** Changed in: linux (Ubuntu Trusty) Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) => Seth Forshee (sforshee) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1419837 Title: Trusty update to v3.13.11-ckt14 stable release Status in linux package in Ubuntu: Confirmed Status in linux source package in Trusty: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from Linus' tree or in a minimally backported form of that patch. The v3.13.11-ckt14 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches are in the v3.13.11-ckt14 stable release: [3.13-stable only] ipv6: fix swapped ipv4/ipv6 mtu_reduced callbacks usb: gadget: at91_udc: move prepare clk into process context [3.13-stable only] KVM: x86: Fix far-jump to non-canonical check x86/tls: Validate TLS entries to protect espfix userns: Check euid no fsuid when establishing an unprivileged uid mapping userns: Document what the invariant required for safe unprivileged mappings. userns: Only allow the creator of the userns unprivileged mappings x86_64, switch_to(): Load TLS descriptors before switching DS and ES isofs: Fix infinite looping over CE entries batman-adv: Calculate extra tail size based on queued fragments KEYS: close race between key lookup and freeing isofs: Fix unchecked printing of ER records x86_64, vdso: Fix the vdso address randomization algorithm groups: Consolidate the setgroups permission checks userns: Don't allow setgroups until a gid mapping has been setablished userns: Don't allow unprivileged creation of gid mappings move d_rcu from overlapping d_child to overlapping d_alias deal with deadlock in d_walk() Linux 3.13.11-ckt14 The following patches were already applied to the Trusty kernel: e1000e: Fix no connectivity when driver loaded with cable out To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1419837/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp