Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.4.46 upstream stable release
       from git://git.kernel.org/

devinet: fix memleak in inetdev_init()
l2tp: add sk_family checks to l2tp_validate_socket
l2tp: do not use inet_hash()/inet_unhash()
net/mlx5: Fix crash upon suspend/resume
net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a
net: usb: qmi_wwan: add Telit LE910C1-EUX composition
NFC: st21nfca: add missed kfree_skb() in an error path
nfp: flower: fix used time of merge flow statistics
vsock: fix timeout in vsock_accept()
net: check untrusted gso_size at kernel entry
net: be more gentle about silly gso requests coming from user
USB: serial: qcserial: add DW5816e QDL support
USB: serial: usb_wwan: do not resubmit rx urb on fatal errors
USB: serial: option: add Telit LE910C1-EUX compositions
USB: serial: ch341: add basis for quirk detection
iio:chemical:sps30: Fix timestamp alignment
iio: vcnl4000: Fix i2c swapped word reading.
iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.
iio: adc: stm32-adc: fix a wrong error message when probing interrupts
usb: musb: start session in resume for host port
usb: musb: Fix runtime PM imbalance on error
vt: keyboard: avoid signed integer overflow in k_ascii
tty: hvc_console, fix crashes on parallel open/close
staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK
CDC-ACM: heed quirk also in error handling
nvmem: qfprom: remove incorrect write support
uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned
Revert "net/mlx5: Annotate mutex destroy for root ns"
Linux 5.4.46
UBUNTU: upstream stable to v5.4.46

-----

Note:  The following commits from v5.4.46 had already been applied as
UBUNTU SAUCE patches:

590459086bc9 x86/speculation: Add Ivy Bridge to affected list
faf187abda94 x86/speculation: Add SRBDS vulnerability and mitigation 
documentation
b0f61a0503ad x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) 
mitigation
dab0161b8a0b x86/cpu: Add 'table' argument to cpu_matches()
749ec6b48a9a x86/cpu: Add a steppings field to struct x86_cpu_id
e4e57f7bca44 x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Confirmed

** Affects: linux (Ubuntu Focal)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Focal)
       Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.46 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.46 upstream stable release
-        from git://git.kernel.org/
+ devinet: fix memleak in inetdev_init()
+ l2tp: add sk_family checks to l2tp_validate_socket
+ l2tp: do not use inet_hash()/inet_unhash()
+ net/mlx5: Fix crash upon suspend/resume
+ net: stmmac: enable timestamp snapshot for required PTP packets in dwmac 
v5.10a
+ net: usb: qmi_wwan: add Telit LE910C1-EUX composition
+ NFC: st21nfca: add missed kfree_skb() in an error path
+ nfp: flower: fix used time of merge flow statistics
+ vsock: fix timeout in vsock_accept()
+ net: check untrusted gso_size at kernel entry
+ net: be more gentle about silly gso requests coming from user
+ USB: serial: qcserial: add DW5816e QDL support
+ USB: serial: usb_wwan: do not resubmit rx urb on fatal errors
+ USB: serial: option: add Telit LE910C1-EUX compositions
+ USB: serial: ch341: add basis for quirk detection
+ iio:chemical:sps30: Fix timestamp alignment
+ iio: vcnl4000: Fix i2c swapped word reading.
+ iio:chemical:pms7003: Fix timestamp alignment and prevent data leak.
+ iio: adc: stm32-adc: fix a wrong error message when probing interrupts
+ usb: musb: start session in resume for host port
+ usb: musb: Fix runtime PM imbalance on error
+ vt: keyboard: avoid signed integer overflow in k_ascii
+ tty: hvc_console, fix crashes on parallel open/close
+ staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK
+ CDC-ACM: heed quirk also in error handling
+ nvmem: qfprom: remove incorrect write support
+ uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned
+ Revert "net/mlx5: Annotate mutex destroy for root ns"
+ Linux 5.4.46
+ UBUNTU: upstream stable to v5.4.46
+ 
+ -----
+ 
+ Note:  The following commits from v5.4.46 had already been applied as
+ UBUNTU SAUCE patches:
+ 
+ 590459086bc9 x86/speculation: Add Ivy Bridge to affected list
+ faf187abda94 x86/speculation: Add SRBDS vulnerability and mitigation 
documentation
+ b0f61a0503ad x86/speculation: Add Special Register Buffer Data Sampling 
(SRBDS) mitigation
+ dab0161b8a0b x86/cpu: Add 'table' argument to cpu_matches()
+ 749ec6b48a9a x86/cpu: Add a steppings field to struct x86_cpu_id
+ e4e57f7bca44 x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883184

Title:
  Focal update: v5.4.46 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883184/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to