** Changed in: linux (Ubuntu Disco)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Disco)
       Status: New => In Progress

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        5.0.21 upstream stable release
+        from git://git.kernel.org/
  
-        5.0.21 upstream stable release
-        from git://git.kernel.org/
+ The following patches were applied:
+ * bonding/802.3ad: fix slave link initialization transition states
+ * cxgb4: offload VLAN flows regardless of VLAN ethtype
+ * inet: switch IP ID generator to siphash
+ * ipv4/igmp: fix another memory leak in igmpv3_del_delrec()
+ * ipv4/igmp: fix build error if !CONFIG_IP_MULTICAST
+ * ipv6: Consider sk_bound_dev_if when binding a raw socket to an address
+ * ipv6: Fix redirect with VRF
+ * llc: fix skb leak in llc_build_and_send_ui_pkt()
+ * mlxsw: spectrum_acl: Avoid warning after identical rules insertion
+ * net: dsa: mv88e6xxx: fix handling of upper half of STATS_TYPE_PORT
+ * net: fec: fix the clk mismatch in failed_reset path
+ * net-gro: fix use-after-free read in napi_gro_frags()
+ * net: mvneta: Fix err code path of probe
+ * net: mvpp2: fix bad MVPP2_TXQ_SCHED_TOKEN_CNTR_REG queue value
+ * net: phy: marvell10g: report if the PHY fails to boot firmware
+ * net: sched: don't use tc_action->order during action dump
+ * net: stmmac: fix reset gpio free missing
+ * r8169: fix MAC address being lost in PCI D3
+ * usbnet: fix kernel crash after disconnect
+ * net/mlx5: Avoid double free in fs init error unwinding path
+ * tipc: Avoid copying bytes beyond the supplied data
+ * net/mlx5: Allocate root ns memory using kzalloc to match kfree
+ * net/mlx5e: Disable rxhash when CQE compress is enabled
+ * net: stmmac: fix ethtool flow control not able to get/set
+ * net: stmmac: dma channel control register need to be init first
+ * bnxt_en: Fix aggregation buffer leak under OOM condition.
+ * bnxt_en: Fix possible BUG() condition when calling pci_disable_msix().
+ * bnxt_en: Reduce memory usage when running in kdump kernel.
+ * net/tls: fix state removal with feature flags off
+ * net/tls: don't ignore netdev notifications if no TLS features
+ * cxgb4: Revert "cxgb4: Remove SGE_HOST_PAGE_SIZE dependency on page size"
+ * net: correct zerocopy refcnt with udp MSG_MORE
+ * crypto: vmx - ghash: do nosimd fallback manually
+ * xen/pciback: Don't disable PCI_COMMAND on PCI device reset.
+ * Revert "tipc: fix modprobe tipc failed after switch order of device 
registration"
+ * tipc: fix modprobe tipc failed after switch order of device registration
+ * Linux 5.0.21

** Changed in: linux (Ubuntu Disco)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837518

Title:
  Disco update: 5.0.21 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1837518/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to