Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10)
       from git://git.kernel.org/

hv_netvsc: Fix net device attach on older Windows hosts
tipc: fix one byte leak in tipc_sk_set_orig_addr()
tcp: restore autocorking
sctp: clear the new asoc's stream outcnt in sctp_stream_update
net: systemport: Correclty disambiguate driver instances
net/mlx5e: DCBNL fix min inline header size for dscp
mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list
net/smc: restrict non-blocking connect finish
proc: do not access cmdline nor environ from file-backed areas
l2tp: revert "l2tp: fix missing print session offset info"
udp: fix SO_BINDTODEVICE
nsh: fix infinite loop
net/mlx5e: Allow offloading ipv4 header re-write for icmp
ipv6: fix uninit-value in ip6_multipath_l3_keys()
hv_netvsc: set master device
net/mlx5: Avoid cleaning flow steering table twice during error flow
net/mlx5e: TX, Use correct counter in dma_map error flow
net: sched: fix error path in tcf_proto_create() when modules are not configured
bonding: send learning packets for vlans on slave
bonding: do not allow rlb updates to invalid mac
tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent().
tcp: ignore Fast Open on repair mode
tcp_bbr: fix to zero idle_restart only upon S/ACKed data
sctp: use the old asoc when making the cookie-ack chunk in dupcook_d
sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg
sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
sctp: fix the issue that the cookie-ack with auth can't get processed
sctp: delay the authentication for the duplicated cookie-echo chunk
rds: do not leak kernel memory to user land
r8169: fix powering up RTL8168h
qmi_wwan: do not steal interfaces from class drivers
openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found
net/tls: Fix connection stall on partial tls record
net/tls: Don't recursively call push_record during tls_write_space callbacks
net: support compat 64-bit time in {s,g}etsockopt
net_sched: fq: take care of throttled flows before reuse
net sched actions: fix refcnt leak in skbmod
net/mlx5: E-Switch, Include VF RDMA stats in vport statistics
net/mlx5e: Err if asked to offload TC match on frag being first
net/mlx4_en: Verify coalescing parameters are in range
net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()'
net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode
net: ethernet: sun: niu set correct packet size in skb
llc: better deal with too small mtu
ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg
ipv4: fix fnhe usage by non-cached routes
dccp: fix tasklet usage
bridge: check iface upper dev when setting master via ioctl
8139too: Use disable_irq_nosync() in rtl8139_poll_controller()

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu Bionic)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Bionic)
   Importance: Undecided
       Status: New

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10)
+        from git://git.kernel.org/
  
-        upstream stable patchset 2018-07-09
-        from git://git.kernel.org/
+ hv_netvsc: Fix net device attach on older Windows hosts
+ tipc: fix one byte leak in tipc_sk_set_orig_addr()
+ tcp: restore autocorking
+ sctp: clear the new asoc's stream outcnt in sctp_stream_update
+ net: systemport: Correclty disambiguate driver instances
+ net/mlx5e: DCBNL fix min inline header size for dscp
+ mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list
+ net/smc: restrict non-blocking connect finish
+ proc: do not access cmdline nor environ from file-backed areas
+ l2tp: revert "l2tp: fix missing print session offset info"
+ udp: fix SO_BINDTODEVICE
+ nsh: fix infinite loop
+ net/mlx5e: Allow offloading ipv4 header re-write for icmp
+ ipv6: fix uninit-value in ip6_multipath_l3_keys()
+ hv_netvsc: set master device
+ net/mlx5: Avoid cleaning flow steering table twice during error flow
+ net/mlx5e: TX, Use correct counter in dma_map error flow
+ net: sched: fix error path in tcf_proto_create() when modules are not 
configured
+ bonding: send learning packets for vlans on slave
+ bonding: do not allow rlb updates to invalid mac
+ tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent().
+ tcp: ignore Fast Open on repair mode
+ tcp_bbr: fix to zero idle_restart only upon S/ACKed data
+ sctp: use the old asoc when making the cookie-ack chunk in dupcook_d
+ sctp: remove sctp_chunk_put from fail_mark err path in 
sctp_ulpevent_make_rcvmsg
+ sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
+ sctp: fix the issue that the cookie-ack with auth can't get processed
+ sctp: delay the authentication for the duplicated cookie-echo chunk
+ rds: do not leak kernel memory to user land
+ r8169: fix powering up RTL8168h
+ qmi_wwan: do not steal interfaces from class drivers
+ openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found
+ net/tls: Fix connection stall on partial tls record
+ net/tls: Don't recursively call push_record during tls_write_space callbacks
+ net: support compat 64-bit time in {s,g}etsockopt
+ net_sched: fq: take care of throttled flows before reuse
+ net sched actions: fix refcnt leak in skbmod
+ net/mlx5: E-Switch, Include VF RDMA stats in vport statistics
+ net/mlx5e: Err if asked to offload TC match on frag being first
+ net/mlx4_en: Verify coalescing parameters are in range
+ net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()'
+ net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode
+ net: ethernet: sun: niu set correct packet size in skb
+ llc: better deal with too small mtu
+ ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg
+ ipv4: fix fnhe usage by non-cached routes
+ dccp: fix tasklet usage
+ bridge: check iface upper dev when setting master via ioctl
+ 8139too: Use disable_irq_nosync() in rtl8139_poll_controller()

** Changed in: linux (Ubuntu Bionic)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Changed in: linux (Ubuntu Bionic)
       Status: New => In Progress

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1780858

Title:
  Bionic update: upstream stable patchset 2018-07-09

Status in linux package in Ubuntu:
  New
Status in linux source package in Bionic:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10)
         from git://git.kernel.org/

  hv_netvsc: Fix net device attach on older Windows hosts
  tipc: fix one byte leak in tipc_sk_set_orig_addr()
  tcp: restore autocorking
  sctp: clear the new asoc's stream outcnt in sctp_stream_update
  net: systemport: Correclty disambiguate driver instances
  net/mlx5e: DCBNL fix min inline header size for dscp
  mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list
  net/smc: restrict non-blocking connect finish
  proc: do not access cmdline nor environ from file-backed areas
  l2tp: revert "l2tp: fix missing print session offset info"
  udp: fix SO_BINDTODEVICE
  nsh: fix infinite loop
  net/mlx5e: Allow offloading ipv4 header re-write for icmp
  ipv6: fix uninit-value in ip6_multipath_l3_keys()
  hv_netvsc: set master device
  net/mlx5: Avoid cleaning flow steering table twice during error flow
  net/mlx5e: TX, Use correct counter in dma_map error flow
  net: sched: fix error path in tcf_proto_create() when modules are not 
configured
  bonding: send learning packets for vlans on slave
  bonding: do not allow rlb updates to invalid mac
  tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent().
  tcp: ignore Fast Open on repair mode
  tcp_bbr: fix to zero idle_restart only upon S/ACKed data
  sctp: use the old asoc when making the cookie-ack chunk in dupcook_d
  sctp: remove sctp_chunk_put from fail_mark err path in 
sctp_ulpevent_make_rcvmsg
  sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr
  sctp: fix the issue that the cookie-ack with auth can't get processed
  sctp: delay the authentication for the duplicated cookie-echo chunk
  rds: do not leak kernel memory to user land
  r8169: fix powering up RTL8168h
  qmi_wwan: do not steal interfaces from class drivers
  openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found
  net/tls: Fix connection stall on partial tls record
  net/tls: Don't recursively call push_record during tls_write_space callbacks
  net: support compat 64-bit time in {s,g}etsockopt
  net_sched: fq: take care of throttled flows before reuse
  net sched actions: fix refcnt leak in skbmod
  net/mlx5: E-Switch, Include VF RDMA stats in vport statistics
  net/mlx5e: Err if asked to offload TC match on frag being first
  net/mlx4_en: Verify coalescing parameters are in range
  net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()'
  net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode
  net: ethernet: sun: niu set correct packet size in skb
  llc: better deal with too small mtu
  ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg
  ipv4: fix fnhe usage by non-cached routes
  dccp: fix tasklet usage
  bridge: check iface upper dev when setting master via ioctl
  8139too: Use disable_irq_nosync() in rtl8139_poll_controller()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1780858/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to