Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: v5.4.82 upstream stable release from git://git.kernel.org/ devlink: Hold rtnl lock while reading netdev attributes ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init net/af_iucv: set correct sk_protocol for child sockets net/tls: missing received data after fast remote close net/tls: Protect from calling tls_dev_del for TLS RX twice rose: Fix Null pointer dereference in rose_send_frame() sock: set sk_err to ee_errno on dequeue from errq tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control tun: honor IOCB_NOWAIT flag usbnet: ipheth: fix connectivity with iOS 14 bonding: wait for sysfs kobject destruction before freeing struct slave staging/octeon: fix up merge error ima: extend boot_aggregate with kernel measurements sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal ipv4: Fix tos mask in inet_rtm_getroute() dt-bindings: net: correct interrupt flags in examples chelsio/chtls: fix panic during unload reload chtls ibmvnic: Ensure that SCRQ entry reads are correctly ordered ibmvnic: Fix TX completion error handling inet_ecn: Fix endianness of checksum update when setting ECT(1) net: ip6_gre: set dev->hard_header_len when using header_ops net/x25: prevent a couple of overflows cxgb3: fix error return code in t3_sge_alloc_qset() net: pasemi: fix error return code in pasemi_mac_open() vxlan: fix error return code in __vxlan_dev_create() chelsio/chtls: fix a double free in chtls_setkey() net: mvpp2: Fix error return code in mvpp2_open() net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl net: openvswitch: ensure LSE is pullable before reading it net/sched: act_mpls: ensure LSE is pullable before reading it net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering net/mlx5: Fix wrong address reclaim when command interface is down ALSA: usb-audio: US16x08: fix value count for level meters Input: xpad - support Ardwiino Controllers tracing: Remove WARN_ON in start_thread() RDMA/i40iw: Address an mmap handler exploit in i40iw Linux 5.4.82 UBUNTU: upstream stable to v5.4.82 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.82 upstream stable release + from git://git.kernel.org/ - v5.4.82 upstream stable release - from git://git.kernel.org/ + devlink: Hold rtnl lock while reading netdev attributes + ipv6: addrlabel: fix possible memory leak in ip6addrlbl_net_init + net/af_iucv: set correct sk_protocol for child sockets + net/tls: missing received data after fast remote close + net/tls: Protect from calling tls_dev_del for TLS RX twice + rose: Fix Null pointer dereference in rose_send_frame() + sock: set sk_err to ee_errno on dequeue from errq + tcp: Set INET_ECN_xmit configuration in tcp_reinit_congestion_control + tun: honor IOCB_NOWAIT flag + usbnet: ipheth: fix connectivity with iOS 14 + bonding: wait for sysfs kobject destruction before freeing struct slave + staging/octeon: fix up merge error + ima: extend boot_aggregate with kernel measurements + sched/fair: Fix unthrottle_cfs_rq() for leaf_cfs_rq list + netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal + ipv4: Fix tos mask in inet_rtm_getroute() + dt-bindings: net: correct interrupt flags in examples + chelsio/chtls: fix panic during unload reload chtls + ibmvnic: Ensure that SCRQ entry reads are correctly ordered + ibmvnic: Fix TX completion error handling + inet_ecn: Fix endianness of checksum update when setting ECT(1) + net: ip6_gre: set dev->hard_header_len when using header_ops + net/x25: prevent a couple of overflows + cxgb3: fix error return code in t3_sge_alloc_qset() + net: pasemi: fix error return code in pasemi_mac_open() + vxlan: fix error return code in __vxlan_dev_create() + chelsio/chtls: fix a double free in chtls_setkey() + net: mvpp2: Fix error return code in mvpp2_open() + net: skbuff: ensure LSE is pullable before decrementing the MPLS ttl + net: openvswitch: ensure LSE is pullable before reading it + net/sched: act_mpls: ensure LSE is pullable before reading it + net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering + net/mlx5: Fix wrong address reclaim when command interface is down + ALSA: usb-audio: US16x08: fix value count for level meters + Input: xpad - support Ardwiino Controllers + tracing: Remove WARN_ON in start_thread() + RDMA/i40iw: Address an mmap handler exploit in i40iw + Linux 5.4.82 + UBUNTU: upstream stable to v5.4.82 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1908564 Title: Focal update: v5.4.82 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1908564/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs