Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10) from git://git.kernel.org/ hv_netvsc: Fix net device attach on older Windows hosts tipc: fix one byte leak in tipc_sk_set_orig_addr() tcp: restore autocorking sctp: clear the new asoc's stream outcnt in sctp_stream_update net: systemport: Correclty disambiguate driver instances net/mlx5e: DCBNL fix min inline header size for dscp mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list net/smc: restrict non-blocking connect finish proc: do not access cmdline nor environ from file-backed areas l2tp: revert "l2tp: fix missing print session offset info" udp: fix SO_BINDTODEVICE nsh: fix infinite loop net/mlx5e: Allow offloading ipv4 header re-write for icmp ipv6: fix uninit-value in ip6_multipath_l3_keys() hv_netvsc: set master device net/mlx5: Avoid cleaning flow steering table twice during error flow net/mlx5e: TX, Use correct counter in dma_map error flow net: sched: fix error path in tcf_proto_create() when modules are not configured bonding: send learning packets for vlans on slave bonding: do not allow rlb updates to invalid mac tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent(). tcp: ignore Fast Open on repair mode tcp_bbr: fix to zero idle_restart only upon S/ACKed data sctp: use the old asoc when making the cookie-ack chunk in dupcook_d sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr sctp: fix the issue that the cookie-ack with auth can't get processed sctp: delay the authentication for the duplicated cookie-echo chunk rds: do not leak kernel memory to user land r8169: fix powering up RTL8168h qmi_wwan: do not steal interfaces from class drivers openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found net/tls: Fix connection stall on partial tls record net/tls: Don't recursively call push_record during tls_write_space callbacks net: support compat 64-bit time in {s,g}etsockopt net_sched: fq: take care of throttled flows before reuse net sched actions: fix refcnt leak in skbmod net/mlx5: E-Switch, Include VF RDMA stats in vport statistics net/mlx5e: Err if asked to offload TC match on frag being first net/mlx4_en: Verify coalescing parameters are in range net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()' net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode net: ethernet: sun: niu set correct packet size in skb llc: better deal with too small mtu ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg ipv4: fix fnhe usage by non-cached routes dccp: fix tasklet usage bridge: check iface upper dev when setting master via ioctl 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Bionic) Importance: Undecided Assignee: Kamal Mostafa (kamalmostafa) Status: In Progress ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10) + from git://git.kernel.org/ - upstream stable patchset 2018-07-09 - from git://git.kernel.org/ + hv_netvsc: Fix net device attach on older Windows hosts + tipc: fix one byte leak in tipc_sk_set_orig_addr() + tcp: restore autocorking + sctp: clear the new asoc's stream outcnt in sctp_stream_update + net: systemport: Correclty disambiguate driver instances + net/mlx5e: DCBNL fix min inline header size for dscp + mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list + net/smc: restrict non-blocking connect finish + proc: do not access cmdline nor environ from file-backed areas + l2tp: revert "l2tp: fix missing print session offset info" + udp: fix SO_BINDTODEVICE + nsh: fix infinite loop + net/mlx5e: Allow offloading ipv4 header re-write for icmp + ipv6: fix uninit-value in ip6_multipath_l3_keys() + hv_netvsc: set master device + net/mlx5: Avoid cleaning flow steering table twice during error flow + net/mlx5e: TX, Use correct counter in dma_map error flow + net: sched: fix error path in tcf_proto_create() when modules are not configured + bonding: send learning packets for vlans on slave + bonding: do not allow rlb updates to invalid mac + tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent(). + tcp: ignore Fast Open on repair mode + tcp_bbr: fix to zero idle_restart only upon S/ACKed data + sctp: use the old asoc when making the cookie-ack chunk in dupcook_d + sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg + sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr + sctp: fix the issue that the cookie-ack with auth can't get processed + sctp: delay the authentication for the duplicated cookie-echo chunk + rds: do not leak kernel memory to user land + r8169: fix powering up RTL8168h + qmi_wwan: do not steal interfaces from class drivers + openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found + net/tls: Fix connection stall on partial tls record + net/tls: Don't recursively call push_record during tls_write_space callbacks + net: support compat 64-bit time in {s,g}etsockopt + net_sched: fq: take care of throttled flows before reuse + net sched actions: fix refcnt leak in skbmod + net/mlx5: E-Switch, Include VF RDMA stats in vport statistics + net/mlx5e: Err if asked to offload TC match on frag being first + net/mlx4_en: Verify coalescing parameters are in range + net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()' + net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode + net: ethernet: sun: niu set correct packet size in skb + llc: better deal with too small mtu + ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg + ipv4: fix fnhe usage by non-cached routes + dccp: fix tasklet usage + bridge: check iface upper dev when setting master via ioctl + 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Changed in: linux (Ubuntu Bionic) Status: New => In Progress -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1780858 Title: Bionic update: upstream stable patchset 2018-07-09 Status in linux package in Ubuntu: New Status in linux source package in Bionic: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: upstream stable patchset 2018-07-09 (ported from v4.14.42 and v4.16.10) from git://git.kernel.org/ hv_netvsc: Fix net device attach on older Windows hosts tipc: fix one byte leak in tipc_sk_set_orig_addr() tcp: restore autocorking sctp: clear the new asoc's stream outcnt in sctp_stream_update net: systemport: Correclty disambiguate driver instances net/mlx5e: DCBNL fix min inline header size for dscp mlxsw: spectrum_switchdev: Do not remove mrouter port from MDB's ports list net/smc: restrict non-blocking connect finish proc: do not access cmdline nor environ from file-backed areas l2tp: revert "l2tp: fix missing print session offset info" udp: fix SO_BINDTODEVICE nsh: fix infinite loop net/mlx5e: Allow offloading ipv4 header re-write for icmp ipv6: fix uninit-value in ip6_multipath_l3_keys() hv_netvsc: set master device net/mlx5: Avoid cleaning flow steering table twice during error flow net/mlx5e: TX, Use correct counter in dma_map error flow net: sched: fix error path in tcf_proto_create() when modules are not configured bonding: send learning packets for vlans on slave bonding: do not allow rlb updates to invalid mac tg3: Fix vunmap() BUG_ON() triggered from tg3_free_consistent(). tcp: ignore Fast Open on repair mode tcp_bbr: fix to zero idle_restart only upon S/ACKed data sctp: use the old asoc when making the cookie-ack chunk in dupcook_d sctp: remove sctp_chunk_put from fail_mark err path in sctp_ulpevent_make_rcvmsg sctp: handle two v4 addrs comparison in sctp_inet6_cmp_addr sctp: fix the issue that the cookie-ack with auth can't get processed sctp: delay the authentication for the duplicated cookie-echo chunk rds: do not leak kernel memory to user land r8169: fix powering up RTL8168h qmi_wwan: do not steal interfaces from class drivers openvswitch: Don't swap table in nlattr_set() after OVS_ATTR_NESTED is found net/tls: Fix connection stall on partial tls record net/tls: Don't recursively call push_record during tls_write_space callbacks net: support compat 64-bit time in {s,g}etsockopt net_sched: fq: take care of throttled flows before reuse net sched actions: fix refcnt leak in skbmod net/mlx5: E-Switch, Include VF RDMA stats in vport statistics net/mlx5e: Err if asked to offload TC match on frag being first net/mlx4_en: Verify coalescing parameters are in range net/mlx4_en: Fix an error handling path in 'mlx4_en_init_netdev()' net: ethernet: ti: cpsw: fix packet leaking in dual_mac mode net: ethernet: sun: niu set correct packet size in skb llc: better deal with too small mtu ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg ipv4: fix fnhe usage by non-cached routes dccp: fix tasklet usage bridge: check iface upper dev when setting master via ioctl 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1780858/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp