[Kernel-packages] [Bug 1957008] Re: Focal update: v5.4.166 upstream stable release
This bug was fixed in the package linux - 5.4.0-100.113 --- linux (5.4.0-100.113) focal; urgency=medium * focal/linux: 5.4.0-100.113 -proposed tracker (LP: #1959900) * CVE-2022-22942 - SAUCE: drm/vmwgfx: Fix stale file descriptors on failed usercopy * CVE-2022-0330 - drm/i915: Flush TLBs before releasing backing store * Focal update: v5.4.166 upstream stable release (LP: #1957008) - netfilter: selftest: conntrack_vrf.sh: fix file permission - Linux 5.4.166 - net/packet: rx_owner_map depends on pg_vec - USB: gadget: bRequestType is a bitfield, not a enum - HID: holtek: fix mouse probing - udp: using datalen to cap ipv6 udp max gso segments - selftests: Calculate udpgso segment count without header adjustment * Focal update: v5.4.165 upstream stable release (LP: #1957007) - serial: tegra: Change lower tolerance baud rate limit for tegra20 and tegra30 - ntfs: fix ntfs_test_inode and ntfs_init_locked_inode function type - HID: quirks: Add quirk for the Microsoft Surface 3 type-cover - HID: google: add eel USB id - HID: add hid_is_usb() function to make it simpler for USB detection - HID: add USB_HID dependancy to hid-prodikeys - HID: add USB_HID dependancy to hid-chicony - HID: add USB_HID dependancy on some USB HID drivers - HID: bigbenff: prevent null pointer dereference - HID: wacom: fix problems when device is not a valid USB device - HID: check for valid USB device for many HID drivers - can: kvaser_usb: get CAN clock frequency from device - can: kvaser_pciefd: kvaser_pciefd_rx_error_frame(): increase correct stats->{rx,tx}_errors counter - can: sja1000: fix use after free in ems_pcmcia_add_card() - nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done - selftests: netfilter: add a vrf+conntrack testcase - vrf: don't run conntrack on vrf with !dflt qdisc - bpf: Fix the off-by-two error in range markings - ice: ignore dropped packets during init - bonding: make tx_rebalance_counter an atomic - nfp: Fix memory leak in nfp_cpp_area_cache_add() - seg6: fix the iif in the IPv6 socket control block - udp: using datalen to cap max gso segments - iavf: restore MSI state on reset - iavf: Fix reporting when setting descriptor count - IB/hfi1: Correct guard on eager buffer deallocation - mm: bdi: initialize bdi_min_ratio when bdi is unregistered - ALSA: ctl: Fix copy of updated id with element read/write - ALSA: hda/realtek - Add headset Mic support for Lenovo ALC897 platform - ALSA: pcm: oss: Fix negative period/buffer sizes - ALSA: pcm: oss: Limit the period size to 16MB - ALSA: pcm: oss: Handle missing errors in snd_pcm_oss_change_params*() - btrfs: clear extent buffer uptodate when we fail to write it - btrfs: replace the BUG_ON in btrfs_del_root_ref with proper error handling - nfsd: Fix nsfd startup race (again) - tracefs: Have new files inherit the ownership of their parent - clk: qcom: regmap-mux: fix parent clock lookup - drm/syncobj: Deal with signalled fences in drm_syncobj_find_fence. - can: pch_can: pch_can_rx_normal: fix use after free - can: m_can: Disable and ignore ELO interrupt - x86/sme: Explicitly map new EFI memmap table as encrypted - libata: add horkage for ASMedia 1092 - wait: add wake_up_pollfree() - SAUCE: binder: export __wake_up_pollfree for binder module - binder: use wake_up_pollfree() - signalfd: use wake_up_pollfree() - aio: keep poll requests on waitqueue until completed - aio: fix use-after-free due to missing POLLFREE handling - tracefs: Set all files to the same group ownership as the mount option - block: fix ioprio_get(IOPRIO_WHO_PGRP) vs setuid(2) - qede: validate non LSO skb length - ASoC: qdsp6: q6routing: Fix return value from msm_routing_put_audio_mixer - i40e: Fix failed opcode appearing if handling messages from VF - i40e: Fix pre-set max number of queues for VF - mtd: rawnand: fsmc: Take instruction delay into account - mtd: rawnand: fsmc: Fix timing computation - dt-bindings: net: Reintroduce PHY no lane swap binding - tools build: Remove needless libpython-version feature check that breaks test-all fast path - net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero - net: altera: set a couple error code in probe() - net: fec: only clear interrupt of handling queue in fec_enet_rx_queue() - net, neigh: clear whole pneigh_entry at alloc time - net/qla3xxx: fix an error code in ql_adapter_up() - Revert "UBUNTU: SAUCE: selftests: fib_tests: assign address to dummy1 for rp_filter tests" - selftests/fib_tests: Rework fib_rp_filter_test() - USB: gadget: detect too-big endpoint 0 requests - USB: gadget: zero allocate endpoint 0 buffers - usb: core: config: fix validation of wMaxPacketValue entries - xhci:
[Kernel-packages] [Bug 1957008] Re: Focal update: v5.4.166 upstream stable release
Additional patches pulled into this update: 6dedcff6738b net/packet: rx_owner_map depends on pg_vec 4ce2761acc86 USB: gadget: bRequestType is a bitfield, not a enum b20f9579cfb1 HID: holtek: fix mouse probing 712c922bd079 udp: using datalen to cap ipv6 udp max gso segments bd7bd9edb090 selftests: Calculate udpgso segment count without header adjustment ** Changed in: linux (Ubuntu Focal) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1957008 Title: Focal update: v5.4.166 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Focal: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.166 upstream stable release from git://git.kernel.org/ netfilter: selftest: conntrack_vrf.sh: fix file permission Linux 5.4.166 UBUNTU: upstream stable to v5.4.166 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1957008/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp