** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() + * block, bfq: deschedule empty bfq_queues not referred by any process + * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() + * mm/memory_hotplug: fix updating the node span + * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault + * fbdev: Ditch fb_edid_add_monspecs + * Linux 5.3.13 + * UBUNTU: upstream stable to v5.3.13 - 5.3.13 upstream stable release - from git://git.kernel.org/ + 5.3.13 upstream stable release + from git://git.kernel.org/
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1853882 Title: Eoan update: 5.3.13 upstream stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Eoan: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size() * block, bfq: deschedule empty bfq_queues not referred by any process * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span() * mm/memory_hotplug: fix updating the node span * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault * fbdev: Ditch fb_edid_add_monspecs * Linux 5.3.13 * UBUNTU: upstream stable to v5.3.13 5.3.13 upstream stable release from git://git.kernel.org/ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp