** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.13.14 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.13.14 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.13.14 stable release shall be
- applied:
+        The following patches from the 4.13.14 stable release shall be applied:
+ * ppp: fix race in ppp device destruction
+ * gso: fix payload length when gso_size is zero
+ * ipv4: Fix traffic triggered IPsec connections.
+ * ipv6: Fix traffic triggered IPsec connections.
+ * netlink: do not set cb_running if dump's start() errs
+ * net: call cgroup_sk_alloc() earlier in sk_clone_lock()
+ * macsec: fix memory leaks when skb_to_sgvec fails
+ * l2tp: check ps->sock before running pppol2tp_session_ioctl()
+ * tun: call dev_get_valid_name() before register_netdevice()
+ * netlink: fix netlink_ack() extack race
+ * sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect
+ * tcp/dccp: fix ireq->opt races
+ * packet: avoid panic in packet_getsockopt()
+ * geneve: Fix function matching VNI and tunnel ID on big-endian
+ * net: bridge: fix returning of vlan range op errors
+ * soreuseport: fix initialization race
+ * ipv6: flowlabel: do not leave opt->tot_len with garbage
+ * sctp: full support for ipv6 ip_nonlocal_bind & IP_FREEBIND
+ * tcp/dccp: fix lockdep splat in inet_csk_route_req()
+ * tcp/dccp: fix other lockdep splats accessing ireq_opt
+ * net: dsa: check master device before put
+ * net/unix: don't show information about sockets from other namespaces
+ * tap: double-free in error path in tap_open()
+ * net/mlx5: Fix health work queue spin lock to IRQ safe
+ * net/mlx5e: Properly deal with encap flows add/del under neigh update
+ * ipip: only increase err_count for some certain type icmp in ipip_err
+ * ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err
+ * ip6_gre: update dst pmtu if dev mtu has been updated by toobig in 
__gre6_xmit
+ * tcp: refresh tp timestamp before tcp_mtu_probe()
+ * tap: reference to KVA of an unloaded module causes kernel panic
+ * tun: allow positive return values on dev_get_valid_name() call
+ * sctp: reset owner sk for data chunks on out queues when migrating a sock
+ * net_sched: avoid matching qdisc with zero handle
+ * l2tp: hold tunnel in pppol2tp_connect()
+ * tun/tap: sanitize TUNSETSNDBUF input
+ * ipv6: addrconf: increment ifp refcount before ipv6_del_addr()
+ * tcp: fix tcp_mtu_probe() vs highest_sack
+ * mac80211: accept key reinstall without changing anything
+ * mac80211: use constant time comparison with keys
+ * mac80211: don't compare TKIP TX MIC key in reinstall prevention
+ * usb: usbtest: fix NULL pointer dereference
+ * Input: ims-psu - check if CDC union descriptor is sane
+ * EDAC, sb_edac: Don't create a second memory controller if HA1 is not present
+ * dmaengine: dmatest: warn user when dma test times out
+ * Linux 4.13.14

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1744121

Title:
  Artful update to 4.13.14 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1744121/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to