[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15

2022-01-19 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912027

Title:
  Groovy update: upstream stable patchset 2021-01-15

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912027/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15

2021-03-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-riscv - 5.11.0-1004.4

---
linux-riscv (5.11.0-1004.4) hirsute; urgency=medium

  [ Ubuntu: 5.11.0-13.14 ]

  * CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
  * CVE-2020-27171
- bpf: Fix off-by-one for area size in creating mask to left

 -- Andrea Righi   Fri, 19 Mar 2021 18:21:28
+0100

** Changed in: linux-riscv (Ubuntu)
   Status: New => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912027

Title:
  Groovy update: upstream stable patchset 2021-01-15

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912027/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15

2021-02-02 Thread Kelsey Skunberg
** Also affects: linux-riscv (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: linux-riscv (Ubuntu Groovy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912027

Title:
  Groovy update: upstream stable patchset 2021-01-15

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912027/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15

2021-01-21 Thread Kelsey Skunberg
** Changed in: linux (Ubuntu Groovy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912027

Title:
  Groovy update: upstream stable patchset 2021-01-15

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912027/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15

2021-01-15 Thread Kamal Mostafa
** Changed in: linux (Ubuntu Groovy)
   Status: New => In Progress

** Changed in: linux (Ubuntu Groovy)
 Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    upstream stable patchset 2021-01-15
  
-upstream stable patchset 2021-01-15
-from git://git.kernel.org/
+ Ported from the following upstream stable releases:
+  v5.10.3,
+ v5.4.86, v5.10.4
+ 
+    from git://git.kernel.org/
+ 
+ net: ipconfig: Avoid spurious blank lines in boot log
+ x86/split-lock: Avoid returning with interrupts enabled
+ exfat: Avoid allocating upcase table using kcalloc()
+ soc/tegra: fuse: Fix index bug in get_process_id
+ usb: mtu3: fix memory corruption in mtu3_debugfs_regset()
+ USB: serial: option: add interface-number sanity check to flag handling
+ USB: gadget: f_acm: add support for SuperSpeed Plus
+ USB: gadget: f_midi: setup SuperSpeed Plus descriptors
+ usb: gadget: f_fs: Re-use SS descriptors for SuperSpeedPlus
+ USB: gadget: f_rndis: fix bitrate for SuperSpeed and above
+ usb: chipidea: ci_hdrc_imx: Pass DISABLE_DEVICE_STREAMING flag to imx6ul
+ ARM: dts: exynos: fix roles of USB 3.0 ports on Odroid XU
+ ARM: dts: exynos: fix USB 3.0 VBUS control and over-current pins on Exynos5410
+ ARM: dts: exynos: fix USB 3.0 pins supply being turned off on Odroid XU
+ coresight: tmc-etf: Fix NULL ptr dereference in tmc_enable_etf_sink_perf()
+ coresight: tmc-etr: Check if page is valid before dma_map_page()
+ coresight: tmc-etr: Fix barrier packet insertion for perf buffer
+ coresight: etb10: Fix possible NULL ptr dereference in etb_enable_perf()
+ f2fs: fix to seek incorrect data offset in inline data file
+ scsi: megaraid_sas: Check user-provided offsets
+ HID: i2c-hid: add Vero K147 to descriptor override
+ serial_core: Check for port state when tty is in error state
+ fscrypt: remove kernel-internal constants from UAPI header
+ fscrypt: rename DCACHE_ENCRYPTED_NAME to DCACHE_NOKEY_NAME
+ fscrypt: add fscrypt_is_nokey_name()
+ ubifs: prevent creating duplicate encrypted filenames
+ ext4: prevent creating duplicate encrypted filenames
+ f2fs: prevent creating duplicate encrypted filenames
+ Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
+ quota: Sanity-check quota file headers on load
+ fs: quota: fix array-index-out-of-bounds bug by passing correct argument to 
vfs_cleanup_quota_inode()
+ media: msi2500: assign SPI bus number dynamically
+ crypto: af_alg - avoid undefined behavior accessing salg_name
+ nl80211: validate key indexes for cfg80211_registered_device
+ md: fix a warning caused by a race between concurrent md_ioctl()s
+ UBUNTU: upstream stable to v5.10.3
+ drm/gma500: fix double free of gma_connector
+ drm/aspeed: Fix Kconfig warning & subsequent build errors
+ drm/mcde: Fix handling of platform_get_irq() error
+ drm/tve200: Fix handling of platform_get_irq() error
+ arm64: dts: renesas: hihope-rzg2-ex: Drop rxc-skew-ps from ethernet-phy node
+ arm64: dts: renesas: cat875: Remove rxc-skew-ps from ethernet-phy node
+ soc: renesas: rmobile-sysc: Fix some leaks in rmobile_init_pm_domains()
+ soc: mediatek: Check if power domains can be powered on at boot time
+ arm64: dts: mediatek: mt8183: fix gce incorrect mbox-cells value
+ arm64: dts: ipq6018: update the reserved-memory node
+ soc: qcom: geni: More properly switch to DMA mode
+ Revert "i2c: i2c-qcom-geni: Fix DMA transfer race"
+ RDMA/bnxt_re: Set queue pair state when being queried
+ rtc: pcf2127: fix pcf2127_nvmem_read/write() returns
+ selinux: fix error initialization in inode_doinit_with_dentry()
+ ARM: dts: aspeed-g6: Fix the GPIO memory size
+ ARM: dts: aspeed: s2600wf: Fix VGA memory region location
+ RDMA/core: Fix error return in _ib_modify_qp()
+ RDMA/rxe: Compute PSN windows correctly
+ x86/mm/ident_map: Check for errors from ident_pud_init()
+ ARM: p2v: fix handling of LPAE translation in BE mode
+ RDMA/rtrs-clt: Remove destroy_con_cq_qp in case route resolving failed
+