Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The 3.0.62 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the 3.0.62 stable release: can: c_can: fix invalid error codes can: ti_hecc: fix invalid error codes can: pch_can: fix invalid error codes fs/cifs/cifs_dfs_ref.c: fix potential memory leakage ARM: DMA: Fix struct page iterator in dma_cache_maint() to work with sparsemem Bluetooth: Fix sending HCI commands after reset ath9k_htc: Fix memory leak ath9k: fix double-free bug on beacon generate failure ALSA: usb-audio: fix invalid length check for RME and other UAC 2 devices EDAC: Test correct variable in ->store function Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() smp: Fix SMP function call empty cpu mask race x86/msr: Add capabilities check efi, x86: Pass a proper identity mapping in efi_call_phys_prelog x86/Sandy Bridge: Sandy Bridge workaround depends on CONFIG_PCI Linux 3.0.62 ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Oneiric) Importance: Medium Assignee: Herton R. Krzesinski (herton) Status: Fix Committed ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Oneiric) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from Linus' tree or in a minimally + backported form of that patch. The 3.0.62 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from Linus' tree or in a minimally - backported form of that patch. The 3.0.62 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches are in the 3.0.62 stable release: - The following patches are in the 3.0.62 stable release: + can: c_can: fix invalid error codes + can: ti_hecc: fix invalid error codes + can: pch_can: fix invalid error codes + fs/cifs/cifs_dfs_ref.c: fix potential memory leakage + ARM: DMA: Fix struct page iterator in dma_cache_maint() to work with sparsemem + Bluetooth: Fix sending HCI commands after reset + ath9k_htc: Fix memory leak + ath9k: fix double-free bug on beacon generate failure + ALSA: usb-audio: fix invalid length check for RME and other UAC 2 devices + EDAC: Test correct variable in ->store function + Bluetooth: Fix incorrect strncpy() in hidp_setup_hid() + smp: Fix SMP function call empty cpu mask race + x86/msr: Add capabilities check + efi, x86: Pass a proper identity mapping in efi_call_phys_prelog + x86/Sandy Bridge: Sandy Bridge workaround depends on CONFIG_PCI + Linux 3.0.62 ** Changed in: linux (Ubuntu) Status: New => Invalid ** Changed in: linux (Ubuntu Oneiric) Status: New => Fix Committed ** Changed in: linux (Ubuntu Oneiric) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Oneiric) Assignee: (unassigned) => Herton R. Krzesinski (herton) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1116259 Title: Oneiric update to 3.0.62 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1116259/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs