** Changed in: linux (Ubuntu Eoan)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1880758

Title:
  Eoan update: upstream stable patchset 2020-05-26

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Eoan:
  Fix Committed

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         upstream stable patchset 2020-05-26

                  Ported from the following upstream stable releases:
                          v4.19.123, v5.4.41

         from git://git.kernel.org/

  USB: serial: qcserial: Add DW5816e support
  tracing/kprobes: Fix a double initialization typo
  vt: fix unicode console freeing with a common interface
  dp83640: reverse arguments to list_add_tail
  fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks
  net: macsec: preserve ingress frame ordering
  net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
  net_sched: sch_skbprio: add message validation to skbprio_change()
  net: usb: qmi_wwan: add support for DW5816e
  sch_choke: avoid potential panic in choke_reset()
  sch_sfq: validate silly quantum values
  tipc: fix partial topology connection closure
  bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features().
  net/mlx5: Fix forced completion access non initialized command entry
  net/mlx5: Fix command entry leak in Internal Error State
  bnxt_en: Improve AER slot reset.
  bnxt_en: Fix VF anti-spoof filter setup.
  net: stricter validation of untrusted gso packets
  HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices
  sctp: Fix bundling of SHUTDOWN with COOKIE-ACK
  HID: usbhid: Fix race between usbhid_close() and usbhid_stop()
  USB: uas: add quirk for LaCie 2Big Quadra
  USB: serial: garmin_gps: add sanity checking for data length
  tracing: Add a vmalloc_sync_mappings() for safe measure
  KVM: arm: vgic: Fix limit condition when writing to GICD_I[CS]ACTIVER
  KVM: arm64: Fix 32bit PC wrap-around
  arm64: hugetlb: avoid potential NULL dereference
  mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous()
  staging: gasket: Check the return value of gasket_get_bar_index()
  coredump: fix crash when umh is disabled
  batman-adv: fix batadv_nc_random_weight_tq
  batman-adv: Fix refcnt leak in batadv_show_throughput_override
  batman-adv: Fix refcnt leak in batadv_store_throughput_override
  batman-adv: Fix refcnt leak in batadv_v_ogm_process
  x86/entry/64: Fix unwind hints in register clearing code
  x86/entry/64: Fix unwind hints in kernel exit path
  x86/entry/64: Fix unwind hints in rewind_stack_do_exit()
  x86/unwind/orc: Don't skip the first frame for inactive tasks
  x86/unwind/orc: Prevent unwinding before ORC initialization
  x86/unwind/orc: Fix error path for bad ORC entry type
  x86/unwind/orc: Fix premature unwind stoppage due to IRET frames
  netfilter: nat: never update the UDP checksum when it's 0
  netfilter: nf_osf: avoid passing pointer to local var
  objtool: Fix stack offset tracking for indirect CFAs
  scripts/decodecode: fix trapping instruction formatting
  ipc/mqueue.c: change __do_notify() to bypass check_kill_permission()
  net: macb: Fix runtime PM refcounting
  drm/amdgpu: move kfd suspend after ip_suspend_phase1
  drm/amdgpu: drop redundant cg/pg ungate on runpm enter
  tty: xilinx_uartps: Fix missing id assignment to the console
  devlink: fix return value after hitting end in region read
  ipv6: Use global sernum for dst validation with nexthop objects
  mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly
  neigh: send protocol value in neighbor create notification
  net: dsa: Do not leave DSA master with NULL netdev_ops
  net: macb: fix an issue about leak related system resources
  net: tc35815: Fix phydev supported/advertising mask
  net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict()
  net/tls: Fix sk_psock refcnt leak when in tls_data_ready()
  nfp: abm: fix a memory leak bug
  tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040
  bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF.
  bnxt_en: Return error when allocating zero size context memory.
  net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx()
  net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del()
  Revert "HID: wacom: generic: read the number of expected touches on a per 
collection basis"
  HID: wacom: Report 2nd-gen Intuos Pro S center button status over BT
  crypto: arch/nhpoly1305 - process in explicit 4k chunks
  KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction
  KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path
  drm: ingenic-drm: add MODULE_DEVICE_TABLE
  epoll: atomically remove wait entry on wake up
  eventpoll: fix missing wakeup for ovflist in ep_poll_callback
  mm: limit boost_watermark on small zones
  ceph: fix endianness bug when handling MDS session feature bits
  ceph: demote quotarealm lookup warning to a debug message
  riscv: set max_pfn to the PFN of the last page
  KVM: x86: Fixes posted interrupt check for IRQs delivery modes
  arch/x86/kvm/svm/sev.c: change flag passed to GUP fast in sev_pin_memory()
  iommu/virtio: Reverse arguments to list_add
  mm, memcg: fix error return value of mem_cgroup_css_alloc()
  fsnotify: replace inode pointer with an object id
  fanotify: merge duplicate events on parent and child
  UBUNTU: upstream stable to v4.19.123, v5.4.41

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1880758/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to