2019-01-17 15:06:36 |
Kamal Mostafa |
bug |
|
|
added bug |
2019-01-17 15:06:43 |
Kamal Mostafa |
linux (Ubuntu): status |
New |
Confirmed |
|
2019-01-17 15:06:45 |
Kamal Mostafa |
tags |
|
kernel-stable-tracking-bug |
|
2019-01-17 15:06:49 |
Kamal Mostafa |
bug |
|
|
added subscriber SRU Verification |
2019-01-17 15:06:54 |
Kamal Mostafa |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2019-01-17 15:07:02 |
Kamal Mostafa |
nominated for series |
|
Ubuntu Bionic |
|
2019-01-17 15:07:07 |
Kamal Mostafa |
bug task added |
|
linux (Ubuntu Bionic) |
|
2019-01-17 15:08:00 |
Kamal Mostafa |
linux (Ubuntu Bionic): status |
New |
In Progress |
|
2019-01-17 15:08:03 |
Kamal Mostafa |
linux (Ubuntu Bionic): assignee |
|
Kamal Mostafa (kamalmostafa) |
|
2019-01-17 15:08:14 |
Kamal Mostafa |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2019-01-17
from git://git.kernel.org/
|
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2019-01-17 (ported from v4.14.58 and v4.17.10)
from git://git.kernel.org/ |
|
2019-01-17 16:55:24 |
Kamal Mostafa |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2019-01-17 (ported from v4.14.58 and v4.17.10)
from git://git.kernel.org/ |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
upstream stable patchset 2019-01-17 (ported from v4.14.58 and v4.17.10)
from git://git.kernel.org/
scsi: sd_zbc: Fix variable type and bogus comment
KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in parallel.
x86/apm: Don't access __preempt_count with zeroed fs
x86/events/intel/ds: Fix bts_interrupt_threshold alignment
x86/MCE: Remove min interval polling limitation
fat: fix memory allocation failure handling of match_strdup()
ALSA: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk
ARCv2: [plat-hsdk]: Save accl reg pair by default
ARC: Fix CONFIG_SWAP
ARC: configs: Remove CONFIG_INITRAMFS_SOURCE from defconfigs
ARC: mm: allow mprotect to make stack mappings executable
mm: memcg: fix use after free in mem_cgroup_iter()
mm/huge_memory.c: fix data loss when splitting a file pmd
cpufreq: intel_pstate: Register when ACPI PCCH is present
vfio/pci: Fix potential Spectre v1
stop_machine: Disable preemption when waking two stopper threads
drm/i915: Fix hotplug irq ack on i965/g4x
drm/nouveau: Use drm_connector_list_iter_* for iterating connectors
drm/nouveau: Avoid looping through fake MST connectors
gen_stats: Fix netlink stats dumping in the presence of padding
ipv4: Return EINVAL when ping_group_range sysctl doesn't map to user ns
ipv6: fix useless rol32 call on hash
ipv6: ila: select CONFIG_DST_CACHE
lib/rhashtable: consider param->min_size when setting initial table size
net: diag: Don't double-free TCP_NEW_SYN_RECV sockets in tcp_abort
net: Don't copy pfmemalloc flag in __copy_skb_header()
skbuff: Unconditionally copy pfmemalloc in __skb_clone()
net/ipv4: Set oif in fib_compute_spec_dst
net: phy: fix flag masking in __set_phy_supported
ptp: fix missing break in switch
qmi_wwan: add support for Quectel EG91
tg3: Add higher cpu clock for 5762.
hv_netvsc: Fix napi reschedule while receive completion is busy
net/mlx4_en: Don't reuse RX page when XDP is set
net: systemport: Fix CRC forwarding check for SYSTEMPORT Lite
ipv6: make DAD fail with enhanced DAD when nonce length differs
net: usb: asix: replace mii_nway_restart in resume path
alpha: fix osf_wait4() breakage
cxl_getfile(): fix double-iput() on alloc_file() failures
powerpc/powernv: Fix save/restore of SPRG3 on entry/exit from stop (idle)
xhci: Fix perceived dead host due to runtime suspend race with event handler
KVM: irqfd: fix race between EPOLLHUP and irq_bypass_register_consumer
x86/kvmclock: set pvti_cpu0_va after enabling kvmclock
ALSA: hda/realtek - Yet another Clevo P950 quirk entry
drm/amdgpu: Reserve VM root shared fence slot for command submission (v3)
rhashtable: add restart routine in rhashtable_free_and_destroy()
sch_fq_codel: zero q->flows_cnt when fq_codel_init fails
sctp: introduce sctp_dst_mtu
sctp: fix the issue that pathmtu may be set lower than MINSEGMENT
net: aquantia: vlan unicast address list correct handling
drm_mode_create_lease_ioctl(): fix open-coded filp_clone_open() |
|
2019-02-01 12:30:26 |
Stefan Bader |
linux (Ubuntu): status |
Confirmed |
Invalid |
|
2019-02-01 12:30:31 |
Stefan Bader |
linux (Ubuntu Bionic): status |
In Progress |
Fix Committed |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
linux (Ubuntu Bionic): status |
Fix Committed |
Fix Released |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2018-18397 |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2018-19854 |
|
2019-03-05 15:00:44 |
Launchpad Janitor |
cve linked |
|
2019-6133 |
|