2019-05-29 15:58:38 |
Stefan Bader |
bug |
|
|
added bug |
2019-05-29 15:58:40 |
Stefan Bader |
linux (Ubuntu): status |
New |
Confirmed |
|
2019-05-29 15:58:41 |
Stefan Bader |
tags |
|
kernel-stable-tracking-bug |
|
2019-05-29 15:58:41 |
Stefan Bader |
bug |
|
|
added subscriber SRU Verification |
2019-05-29 15:58:43 |
Stefan Bader |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2019-05-29 15:58:45 |
Stefan Bader |
nominated for series |
|
Ubuntu Disco |
|
2019-05-29 15:58:46 |
Stefan Bader |
bug task added |
|
linux (Ubuntu Disco) |
|
2019-05-29 15:59:17 |
Stefan Bader |
linux (Ubuntu Disco): importance |
Undecided |
Medium |
|
2019-05-29 15:59:17 |
Stefan Bader |
linux (Ubuntu Disco): status |
New |
In Progress |
|
2019-05-29 15:59:17 |
Stefan Bader |
linux (Ubuntu Disco): assignee |
|
Stefan Bader (smb) |
|
2019-05-29 15:59:31 |
Stefan Bader |
linux (Ubuntu): status |
Confirmed |
Invalid |
|
2019-05-29 16:03:21 |
Stefan Bader |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
5.0.12 upstream stable release
from git://git.kernel.org/
|
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
5.0.12 upstream stable release
from git://git.kernel.org/
The following patches were applied:
* selinux: use kernel linux/socket.h for genheaders and mdp
* Revert "ACPICA: Clear status of GPEs before enabling them"
* drm/i915: Do not enable FEC without DSC
* mm: make page ref count overflow check tighter and more explicit
* mm: add 'try_get_page()' helper function
* mm: prevent get_user_pages() from overflowing page refcount
* fs: prevent page refcount overflow in pipe_buf_get
* arm64: dts: renesas: r8a77990: Fix SCIF5 DMA channels
* ARM: dts: bcm283x: Fix hdmi hpd gpio pull
* s390: limit brk randomization to 32MB
* mt76x02: fix hdr pointer in write txwi for USB
* mt76: mt76x2: fix external LNA gain settings
* mt76: mt76x2: fix 2.4 GHz channel gain settings
* net: ieee802154: fix a potential NULL pointer dereference
* ieee802154: hwsim: propagate genlmsg_reply return code
* Btrfs: fix file corruption after snapshotting due to mix of buffered/DIO writes
* net: stmmac: don't set own bit too early for jumbo frames
* net: stmmac: fix jumbo frame sending with non-linear skbs
* qlcnic: Avoid potential NULL pointer dereference
* xsk: fix umem memory leak on cleanup
* staging: axis-fifo: add CONFIG_OF dependency
* staging, mt7621-pci: fix build without pci support
* netfilter: nft_set_rbtree: check for inactive element after flag mismatch
* netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING
* netfilter: fix NETFILTER_XT_TARGET_TEE dependencies
* netfilter: ip6t_srh: fix NULL pointer dereferences
* s390/qeth: fix race when initializing the IP address table
* ARM: imx51: fix a leaked reference by adding missing of_node_put
* sc16is7xx: missing unregister/delete driver on error in sc16is7xx_init()
* serial: ar933x_uart: Fix build failure with disabled console
* KVM: arm64: Reset the PMU in preemptible context
* arm64: KVM: Always set ICH_HCR_EL2.EN if GICv4 is enabled
* KVM: arm/arm64: vgic-its: Take the srcu lock when writing to guest memory
* KVM: arm/arm64: vgic-its: Take the srcu lock when parsing the memslots
* usb: dwc3: pci: add support for Comet Lake PCH ID
* usb: gadget: net2280: Fix overrun of OUT messages
* usb: gadget: net2280: Fix net2280_dequeue()
* usb: gadget: net2272: Fix net2272_dequeue()
* ARM: dts: pfla02: increase phy reset duration
* i2c: i801: Add support for Intel Comet Lake
* KVM: arm/arm64: Fix handling of stage2 huge mappings
* net: ks8851: Dequeue RX packets explicitly
* net: ks8851: Reassert reset pin if chip ID check fails
* net: ks8851: Delay requesting IRQ until opened
* net: ks8851: Set initial carrier state to down
* staging: rtl8188eu: Fix potential NULL pointer dereference of kcalloc
* staging: rtlwifi: rtl8822b: fix to avoid potential NULL pointer dereference
* staging: rtl8712: uninitialized memory in read_bbreg_hdl()
* staging: rtlwifi: Fix potential NULL pointer dereference of kzalloc
* net: phy: Add DP83825I to the DP83822 driver
* net: macb: Add null check for PCLK and HCLK
* net/sched: don't dereference a->goto_chain to read the chain index
* ARM: dts: imx6qdl: Fix typo in imx6qdl-icore-rqs.dtsi
* drm/tegra: hub: Fix dereference before check
* NFS: Fix a typo in nfs_init_timeout_values()
* net: xilinx: fix possible object reference leak
* net: ibm: fix possible object reference leak
* net: ethernet: ti: fix possible object reference leak
* drm: Fix drm_release() and device unplug
* gpio: aspeed: fix a potential NULL pointer dereference
* drm/meson: Fix invalid pointer in meson_drv_unbind()
* drm/meson: Uninstall IRQ handler
* ARM: davinci: fix build failure with allnoconfig
* sbitmap: order READ/WRITE freed instance and setting clear bit
* staging: vc04_services: Fix an error code in vchiq_probe()
* scsi: mpt3sas: Fix kernel panic during expander reset
* scsi: aacraid: Insure we don't access PCIe space during AER/EEH
* scsi: qla4xxx: fix a potential NULL pointer dereference
* usb: usb251xb: fix to avoid potential NULL pointer dereference
* leds: trigger: netdev: fix refcnt leak on interface rename
* SUNRPC: fix uninitialized variable warning
* x86/realmode: Don't leak the trampoline kernel address
* usb: u132-hcd: fix resource leak
* ceph: fix use-after-free on symlink traversal
* scsi: zfcp: reduce flood of fcrscn1 trace records on multi-element RSCN
* x86/mm: Don't exceed the valid physical address space
* libata: fix using DMA buffers on stack
* kbuild: skip parsing pre sub-make code for recursion
* afs: Fix StoreData op marshalling
* gpio: of: Check propname before applying "cs-gpios" quirks
* gpio: of: Check for "spi-cs-high" in child instead of parent node
* KVM: nVMX: Do not inherit quadrant and invalid for the root shadow EPT
* KVM: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation)
* kvm/x86: Move MSR_IA32_ARCH_CAPABILITIES to array emulated_msrs
* x86/kvm/hyper-v: avoid spurious pending stimer on vCPU init
* KVM: selftests: assert on exit reason in CR4/cpuid sync test
* KVM: selftests: explicitly disable PIE for tests
* KVM: selftests: disable stack protector for all KVM tests
* KVM: selftests: complete IO before migrating guest state
* gpio: of: Fix of_gpiochip_add() error path
* nvme-multipath: relax ANA state check
* nvmet: fix building bvec from sg list
* nvmet: fix error flow during ns enable
* perf cs-etm: Add missing case value
* perf machine: Update kernel map address and re-order properly
* kconfig/[mn]conf: handle backspace (^H) key
* iommu/amd: Reserve exclusion range in iova-domain
* kasan: fix variable 'tag' set but not used warning
* ptrace: take into account saved_sigmask in PTRACE{GET,SET}SIGMASK
* leds: pca9532: fix a potential NULL pointer dereference
* leds: trigger: netdev: use memcpy in device_name_store
* Linux 5.0.12 |
|
2019-06-03 15:36:45 |
Kleber Sacilotto de Souza |
linux (Ubuntu Disco): status |
In Progress |
Fix Committed |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
linux (Ubuntu Disco): status |
Fix Committed |
Fix Released |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2018-12126 |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2018-12127 |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2018-12130 |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2019-11091 |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2019-11833 |
|
2019-07-23 05:25:24 |
Launchpad Janitor |
cve linked |
|
2019-11884 |
|