** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.13.14 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.13.14 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - - The following patches from the 4.13.14 stable release shall be - applied: + The following patches from the 4.13.14 stable release shall be applied: + * ppp: fix race in ppp device destruction + * gso: fix payload length when gso_size is zero + * ipv4: Fix traffic triggered IPsec connections. + * ipv6: Fix traffic triggered IPsec connections. + * netlink: do not set cb_running if dump's start() errs + * net: call cgroup_sk_alloc() earlier in sk_clone_lock() + * macsec: fix memory leaks when skb_to_sgvec fails + * l2tp: check ps->sock before running pppol2tp_session_ioctl() + * tun: call dev_get_valid_name() before register_netdevice() + * netlink: fix netlink_ack() extack race + * sctp: add the missing sock_owned_by_user check in sctp_icmp_redirect + * tcp/dccp: fix ireq->opt races + * packet: avoid panic in packet_getsockopt() + * geneve: Fix function matching VNI and tunnel ID on big-endian + * net: bridge: fix returning of vlan range op errors + * soreuseport: fix initialization race + * ipv6: flowlabel: do not leave opt->tot_len with garbage + * sctp: full support for ipv6 ip_nonlocal_bind & IP_FREEBIND + * tcp/dccp: fix lockdep splat in inet_csk_route_req() + * tcp/dccp: fix other lockdep splats accessing ireq_opt + * net: dsa: check master device before put + * net/unix: don't show information about sockets from other namespaces + * tap: double-free in error path in tap_open() + * net/mlx5: Fix health work queue spin lock to IRQ safe + * net/mlx5e: Properly deal with encap flows add/del under neigh update + * ipip: only increase err_count for some certain type icmp in ipip_err + * ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err + * ip6_gre: update dst pmtu if dev mtu has been updated by toobig in __gre6_xmit + * tcp: refresh tp timestamp before tcp_mtu_probe() + * tap: reference to KVA of an unloaded module causes kernel panic + * tun: allow positive return values on dev_get_valid_name() call + * sctp: reset owner sk for data chunks on out queues when migrating a sock + * net_sched: avoid matching qdisc with zero handle + * l2tp: hold tunnel in pppol2tp_connect() + * tun/tap: sanitize TUNSETSNDBUF input + * ipv6: addrconf: increment ifp refcount before ipv6_del_addr() + * tcp: fix tcp_mtu_probe() vs highest_sack + * mac80211: accept key reinstall without changing anything + * mac80211: use constant time comparison with keys + * mac80211: don't compare TKIP TX MIC key in reinstall prevention + * usb: usbtest: fix NULL pointer dereference + * Input: ims-psu - check if CDC union descriptor is sane + * EDAC, sb_edac: Don't create a second memory controller if HA1 is not present + * dmaengine: dmatest: warn user when dma test times out + * Linux 4.13.14
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744121 Title: Artful update to 4.13.14 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1744121/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
