2021-11-17 16:46:55 |
Kamal Mostafa |
bug |
|
|
added bug |
2021-11-17 16:46:57 |
Kamal Mostafa |
linux (Ubuntu): status |
New |
Confirmed |
|
2021-11-17 16:46:58 |
Kamal Mostafa |
tags |
|
kernel-stable-tracking-bug |
|
2021-11-17 16:47:00 |
Kamal Mostafa |
bug |
|
|
added subscriber SRU Verification |
2021-11-17 16:47:02 |
Kamal Mostafa |
bug |
|
|
added subscriber Ubuntu Stable Release Updates Team |
2021-11-17 16:47:06 |
Kamal Mostafa |
nominated for series |
|
Ubuntu Focal |
|
2021-11-17 16:47:07 |
Kamal Mostafa |
bug task added |
|
linux (Ubuntu Focal) |
|
2021-11-17 16:47:25 |
Kamal Mostafa |
linux (Ubuntu Focal): status |
New |
In Progress |
|
2021-11-17 16:47:27 |
Kamal Mostafa |
linux (Ubuntu Focal): importance |
Undecided |
Medium |
|
2021-11-17 16:47:29 |
Kamal Mostafa |
linux (Ubuntu Focal): assignee |
|
Kamal Mostafa (kamalmostafa) |
|
2021-11-17 16:47:32 |
Kamal Mostafa |
linux (Ubuntu): status |
Confirmed |
Invalid |
|
2021-11-17 16:51:49 |
Kamal Mostafa |
summary |
Focal update: next upstream stable release |
Focal update: v5.4.154 upstream stable release |
|
2021-11-17 17:23:43 |
Kamal Mostafa |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
next upstream stable release
from git://git.kernel.org/
|
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
next upstream stable release
from git://git.kernel.org/
net: phy: bcm7xxx: Fixed indirect MMD operations
ext4: correct the error path of ext4_write_inline_data_end()
HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS
netfilter: ip6_tables: zero-initialize fragment offset
HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs
netfilter: nf_nat_masquerade: make async masq_inet6_event handling generic
netfilter: nf_nat_masquerade: defer conntrack walk to work queue
mac80211: Drop frames from invalid MAC address in ad-hoc mode
m68k: Handle arrivals of multiple signals correctly
net: prevent user from passing illegal stab size
mac80211: check return value of rhashtable_init
net: sun: SUNVNET_COMMON should depend on INET
drm/amdgpu: fix gart.bo pin_count leak
scsi: ses: Fix unsigned comparison with less than zero
scsi: virtio_scsi: Fix spelling mistake "Unsupport" -> "Unsupported"
sched: Always inline is_percpu_thread()
Linux 5.4.154
UBUNTU: upstream stable to v5.4.154 |
|
2021-11-17 17:25:36 |
Kamal Mostafa |
description |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
next upstream stable release
from git://git.kernel.org/
net: phy: bcm7xxx: Fixed indirect MMD operations
ext4: correct the error path of ext4_write_inline_data_end()
HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS
netfilter: ip6_tables: zero-initialize fragment offset
HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs
netfilter: nf_nat_masquerade: make async masq_inet6_event handling generic
netfilter: nf_nat_masquerade: defer conntrack walk to work queue
mac80211: Drop frames from invalid MAC address in ad-hoc mode
m68k: Handle arrivals of multiple signals correctly
net: prevent user from passing illegal stab size
mac80211: check return value of rhashtable_init
net: sun: SUNVNET_COMMON should depend on INET
drm/amdgpu: fix gart.bo pin_count leak
scsi: ses: Fix unsigned comparison with less than zero
scsi: virtio_scsi: Fix spelling mistake "Unsupport" -> "Unsupported"
sched: Always inline is_percpu_thread()
Linux 5.4.154
UBUNTU: upstream stable to v5.4.154 |
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v5.4.154 upstream stable release
from git://git.kernel.org/
net: phy: bcm7xxx: Fixed indirect MMD operations
ext4: correct the error path of ext4_write_inline_data_end()
HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS
netfilter: ip6_tables: zero-initialize fragment offset
HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs
netfilter: nf_nat_masquerade: make async masq_inet6_event handling generic
netfilter: nf_nat_masquerade: defer conntrack walk to work queue
mac80211: Drop frames from invalid MAC address in ad-hoc mode
m68k: Handle arrivals of multiple signals correctly
net: prevent user from passing illegal stab size
mac80211: check return value of rhashtable_init
net: sun: SUNVNET_COMMON should depend on INET
drm/amdgpu: fix gart.bo pin_count leak
scsi: ses: Fix unsigned comparison with less than zero
scsi: virtio_scsi: Fix spelling mistake "Unsupport" -> "Unsupported"
sched: Always inline is_percpu_thread()
Linux 5.4.154
UBUNTU: upstream stable to v5.4.154 |
|
2021-11-22 13:27:16 |
Stefan Bader |
linux (Ubuntu Focal): status |
In Progress |
Fix Committed |
|
2022-01-04 14:28:24 |
Launchpad Janitor |
linux (Ubuntu Focal): status |
Fix Committed |
Fix Released |
|
2022-01-04 14:28:24 |
Launchpad Janitor |
cve linked |
|
2020-26541 |
|
2022-01-04 14:28:24 |
Launchpad Janitor |
cve linked |
|
2021-4002 |
|