** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from Linus' tree or in a minimally + backported form of that patch. The 2.6.32.65 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from Linus' tree or in a minimally - backported form of that patch. The 2.6.32.65 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches are in the 2.6.32.65 stable release: - The following patches are in the 2.6.32.65 stable release: + x86, 64-bit: Move K8 B step iret fixup to fault entry asm + x86-64: Adjust frame type at paranoid_exit: + x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels + x86-32, espfix: Remove filter for espfix32 due to race + x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack + x86, espfix: Move espfix definitions into a separate header file + x86, espfix: Fix broken header guard + x86, espfix: Make espfix64 a Kconfig option, fix UML + x86, espfix: Make it possible to disable 16-bit support + x86_64/entry/xen: Do not invoke espfix64 on Xen + x86/espfix/xen: Fix allocation of pages for paravirt page tables + x86_64, traps: Stop using IST for #SS + x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C + x86_64, traps: Rework bad_iret + + The following patches from the stable release have been dropped (some + were actually already applied to Lucid): + + net: sendmsg: fix failed backport of "fix NULL pointer dereference" + net/l2tp: don't fall back on UDP [get|set]sockopt + ALSA: control: Don't access controls outside of protected regions + ALSA: control: Fix replacing user controls + USB: whiteheat: Added bounds checking for bulk command response + net: sctp: fix panic on duplicate ASCONF chunks + net: sctp: fix remote memory pressure from excessive queueing + udf: Avoid infinite loop when processing indirect ICBs + net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet + mac80211: fix fragmentation code, particularly for encryption + ttusb-dec: buffer overflow in ioctl + vlan: Don't propagate flag changes on down interfaces. + sctp: Fix double-free introduced by bad backport in 2.6.32.62 + md/raid6: Fix misapplied backport in 2.6.32.64 + block: add missing blk_queue_dead() checks + block: Fix blk_execute_rq_nowait() dead queue handling + cciss: Fix misapplied "cciss: fix info leak in cciss_ioctl32_passthru()" + proc connector: Delete spurious memset in proc_exit_connector() + Linux 2.6.32.65
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1403918 Title: Lucid update to 2.6.32.65 stable release Status in linux package in Ubuntu: New Status in linux source package in Lucid: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 2.6.32.65 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 2.6.32.65 stable release: x86, 64-bit: Move K8 B step iret fixup to fault entry asm x86-64: Adjust frame type at paranoid_exit: x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels x86-32, espfix: Remove filter for espfix32 due to race x86-64, espfix: Don't leak bits 31:16 of %esp returning to 16-bit stack x86, espfix: Move espfix definitions into a separate header file x86, espfix: Fix broken header guard x86, espfix: Make espfix64 a Kconfig option, fix UML x86, espfix: Make it possible to disable 16-bit support x86_64/entry/xen: Do not invoke espfix64 on Xen x86/espfix/xen: Fix allocation of pages for paravirt page tables x86_64, traps: Stop using IST for #SS x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C x86_64, traps: Rework bad_iret The following patches from the stable release have been dropped (some were actually already applied to Lucid): net: sendmsg: fix failed backport of "fix NULL pointer dereference" net/l2tp: don't fall back on UDP [get|set]sockopt ALSA: control: Don't access controls outside of protected regions ALSA: control: Fix replacing user controls USB: whiteheat: Added bounds checking for bulk command response net: sctp: fix panic on duplicate ASCONF chunks net: sctp: fix remote memory pressure from excessive queueing udf: Avoid infinite loop when processing indirect ICBs net: sctp: fix NULL pointer dereference in af->from_addr_param on malformed packet mac80211: fix fragmentation code, particularly for encryption ttusb-dec: buffer overflow in ioctl vlan: Don't propagate flag changes on down interfaces. sctp: Fix double-free introduced by bad backport in 2.6.32.62 md/raid6: Fix misapplied backport in 2.6.32.64 block: add missing blk_queue_dead() checks block: Fix blk_execute_rq_nowait() dead queue handling cciss: Fix misapplied "cciss: fix info leak in cciss_ioctl32_passthru()" proc connector: Delete spurious memset in proc_exit_connector() Linux 2.6.32.65 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1403918/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp