Focal update: v5.4.37 upstream stable release

Bug #1876765 reported by Kamal Mostafa on 2020-05-04
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Kamal Mostafa

Bug Description

SRU Justification

       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.4.37 upstream stable release
       from git://

remoteproc: Fix wrong rvring index computation
ubifs: Fix ubifs_tnc_lookup() usage in do_kill_orphans()
printk: queue wake_up_klogd irq_work only if per-CPU areas are ready
ASoC: stm32: sai: fix sai probe
usb: dwc3: gadget: Do link recovery for SS and SSP
kbuild: fix DT binding schema rule again to avoid needless rebuilds
usb: gadget: udc: bdc: Remove unnecessary NULL checks in bdc_req_complete
usb: gadget: udc: atmel: Fix vbus disconnect handling
afs: Make record checking use TASK_UNINTERRUPTIBLE when appropriate
afs: Fix to actually set AFS_SERVER_FL_HAVE_EPOCH
iio:ad7797: Use correct attribute_group
propagate_one(): mnt_set_mountpoint() needs mount_lock
counter: 104-quad-8: Add lock guards - generic interface
s390/ftrace: fix potential crashes when switching tracers
ASoC: q6dsp6: q6afe-dai: add missing channels to MI2S DAIs
ASoC: tas571x: disable regulators on failed probe
ASoC: wm8960: Fix wrong clock after suspend & resume
drivers: soc: xilinx: fix firmware driver Kconfig dependency
nfsd: memory corruption in nfsd4_lock()
bpf: Forbid XADD on spilled pointers for unprivileged users
i2c: altera: use proper variable to hold errno
rxrpc: Fix DATA Tx to disable nofrag for UDP on AF_INET6 socket
net/cxgb4: Check the return from t4_query_params properly
xfs: acquire superblock freeze protection on eofblocks scans
svcrdma: Fix trace point use-after-free race
svcrdma: Fix leak of svc_rdma_recv_ctxt objects
net/mlx5e: Don't trigger IRQ multiple times on XSK wakeup to avoid WQ overruns
net/mlx5e: Get the latest values from counters in switchdev mode
PCI: Add ACS quirk for Zhaoxin multi-function devices
PCI: Make ACS quirk implementations more uniform
PCI: Unify ACS quirk desired vs provided checking
PCI: Add Zhaoxin Vendor ID
PCI: Add ACS quirk for Zhaoxin Root/Downstream Ports
PCI: Move Apex Edge TPU class quirk to fix BAR assignment
ARM: dts: bcm283x: Disable dsi0 node
cpumap: Avoid warning when CONFIG_DEBUG_PER_CPU_MAPS is enabled
s390/pci: do not set affinity for floating irqs
net/mlx5: Fix failing fw tracer allocation on s390
sched/core: Fix reset-on-fork from RT with uclamp
perf/core: fix parent pid/tid in task exit events
netfilter: nat: fix error handling upon registering inet hook
PM: sleep: core: Switch back to async_schedule_dev()
blk-iocost: Fix error on iocost_ioc_vrate_adj
um: ensure `make ARCH=um mrproper` removes arch/$(SUBARCH)/include/generated/
bpf, x86_32: Fix incorrect encoding in BPF_LDX zero-extension
bpf, x86_32: Fix clobbering of dst for BPF_JSET
bpf, x86_32: Fix logic error in BPF_LDX zero-extension
mm: shmem: disable interrupt when acquiring info->lock in userfaultfd_copy path
xfs: clear PF_MEMALLOC before exiting xfsaild thread
bpf, x86: Fix encoding for lower 8-bit registers in BPF_STX BPF_B
libbpf: Initialize *nl_pid so gcc 10 is happy
net: fec: set GPR bit on suspend by DT configuration.
x86: hyperv: report value of misc_features
signal: check sig before setting info in kill_pid_usb_asyncio
afs: Fix length of dump of bad YFSFetchStatus record
xfs: fix partially uninitialized structure in xfs_reflink_remap_extent
ALSA: hda: Release resources at error in delayed probe
ALSA: hda: Keep the controller initialization even if no codecs found
ALSA: hda: Explicitly permit using autosuspend if runtime PM is supported
scsi: target: fix PR IN / READ FULL STATUS for FC
scsi: target: tcmu: reset_ring should reset TCMU_DEV_BIT_BROKEN
objtool: Fix CONFIG_UBSAN_TRAP unreachable warnings
objtool: Support Clang non-section symbols in ORC dump
xen/xenbus: ensure xenbus_map_ring_valloc() returns proper grant status
ALSA: hda: call runtime_allow() for all hda controllers
net: stmmac: socfpga: Allow all RGMII modes
mac80211: fix channel switch trigger from unknown mesh peer
arm64: Delete the space separator in __emit_inst
ext4: use matching invalidatepage in ext4_writepage
ext4: increase wait time needed before reuse of deleted inode numbers
ext4: convert BUG_ON's to WARN_ON's in mballoc.c
blk-mq: Put driver tag in blk_mq_dispatch_rq_list() when no budget
hwmon: (jc42) Fix name to have no illegal characters
taprio: do not use BIT() in TCA_TAPRIO_ATTR_FLAG_* definitions
qed: Fix race condition between scheduling and destroying the slowpath workqueue
Crypto: chelsio - Fixes a hang issue during driver registration
net: use indirect call wrappers for skb_copy_datagram_iter()
qed: Fix use after free in qed_chain_free
ext4: check for non-zero journal inum in ext4_calculate_overhead
ASoC: soc-core: disable route checks for legacy devices
ASoC: stm32: spdifrx: fix regmap status check
Linux 5.4.37

Changed in linux (Ubuntu):
status: New → Confirmed
tags: added: kernel-stable-tracking-bug
Changed in linux (Ubuntu Focal):
status: New → In Progress
assignee: nobody → Kamal Mostafa (kamalmostafa)
description: updated
Stefan Bader (smb) on 2020-05-14
Changed in linux (Ubuntu Focal):
status: In Progress → Fix Committed
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 5.4.0-37.41

linux (5.4.0-37.41) focal; urgency=medium

  * CVE-2020-0543
    - SAUCE: x86/speculation/spectre_v2: Exclude Zhaoxin CPUs from SPECTRE_V2
    - SAUCE: x86/cpu: Add a steppings field to struct x86_cpu_id
    - SAUCE: x86/cpu: Add 'table' argument to cpu_matches()
    - SAUCE: x86/speculation: Add Special Register Buffer Data Sampling (SRBDS)
    - SAUCE: x86/speculation: Add SRBDS vulnerability and mitigation documentation
    - SAUCE: x86/speculation: Add Ivy Bridge to affected list

 -- Marcelo Henrique Cerri <email address hidden> Wed, 03 Jun 2020 11:24:23 -0300

Changed in linux (Ubuntu Focal):
status: Fix Committed → Fix Released

All autopkgtests for the newly accepted linux-oracle-5.4 (5.4.0-1019.19~18.04.1) for bionic have finished running.
The following regressions have been reported in tests triggered by the package:

zfs-linux/unknown (armhf)

Please visit the excuses page listed below and investigate the failures, proceeding afterwards as per the StableReleaseUpdates policy regarding autopkgtest regressions [1].


Thank you!

Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 5.4.0-42.46

linux (5.4.0-42.46) focal; urgency=medium

  * focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)

  * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
    - SAUCE: Revert "netprio_cgroup: Fix unlimited memory leak of v2 cgroups"

linux (5.4.0-41.45) focal; urgency=medium

  * focal/linux: 5.4.0-41.45 -proposed tracker (LP: #1885855)

  * Packaging resync (LP: #1786013)
    - update dkms package versions

  * CVE-2019-19642
    - kernel/relay.c: handle alloc_percpu returning NULL in relay_open

  * CVE-2019-16089
    - SAUCE: nbd_genl_status: null check for nla_nest_start

  * CVE-2020-11935
    - aufs: do not call i_readcount_inc()

  * in net from ubuntu_kernel_selftests failed with 5.0 / 5.3 / 5.4
    kernel (LP: #1826848)
    - selftests: net: ip_defrag: ignore EPERM

  * Update lockdown patches (LP: #1884159)
    - SAUCE: acpi: disallow loading configfs acpi tables when locked down

  * seccomp_bpf fails on powerpc (LP: #1885757)
    - SAUCE: selftests/seccomp: fix ptrace tests on powerpc

  * Introduce the new NVIDIA 418-server and 440-server series, and update the
    current NVIDIA drivers (LP: #1881137)
    - [packaging] add signed modules for the 418-server and the 440-server

 -- Khalid Elmously <email address hidden> Thu, 09 Jul 2020 19:50:26 -0400

Changed in linux (Ubuntu):
status: Confirmed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers