** Tags added: cscc

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1785710

Title:
  Cosmic update to 4.17.13 stable release

Status in linux package in Ubuntu:
  Fix Released

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.17.13 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the 4.17.13 stable release shall be
  applied:

              
  128642b28a7d Linux 4.17.13
  bced7cbdcc36 scsi: sg: fix minor memory leak in error path
  9d61d4bdf223 drm/atomic: Initialize variables in 
drm_atomic_helper_async_check() to make gcc happy
  3859ebae85c7 drm/atomic: Check old_plane_state->crtc in 
drm_atomic_helper_async_check()
  53a1cb1c35df drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar 
formats
  3f9bc0411d11 crypto: padlock-aes - Fix Nano workaround data corruption
  d432f2f0bf99 RDMA/uverbs: Expand primary and alt AV port checks
  afda82507fe2 brcmfmac: fix regression in parsing NVRAM for multiple devices
  b5c014661a41 iwlwifi: add more card IDs for 9000 series
  9559dd910cfa userfaultfd: remove uffd flags from vma->vm_flags if 
UFFD_EVENT_FORK fails
  80755071c18c ipc/shm.c add ->pagesize function to shm_vm_ops
  cbdef783b1a6 audit: fix potential null dereference 'context->module.name'
  aa0703c2e330 kvm: x86: vmx: fix vpid leak
  6557adc69262 x86/entry/64: Remove %ebx handling from error_entry/exit
  15265c81886b x86/apic: Future-proof the TSC_DEADLINE quirk for SKX
  d17111f7b41f x86/efi: Access EFI MMIO data as unencrypted when SEV is active
  c301e0b0a0f2 virtio_balloon: fix another race between migration and ballooning
  82d0d07a25eb net: socket: Fix potential spectre v1 gadget in 
sock_is_registered
  baaa0eb84e9a net: socket: fix potential spectre v1 gadget in socketcall
  e8445da5dfe0 can: ems_usb: Fix memory leak on ems_usb_disconnect()
  ca774ff89f46 squashfs: more metadata hardenings
  c14014186eef squashfs: more metadata hardening
  1c83fc5eeecc net/mlx5e: IPoIB, Set the netdevice sw mtu in ipoib enhanced flow
  e4cecd1c0611 net/mlx5e: Set port trust mode to PCP as default
  60406fbeb48d net/mlx5e: E-Switch, Initialize eswitch only if eswitch manager
  528e9fa8184b rxrpc: Fix user call ID check in rxrpc_service_prealloc_one
  6ee47da71bf7 net: stmmac: Fix WoL for PCI-based setups
  a927731692c7 netlink: Fix spectre v1 gadget in netlink_create()
  bfa48dc9a9f9 net: dsa: Do not suspend/resume closed slave_dev
  868d277f4142 ipv4: frags: handle possible skb truesize change
  e874d4ea8d24 inet: frag: enforce memory limits earlier
  e611b8fdde06 bonding: avoid lockdep confusion in bond_get_stats()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1785710/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to