Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.4.82 upstream stable release
from git://git.kernel.org/
devlink: Hold rtnl lock while reading netdev attributes
ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init
net/af_iucv: set correct sk_protocol for child sockets
net/tls: missing received data after fast remote close
net/tls: Protect from calling tls_dev_del for TLS RX twice
rose: Fix Null pointer dereference in rose_send_frame()
sock: set sk_err to ee_errno on dequeue from errq
tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control
tun: honor IOCB_NOWAIT flag
usbnet: ipheth: fix connectivity with iOS 14
bonding: wait for sysfs kobject destruction before freeing struct slave
staging/octeon: fix up merge error
ima: extend boot_aggregate with kernel measurements
sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list
netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
ipv4: Fix tos mask in inet_rtm_getroute()
dt-bindings: net: correct interrupt flags in examples
chelsio/chtls: fix panic during unload reload chtls
ibmvnic: Ensure that SCRQ entry reads are correctly ordered
ibmvnic: Fix TX completion error handling
inet_ecn: Fix endianness of checksum update when setting ECT(1)
net: ip6_gre: set dev->hard_header_len when using header_ops
net/x25: prevent a couple of overflows
cxgb3: fix error return code in t3_sge_alloc_qset()
net: pasemi: fix error return code in pasemi_mac_open()
vxlan: fix error return code in __vxlan_dev_create()
chelsio/chtls: fix a double free in chtls_setkey()
net: mvpp2: Fix error return code in mvpp2_open()
net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl
net: openvswitch: ensure LSE is pullable before reading it
net/sched: act_mpls: ensure LSE is pullable before reading it
net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering
net/mlx5: Fix wrong address reclaim when command interface is down
ALSA: usb-audio: US16x08: fix value count for level meters
Input: xpad - support Ardwiino Controllers
tracing: Remove WARN_ON in start_thread()
RDMA/i40iw: Address an mmap handler exploit in i40iw
Linux 5.4.82
UBUNTU: upstream stable to v5.4.82
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The following upstream
+ stable patches should be included in the Ubuntu kernel:
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The following upstream
- stable patches should be included in the Ubuntu kernel:
+ v5.4.82 upstream stable release
+ from git://git.kernel.org/
- v5.4.82 upstream stable release
- from git://git.kernel.org/
+ devlink: Hold rtnl lock while reading netdev attributes
+ ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init
+ net/af_iucv: set correct sk_protocol for child sockets
+ net/tls: missing received data after fast remote close
+ net/tls: Protect from calling tls_dev_del for TLS RX twice
+ rose: Fix Null pointer dereference in rose_send_frame()
+ sock: set sk_err to ee_errno on dequeue from errq
+ tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control
+ tun: honor IOCB_NOWAIT flag
+ usbnet: ipheth: fix connectivity with iOS 14
+ bonding: wait for sysfs kobject destruction before freeing struct slave
+ staging/octeon: fix up merge error
+ ima: extend boot_aggregate with kernel measurements
+ sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list
+ netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
+ ipv4: Fix tos mask in inet_rtm_getroute()
+ dt-bindings: net: correct interrupt flags in examples
+ chelsio/chtls: fix panic during unload reload chtls
+ ibmvnic: Ensure that SCRQ entry reads are correctly ordered
+ ibmvnic: Fix TX completion error handling
+ inet_ecn: Fix endianness of checksum update when setting ECT(1)
+ net: ip6_gre: set dev->hard_header_len when using header_ops
+ net/x25: prevent a couple of overflows
+ cxgb3: fix error return code in t3_sge_alloc_qset()
+ net: pasemi: fix error return code in pasemi_mac_open()
+ vxlan: fix error return code in __vxlan_dev_create()
+ chelsio/chtls: fix a double free in chtls_setkey()
+ net: mvpp2: Fix error return code in mvpp2_open()
+ net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl
+ net: openvswitch: ensure LSE is pullable before reading it
+ net/sched: act_mpls: ensure LSE is pullable before reading it
+ net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering
+ net/mlx5: Fix wrong address reclaim when command interface is down
+ ALSA: usb-audio: US16x08: fix value count for level meters
+ Input: xpad - support Ardwiino Controllers
+ tracing: Remove WARN_ON in start_thread()
+ RDMA/i40iw: Address an mmap handler exploit in i40iw
+ Linux 5.4.82
+ UBUNTU: upstream stable to v5.4.82
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908564
Title:
Focal update: v5.4.82 upstream stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908564/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs