Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2019-11-27
Ported from the following upstream stable releases:
v4.19.86, v5.3.13
from git://git.kernel.org/
i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf()
Revert "OPP: Protect dev_list with opp_table lock"
net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
mm/memory_hotplug: fix updating the node span
arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
fbdev: Ditch fb_edid_add_monspecs
bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0
bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0
bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
bpf: btf: Fix a missing check bug
UBUNTU: upstream stable to v4.19.86, v5.3.13
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: linux (Ubuntu Disco)
Importance: Undecided
Assignee: Kamal Mostafa (kamalmostafa)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Disco)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Disco)
Status: New => In Progress
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The following upstream
+ stable patches should be included in the Ubuntu kernel:
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The following upstream
- stable patches should be included in the Ubuntu kernel:
+ upstream stable patchset 2019-11-27
- upstream stable patchset 2019-11-27
- from git://git.kernel.org/
+ Ported from the following upstream stable releases:
+ v4.19.86, v5.3.13
+
+ from git://git.kernel.org/
+
+ i2c: mediatek: modify threshold passed to i2c_get_dma_safe_msg_buf()
+ Revert "OPP: Protect dev_list with opp_table lock"
+ net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
+ mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
+ mm/memory_hotplug: fix updating the node span
+ arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
+ fbdev: Ditch fb_edid_add_monspecs
+ bpf, x32: Fix bug for BPF_ALU64 | BPF_NEG
+ bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_X shift by 0
+ bpf, x32: Fix bug with ALU64 {LSH, RSH, ARSH} BPF_K shift by 0
+ bpf, x32: Fix bug for BPF_JMP | {BPF_JSGT, BPF_JSLE, BPF_JSLT, BPF_JSGE}
+ bpf: btf: Fix a missing check bug
+ UBUNTU: upstream stable to v4.19.86, v5.3.13
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854229
Title:
Disco update: upstream stable patchset 2019-11-27
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1854229/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs