Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.4.92 upstream stable release
from git://git.kernel.org/
usb: ohci: Make distrust_firmware param default to false
compiler.h: Raise minimum version of GCC to 5.1 for arm64
xen/privcmd: allow fetching resource sizes
elfcore: fix building with clang
scsi: lpfc: Make lpfc_defer_acc_rsp static
spi: npcm-fiu: simplify the return expression of npcm_fiu_probe()
spi: npcm-fiu: Disable clock in probe error path
nfsd4: readdirplus shouldn't return parent of export
bpf: Don't leak memory in bpf getsockopt when optlen == 0
bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback
udp: Prevent reuseport_select_sock from reading uninitialized socks
netxen_nic: fix MSI/MSI-x interrupts
net: introduce skb_list_walk_safe for skb segment walking
net: skbuff: disambiguate argument and member for skb_list_walk_safe helper
net: ipv6: Validate GSO SKB before finish IPv6 processing
mlxsw: core: Add validation of transceiver temperature thresholds
mlxsw: core: Increase critical threshold for ASIC thermal zone
net: mvpp2: Remove Pause and Asym_Pause support
rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
esp: avoid unneeded kmap_atomic call
net: dcb: Validate netlink message in DCB handler
net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands
rxrpc: Call state should be read with READ_ONCE() under some circumstances
net: stmmac: Fixed mtu channged by cache aligned
net: sit: unregister_netdevice on newlink's error path
net: avoid 32 x truesize under-estimation for tiny skbs
rxrpc: Fix handling of an unsupported token type in rxrpc_read()
net, sctp, filter: remap copy_from_user failure error
tipc: fix NULL deref in tipc_link_xmit()
mac80211: do not drop tx nulldata packets on encrypted links
mac80211: check if atf has been disabled in __ieee80211_schedule_txq
spi: cadence: cache reference clock rate during probe
Linux 5.4.92
UBUNTU: upstream stable to v5.4.92
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: linux (Ubuntu Focal)
Importance: Undecided
Assignee: Kamal Mostafa (kamalmostafa)
Status: In Progress
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: kernel-stable-tracking-bug
** Also affects: linux (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Focal)
Status: New => In Progress
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The following upstream
+ stable patches should be included in the Ubuntu kernel:
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The following upstream
- stable patches should be included in the Ubuntu kernel:
+ v5.4.92 upstream stable release
+ from git://git.kernel.org/
- v5.4.92 upstream stable release
- from git://git.kernel.org/
+ usb: ohci: Make distrust_firmware param default to false
+ compiler.h: Raise minimum version of GCC to 5.1 for arm64
+ xen/privcmd: allow fetching resource sizes
+ elfcore: fix building with clang
+ scsi: lpfc: Make lpfc_defer_acc_rsp static
+ spi: npcm-fiu: simplify the return expression of npcm_fiu_probe()
+ spi: npcm-fiu: Disable clock in probe error path
+ nfsd4: readdirplus shouldn't return parent of export
+ bpf: Don't leak memory in bpf getsockopt when optlen == 0
+ bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback
+ udp: Prevent reuseport_select_sock from reading uninitialized socks
+ netxen_nic: fix MSI/MSI-x interrupts
+ net: introduce skb_list_walk_safe for skb segment walking
+ net: skbuff: disambiguate argument and member for skb_list_walk_safe helper
+ net: ipv6: Validate GSO SKB before finish IPv6 processing
+ mlxsw: core: Add validation of transceiver temperature thresholds
+ mlxsw: core: Increase critical threshold for ASIC thermal zone
+ net: mvpp2: Remove Pause and Asym_Pause support
+ rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
+ esp: avoid unneeded kmap_atomic call
+ net: dcb: Validate netlink message in DCB handler
+ net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands
+ rxrpc: Call state should be read with READ_ONCE() under some circumstances
+ net: stmmac: Fixed mtu channged by cache aligned
+ net: sit: unregister_netdevice on newlink's error path
+ net: avoid 32 x truesize under-estimation for tiny skbs
+ rxrpc: Fix handling of an unsupported token type in rxrpc_read()
+ net, sctp, filter: remap copy_from_user failure error
+ tipc: fix NULL deref in tipc_link_xmit()
+ mac80211: do not drop tx nulldata packets on encrypted links
+ mac80211: check if atf has been disabled in __ieee80211_schedule_txq
+ spi: cadence: cache reference clock rate during probe
+ Linux 5.4.92
+ UBUNTU: upstream stable to v5.4.92
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915186
Title:
Focal update: v5.4.92 upstream stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1915186/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs