2019-11-11 17:59:21 |
Connor Kuehl |
bug |
|
|
added bug |
2019-11-11 17:59:23 |
Connor Kuehl |
linux (Ubuntu): status |
New |
Confirmed |
|
2019-11-11 17:59:25 |
Connor Kuehl |
tags |
|
kernel-stable-tracking-bug |
|
2019-11-11 17:59:26 |
Connor Kuehl |
bug |
|
|
added subscriber SRU Verification |
2019-11-11 17:59:29 |
Connor Kuehl |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2019-11-11 17:59:32 |
Connor Kuehl |
nominated for series |
|
Ubuntu Xenial |
|
2019-11-11 17:59:33 |
Connor Kuehl |
bug task added |
|
linux (Ubuntu Xenial) |
|
2019-11-11 18:00:58 |
Connor Kuehl |
linux (Ubuntu Xenial): status |
New |
In Progress |
|
2019-11-11 18:01:00 |
Connor Kuehl |
linux (Ubuntu Xenial): importance |
Undecided |
Medium |
|
2019-11-11 18:01:01 |
Connor Kuehl |
linux (Ubuntu Xenial): assignee |
|
Connor Kuehl (connork) |
|
2019-11-11 18:01:04 |
Connor Kuehl |
linux (Ubuntu): status |
Confirmed |
Invalid |
|
2019-11-11 22:54:09 |
Connor Kuehl |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
4.4.200 upstream stable release
from git://git.kernel.org/
|
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
* kbuild: add -fcf-protection=none when using retpoline flags
* regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone
* regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized
* ASoc: rockchip: i2s: Fix RPM imbalance
* ARM: dts: logicpd-torpedo-som: Remove twl_keypad
* ARM: mm: fix alignment handler faults under memory pressure
* scsi: sni_53c710: fix compilation error
* scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE
* perf kmem: Fix memory leak in compact_gfp_flags()
* scsi: target: core: Do not overwrite CDB byte 1
* of: unittest: fix memory leak in unittest_data_add
* MIPS: bmips: mark exception vectors as char arrays
* cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs
* dccp: do not leak jiffies on the wire
* net: fix sk_page_frag() recursion from memory reclaim
* net: hisilicon: Fix ping latency when deal with high throughput
* Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()"
* net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
* net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
* vxlan: check tun_info options_len properly
* net/mlx4_core: Dynamically set guaranteed amount of counters per VF
* inet: stop leaking jiffies on the wire
* net/flow_dissector: switch to siphash
* dmaengine: qcom: bam_dma: Fix resource leak
* ARM: 8051/1: put_user: fix possible data corruption in put_user
* ARM: 8478/2: arm/arm64: add arm-smccc
* ARM: 8479/2: add implementation for arm-smccc
* ARM: 8480/2: arm64: add implementation for arm-smccc
* ARM: 8481/2: drivers: psci: replace psci firmware calls
* ARM: uaccess: remove put_user() code duplication
* ARM: Move system register accessors to asm/cp15.h
* arm/arm64: KVM: Advertise SMCCC v1.1
* arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
* firmware/psci: Expose PSCI conduit
* firmware/psci: Expose SMCCC version through psci_ops
* arm/arm64: smccc: Make function identifiers an unsigned quantity
* arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
* arm/arm64: smccc: Add SMCCC-specific return codes
* arm/arm64: smccc-1.1: Make return values unsigned long
* arm/arm64: smccc-1.1: Handle function result as parameters
* ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
* ARM: bugs: prepare processor bug infrastructure
* ARM: bugs: hook processor bug checking into SMP and suspend paths
* ARM: bugs: add support for per-processor bug checking
* ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
* ARM: spectre-v2: harden branch predictor on context switches
* ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
* ARM: spectre-v2: harden user aborts in kernel space
* ARM: spectre-v2: add firmware based hardening
* ARM: spectre-v2: warn about incorrect context switching functions
* ARM: spectre-v1: add speculation barrier (csdb) macros
* ARM: spectre-v1: add array_index_mask_nospec() implementation
* ARM: spectre-v1: fix syscall entry
* ARM: signal: copy registers using __copy_from_user()
* ARM: vfp: use __copy_from_user() when restoring VFP state
* ARM: oabi-compat: copy semops using __copy_from_user()
* ARM: use __inttype() in get_user()
* ARM: spectre-v1: use get_user() for __get_user()
* ARM: spectre-v1: mitigate user accesses
* ARM: 8789/1: signal: copy registers using __copy_to_user()
* ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state
* ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user()
* ARM: 8793/1: signal: replace __put_user_error with __put_user
* ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit
* ARM: 8795/1: spectre-v1.1: use put_user() for __put_user()
* ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization
* ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc
* ARM: make lookup_processor_type() non-__init
* ARM: split out processor lookup
* ARM: clean up per-processor check_bugs method call
* ARM: add PROC_VTABLE and PROC_TABLE macros
* ARM: spectre-v2: per-CPU vtables to work around big.Little systems
* ARM: ensure that processor vtables is not lost after boot
* ARM: fix the cockup in the previous patch
* alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP
* fs/dcache: move security_d_instantiate() behind attaching dentry to inode
* Linux 4.4.200
* UBUNTU: updateconfigs for Linux v4.4.200
* UBUNTU: upstream stable to v4.4.200
4.4.200 upstream stable release
from git://git.kernel.org/ |
|
2019-11-11 23:14:09 |
Connor Kuehl |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
* kbuild: add -fcf-protection=none when using retpoline flags
* regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone
* regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized
* ASoc: rockchip: i2s: Fix RPM imbalance
* ARM: dts: logicpd-torpedo-som: Remove twl_keypad
* ARM: mm: fix alignment handler faults under memory pressure
* scsi: sni_53c710: fix compilation error
* scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE
* perf kmem: Fix memory leak in compact_gfp_flags()
* scsi: target: core: Do not overwrite CDB byte 1
* of: unittest: fix memory leak in unittest_data_add
* MIPS: bmips: mark exception vectors as char arrays
* cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs
* dccp: do not leak jiffies on the wire
* net: fix sk_page_frag() recursion from memory reclaim
* net: hisilicon: Fix ping latency when deal with high throughput
* Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()"
* net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
* net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
* vxlan: check tun_info options_len properly
* net/mlx4_core: Dynamically set guaranteed amount of counters per VF
* inet: stop leaking jiffies on the wire
* net/flow_dissector: switch to siphash
* dmaengine: qcom: bam_dma: Fix resource leak
* ARM: 8051/1: put_user: fix possible data corruption in put_user
* ARM: 8478/2: arm/arm64: add arm-smccc
* ARM: 8479/2: add implementation for arm-smccc
* ARM: 8480/2: arm64: add implementation for arm-smccc
* ARM: 8481/2: drivers: psci: replace psci firmware calls
* ARM: uaccess: remove put_user() code duplication
* ARM: Move system register accessors to asm/cp15.h
* arm/arm64: KVM: Advertise SMCCC v1.1
* arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
* firmware/psci: Expose PSCI conduit
* firmware/psci: Expose SMCCC version through psci_ops
* arm/arm64: smccc: Make function identifiers an unsigned quantity
* arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
* arm/arm64: smccc: Add SMCCC-specific return codes
* arm/arm64: smccc-1.1: Make return values unsigned long
* arm/arm64: smccc-1.1: Handle function result as parameters
* ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
* ARM: bugs: prepare processor bug infrastructure
* ARM: bugs: hook processor bug checking into SMP and suspend paths
* ARM: bugs: add support for per-processor bug checking
* ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
* ARM: spectre-v2: harden branch predictor on context switches
* ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
* ARM: spectre-v2: harden user aborts in kernel space
* ARM: spectre-v2: add firmware based hardening
* ARM: spectre-v2: warn about incorrect context switching functions
* ARM: spectre-v1: add speculation barrier (csdb) macros
* ARM: spectre-v1: add array_index_mask_nospec() implementation
* ARM: spectre-v1: fix syscall entry
* ARM: signal: copy registers using __copy_from_user()
* ARM: vfp: use __copy_from_user() when restoring VFP state
* ARM: oabi-compat: copy semops using __copy_from_user()
* ARM: use __inttype() in get_user()
* ARM: spectre-v1: use get_user() for __get_user()
* ARM: spectre-v1: mitigate user accesses
* ARM: 8789/1: signal: copy registers using __copy_to_user()
* ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state
* ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user()
* ARM: 8793/1: signal: replace __put_user_error with __put_user
* ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit
* ARM: 8795/1: spectre-v1.1: use put_user() for __put_user()
* ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization
* ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc
* ARM: make lookup_processor_type() non-__init
* ARM: split out processor lookup
* ARM: clean up per-processor check_bugs method call
* ARM: add PROC_VTABLE and PROC_TABLE macros
* ARM: spectre-v2: per-CPU vtables to work around big.Little systems
* ARM: ensure that processor vtables is not lost after boot
* ARM: fix the cockup in the previous patch
* alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP
* fs/dcache: move security_d_instantiate() behind attaching dentry to inode
* Linux 4.4.200
* UBUNTU: updateconfigs for Linux v4.4.200
* UBUNTU: upstream stable to v4.4.200
4.4.200 upstream stable release
from git://git.kernel.org/ |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
* kbuild: add -fcf-protection=none when using retpoline flags
* regulator: ti-abb: Fix timeout in ti_abb_wait_txdone/ti_abb_clear_all_txdone
* regulator: pfuze100-regulator: Variable "val" in pfuze100_regulator_probe() could be uninitialized
* ASoc: rockchip: i2s: Fix RPM imbalance
* ARM: dts: logicpd-torpedo-som: Remove twl_keypad
* ARM: mm: fix alignment handler faults under memory pressure
* scsi: sni_53c710: fix compilation error
* scsi: fix kconfig dependency warning related to 53C700_LE_ON_BE
* perf kmem: Fix memory leak in compact_gfp_flags()
* scsi: target: core: Do not overwrite CDB byte 1
* of: unittest: fix memory leak in unittest_data_add
* MIPS: bmips: mark exception vectors as char arrays
* cifs: Fix cifsInodeInfo lock_sem deadlock when reconnect occurs
* dccp: do not leak jiffies on the wire
* net: fix sk_page_frag() recursion from memory reclaim
* net: hisilicon: Fix ping latency when deal with high throughput
* UBUNTU: SAUCE: Revert "net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()"
* net: Zeroing the structure ethtool_wolinfo in ethtool_get_wol()
* net: add READ_ONCE() annotation in __skb_wait_for_more_packets()
* vxlan: check tun_info options_len properly
* net/mlx4_core: Dynamically set guaranteed amount of counters per VF
* inet: stop leaking jiffies on the wire
* net/flow_dissector: switch to siphash
* dmaengine: qcom: bam_dma: Fix resource leak
* ARM: 8051/1: put_user: fix possible data corruption in put_user
* ARM: 8478/2: arm/arm64: add arm-smccc
* ARM: 8479/2: add implementation for arm-smccc
* ARM: 8480/2: arm64: add implementation for arm-smccc
* ARM: 8481/2: drivers: psci: replace psci firmware calls
* ARM: uaccess: remove put_user() code duplication
* ARM: Move system register accessors to asm/cp15.h
* arm/arm64: KVM: Advertise SMCCC v1.1
* arm64: KVM: Report SMCCC_ARCH_WORKAROUND_1 BP hardening support
* firmware/psci: Expose PSCI conduit
* firmware/psci: Expose SMCCC version through psci_ops
* arm/arm64: smccc: Make function identifiers an unsigned quantity
* arm/arm64: smccc: Implement SMCCC v1.1 inline primitive
* arm/arm64: smccc: Add SMCCC-specific return codes
* arm/arm64: smccc-1.1: Make return values unsigned long
* arm/arm64: smccc-1.1: Handle function result as parameters
* ARM: add more CPU part numbers for Cortex and Brahma B15 CPUs
* ARM: bugs: prepare processor bug infrastructure
* ARM: bugs: hook processor bug checking into SMP and suspend paths
* ARM: bugs: add support for per-processor bug checking
* ARM: spectre: add Kconfig symbol for CPUs vulnerable to Spectre
* ARM: spectre-v2: harden branch predictor on context switches
* ARM: spectre-v2: add Cortex A8 and A15 validation of the IBE bit
* ARM: spectre-v2: harden user aborts in kernel space
* ARM: spectre-v2: add firmware based hardening
* ARM: spectre-v2: warn about incorrect context switching functions
* ARM: spectre-v1: add speculation barrier (csdb) macros
* ARM: spectre-v1: add array_index_mask_nospec() implementation
* ARM: spectre-v1: fix syscall entry
* ARM: signal: copy registers using __copy_from_user()
* ARM: vfp: use __copy_from_user() when restoring VFP state
* ARM: oabi-compat: copy semops using __copy_from_user()
* ARM: use __inttype() in get_user()
* ARM: spectre-v1: use get_user() for __get_user()
* ARM: spectre-v1: mitigate user accesses
* ARM: 8789/1: signal: copy registers using __copy_to_user()
* ARM: 8791/1: vfp: use __copy_to_user() when saving VFP state
* ARM: 8792/1: oabi-compat: copy oabi events using __copy_to_user()
* ARM: 8793/1: signal: replace __put_user_error with __put_user
* ARM: 8794/1: uaccess: Prevent speculative use of the current addr_limit
* ARM: 8795/1: spectre-v1.1: use put_user() for __put_user()
* ARM: 8796/1: spectre-v1,v1.1: provide helpers for address sanitization
* ARM: 8810/1: vfp: Fix wrong assignement to ufp_exc
* ARM: make lookup_processor_type() non-__init
* ARM: split out processor lookup
* ARM: clean up per-processor check_bugs method call
* ARM: add PROC_VTABLE and PROC_TABLE macros
* ARM: spectre-v2: per-CPU vtables to work around big.Little systems
* ARM: ensure that processor vtables is not lost after boot
* ARM: fix the cockup in the previous patch
* alarmtimer: Change remaining ENOTSUPP to EOPNOTSUPP
* fs/dcache: move security_d_instantiate() behind attaching dentry to inode
* Linux 4.4.200
* UBUNTU: updateconfigs for Linux v4.4.200
* UBUNTU: upstream stable to v4.4.200
4.4.200 upstream stable release
from git://git.kernel.org/ |
|
2019-11-12 03:44:03 |
Khaled El Mously |
linux (Ubuntu Xenial): status |
In Progress |
Fix Committed |
|
2019-12-02 14:09:56 |
Launchpad Janitor |
linux (Ubuntu Xenial): status |
Fix Committed |
Fix Released |
|
2019-12-02 14:09:56 |
Launchpad Janitor |
cve linked |
|
2018-20784 |
|