Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.46 upstream stable release from git://git.kernel.org/ devinet: fix memleak in inetdev_init() l2tp: add sk_family checks to l2tp_validate_socket l2tp: do not use inet_hash()/inet_unhash() net/mlx5: Fix crash upon suspend/resume net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a net: usb: qmi_wwan: add Telit LE910C1-EUX composition NFC: st21nfca: add missed kfree_skb() in an error path nfp: flower: fix used time of merge flow statistics vsock: fix timeout in vsock_accept() net: check untrusted gso_size at kernel entry net: be more gentle about silly gso requests coming from user USB: serial: qcserial: add DW5816e QDL support USB: serial: usb_wwan: do not resubmit rx urb on fatal errors USB: serial: option: add Telit LE910C1-EUX compositions USB: serial: ch341: add basis for quirk detection iio:chemical:sps30: Fix timestamp alignment iio: vcnl4000: Fix i2c swapped word reading. iio:chemical:pms7003: Fix timestamp alignment and prevent data leak. iio: adc: stm32-adc: fix a wrong error message when probing interrupts usb: musb: start session in resume for host port usb: musb: Fix runtime PM imbalance on error vt: keyboard: avoid signed integer overflow in k_ascii tty: hvc_console, fix crashes on parallel open/close staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK CDC-ACM: heed quirk also in error handling nvmem: qfprom: remove incorrect write support uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned Revert "net/mlx5: Annotate mutex destroy for root ns" Linux 5.4.46 UBUNTU: upstream stable to v5.4.46 ----- Note: The following commits from v5.4.46 had already been applied as UBUNTU SAUCE patches: 590459086bc9 x86/speculation: Add Ivy Bridge to affected list faf187abda94 x86/speculation: Add SRBDS vulnerability and mitigation documentation b0f61a0503ad x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation dab0161b8a0b x86/cpu: Add 'table' argument to cpu_matches() 749ec6b48a9a x86/cpu: Add a steppings field to struct x86_cpu_id e4e57f7bca44 x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Focal) Importance: Undecided Assignee: Kamal Mostafa (kamalmostafa) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Focal) Status: New => In Progress ** Changed in: linux (Ubuntu Focal) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.46 upstream stable release + from git://git.kernel.org/ - v5.4.46 upstream stable release - from git://git.kernel.org/ + devinet: fix memleak in inetdev_init() + l2tp: add sk_family checks to l2tp_validate_socket + l2tp: do not use inet_hash()/inet_unhash() + net/mlx5: Fix crash upon suspend/resume + net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a + net: usb: qmi_wwan: add Telit LE910C1-EUX composition + NFC: st21nfca: add missed kfree_skb() in an error path + nfp: flower: fix used time of merge flow statistics + vsock: fix timeout in vsock_accept() + net: check untrusted gso_size at kernel entry + net: be more gentle about silly gso requests coming from user + USB: serial: qcserial: add DW5816e QDL support + USB: serial: usb_wwan: do not resubmit rx urb on fatal errors + USB: serial: option: add Telit LE910C1-EUX compositions + USB: serial: ch341: add basis for quirk detection + iio:chemical:sps30: Fix timestamp alignment + iio: vcnl4000: Fix i2c swapped word reading. + iio:chemical:pms7003: Fix timestamp alignment and prevent data leak. + iio: adc: stm32-adc: fix a wrong error message when probing interrupts + usb: musb: start session in resume for host port + usb: musb: Fix runtime PM imbalance on error + vt: keyboard: avoid signed integer overflow in k_ascii + tty: hvc_console, fix crashes on parallel open/close + staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK + CDC-ACM: heed quirk also in error handling + nvmem: qfprom: remove incorrect write support + uprobes: ensure that uprobe->offset and ->ref_ctr_offset are properly aligned + Revert "net/mlx5: Annotate mutex destroy for root ns" + Linux 5.4.46 + UBUNTU: upstream stable to v5.4.46 + + ----- + + Note: The following commits from v5.4.46 had already been applied as + UBUNTU SAUCE patches: + + 590459086bc9 x86/speculation: Add Ivy Bridge to affected list + faf187abda94 x86/speculation: Add SRBDS vulnerability and mitigation documentation + b0f61a0503ad x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation + dab0161b8a0b x86/cpu: Add 'table' argument to cpu_matches() + 749ec6b48a9a x86/cpu: Add a steppings field to struct x86_cpu_id + e4e57f7bca44 x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883184 Title: Focal update: v5.4.46 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883184/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs