960452 Title: Impish update: upstream stable patchset 2022-02-09 Status in linux package in Ubuntu: Invalid Status in linux source package in Impish: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-02-09 Ported from the following upstream stable releases: v5.10.92, v5.15.15 from git://git.kernel.org/ workqueue: Fix unbind_workers() VS wq_worker_running() race bpf: Fix out of bounds access from invalid *_or_null type verification Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() Bluetooth: btusb: Add two more Bluetooth parts for WCN6855 Bluetooth: btusb: Add support for Foxconn QCA 0xe0d0 Bluetooth: bfusb: fix division by zero in send path ARM: dts: exynos: Fix BCM4330 Bluetooth reset polarity in I9100 USB: core: Fix bug in resuming hub's handling of wakeup requests USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status ath11k: Fix buffer overflow when scanning with extraie mmc: sdhci-pci: Add PCI ID for Intel ADL mfd: intel-lpss: Fix too early PM enablement in the ACPI ->probe() can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data can: isotp: convert struct tpcon::{idx,len} to unsigned int can: gs_usb: gs_can_start_xmit(): zero-initialize hf->{flags,reserved} random: fix data race on crng_node_pool random: fix data race on crng init time random: fix crash on multiple early calls to add_bootloader_randomness() media: Revert "media: uvcvideo: Set unique vdev name based in type" staging: wlan-ng: Avoid bitwise vs logical OR warning in hfa384x_usb_throttlefn() drm/i915: Avoid bitwise vs logical OR warning in snb_wm_latency_quirk() staging: greybus: fix stack size warning with UBSAN s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() Bluetooth: btusb: Add the new support ID for Realtek RTL8852A Bluetooth: btusb: Add support for IMC Networks Mediatek Chip(MT7921) Bbluetooth: btusb: Add another Bluetooth part for Realtek 8852AE Bluetooth: btusb: Enable MSFT extension for Mediatek Chip (MT7921) Bluetooth: btusb: enable Mediatek to support AOSP extension Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE Bluetooth: btusb: Add the new support IDs for WCN6855 fget: clarify and improve __fget_files() implementation Bluetooth: btusb: Add one more Bluetooth part for WCN6855 Bluetooth: add quirk disabling LE Read Transmit Power Bluetooth: btbcm: disable read tx power for some Macs with the T2 Security chip Bluetooth: btbcm: disable read tx power for MacBook Air 8,1 and 8,2 UBUNTU: upstream stable to v5.10.92, v5.15.15 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1960452/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1960452] Re: Impish update: upstream stable patchset 2022-02-09
** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-02-09 - Ported from the following upstream stable releases: - v5.10.92, v5.15.15 + Ported from the following upstream stable releases: + v5.10.92, v5.15.15 from git://git.kernel.org/ + + workqueue: Fix unbind_workers() VS wq_worker_running() race + bpf: Fix out of bounds access from invalid *_or_null type verification + Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() + Bluetooth: btusb: Add two more Bluetooth parts for WCN6855 + Bluetooth: btusb: Add support for Foxconn QCA 0xe0d0 + Bluetooth: bfusb: fix division by zero in send path + ARM: dts: exynos: Fix BCM4330 Bluetooth reset polarity in I9100 + USB: core: Fix bug in resuming hub's handling of wakeup requests + USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status + ath11k: Fix buffer overflow when scanning with extraie + mmc: sdhci-pci: Add PCI ID for Intel ADL + mfd: intel-lpss: Fix too early PM enablement in the ACPI ->probe() + can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data + can: isotp: convert struct tpcon::{idx,len} to unsigned int + can: gs_usb: gs_can_start_xmit(): zero-initialize hf->{flags,reserved} + random: fix data race on crng_node_pool + random: fix data race on crng init time + random: fix crash on multiple early calls to add_bootloader_randomness() + media: Revert "media: uvcvideo: Set unique vdev name based in type" + staging: wlan-ng: Avoid bitwise vs logical OR warning in hfa384x_usb_throttlefn() + drm/i915: Avoid bitwise vs logical OR warning in snb_wm_latency_quirk() + staging: greybus: fix stack size warning with UBSAN + s390/kexec: handle R_390_PLT32DBL rela in arch_kexec_apply_relocations_add() + Bluetooth: btusb: Add the new support ID for Realtek RTL8852A + Bluetooth: btusb: Add support for IMC Networks Mediatek Chip(MT7921) + Bbluetooth: btusb: Add another Bluetooth part for Realtek 8852AE + Bluetooth: btusb: Enable MSFT extension for Mediatek Chip (MT7921) + Bluetooth: btusb: enable Mediatek to support AOSP extension + Bluetooth: btusb: Add one more Bluetooth part for the Realtek RTL8852AE + Bluetooth: btusb: Add the new support IDs for WCN6855 + fget: clarify and improve __fget_files() implementation + Bluetooth: btusb: Add one more Bluetooth part for WCN6855 + Bluetooth: add quirk disabling LE Read Transmit Power + Bluetooth: btbcm: disable read tx power for some Macs with the T2 Security chip + Bluetooth: btbcm: disable read tx power for MacBook Air 8,1 and 8,2 + UBUNTU: upstream stable to v5.10.92, v5.15.15 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1960452 Title: Impish update: upstream stable patchset 2022-02-09 Status in linux package in Ubuntu: Invalid Status in linux source package in Impish: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-02-09 Ported from the following upstream stable releases: v5.10.92, v5.15.15 from git://git.kernel.org/ workqueue: Fix unbind_workers() VS wq_worker_running() race bpf: Fix out of bounds access from invalid *_or_null type verification Bluetooth: btusb: fix memory leak in btusb_mtk_submit_wmt_recv_urb() Bluetooth: btusb: Add two more Bluetooth parts for WCN6855 Bluetooth: btusb: Add support for Foxconn QCA 0xe0d0 Bluetooth: bfusb: fix division by zero in send path ARM: dts: exynos: Fix BCM4330 Bluetooth reset polarity in I9100 USB: core: Fix bug in resuming hub's handling of wakeup requests USB: Fix "slab-out-of-bounds Write" bug in usb_hcd_poll_rh_status ath11k: Fix buffer overflow when scanning with extraie mmc: sdhci-pci: Add PCI ID for Intel ADL mfd: intel-lpss: Fix too early PM enablement in the ACPI ->probe() can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB
[Kernel-packages] [Bug 1960452] Re: Impish update: upstream stable patchset 2022-02-09
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + upstream stable patchset 2022-02-09 -upstream stable patchset 2022-02-09 -from git://git.kernel.org/ + Ported from the following upstream stable releases: + v5.10.92, v5.15.15 + + from git://git.kernel.org/ -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1960452 Title: Impish update: upstream stable patchset 2022-02-09 Status in linux package in Ubuntu: Invalid Status in linux source package in Impish: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-02-09 Ported from the following upstream stable releases: v5.10.92, v5.15.15 from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1960452/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1960452] Re: Impish update: upstream stable patchset 2022-02-09
** Changed in: linux (Ubuntu Impish) Status: New => In Progress ** Changed in: linux (Ubuntu Impish) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Impish) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1960452 Title: Impish update: upstream stable patchset 2022-02-09 Status in linux package in Ubuntu: Invalid Status in linux source package in Impish: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2022-02-09 from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1960452/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp