** Changed in: linux (Ubuntu Bionic)
       Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1905333

Title:
  Bionic update: upstream stable patchset 2020-11-23

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         upstream stable patchset 2020-11-23

                  Ported from the following upstream stable releases:
                          v4.14.205, v4.19.156

         from git://git.kernel.org/

  drm/i915: Break up error capture compression loops with cond_resched()
  tipc: fix use-after-free in tipc_bcast_get_mode
  gianfar: Replace skb_realloc_headroom with skb_cow_head for PTP
  gianfar: Account for Tx PTP timestamp in the skb headroom
  net: usb: qmi_wwan: add Telit LE910Cx 0x1230 composition
  sctp: Fix COMM_LOST/CANT_STR_ASSOC err reporting on big-endian platforms
  sfp: Fix error handing in sfp_probe()
  Blktrace: bail out early if block debugfs is not configured
  blktrace: fix debugfs use after free
  i40e: Fix of memory leak and integer truncation in i40e_virtchnl.c
  Fonts: Replace discarded const qualifier
  ALSA: usb-audio: Add implicit feedback quirk for Qu-16
  lib/crc32test: remove extra local_irq_disable/enable
  kthread_worker: prevent queuing delayed work from timer_fn when it is being 
canceled
  mm: always have io_remap_pfn_range() set pgprot_decrypted()
  gfs2: Wake up when sd_glock_disposal becomes zero
  ftrace: Fix recursion check for NMI test
  ftrace: Handle tracing when switching between context
  tracing: Fix out of bounds write in get_trace_buf
  futex: Handle transient "ownerless" rtmutex state correctly
  ARM: dts: sun4i-a10: fix cpu_alert temperature
  x86/kexec: Use up-to-dated screen_info copy to fill boot params
  of: Fix reserved-memory overlap detection
  blk-cgroup: Fix memleak on error path
  blk-cgroup: Pre-allocate tree node on blkg_conf_prep
  scsi: core: Don't start concurrent async scan on same host
  vsock: use ns_capable_noaudit() on socket create
  drm/vc4: drv: Add error handding for bind
  ACPI: NFIT: Fix comparison to '-ENXIO'
  vt: Disable KD_FONT_OP_COPY
  fork: fix copy_process(CLONE_PARENT) race with the exiting ->real_parent
  serial: 8250_mtk: Fix uart_get_baud_rate warning
  serial: txx9: add missing platform_driver_unregister() on error in 
serial_txx9_init
  USB: serial: cyberjack: fix write-URB completion race
  USB: serial: option: add Quectel EC200T module support
  USB: serial: option: add LE910Cx compositions 0x1203, 0x1230, 0x1231
  USB: serial: option: add Telit FN980 composition 0x1055
  USB: Add NO_LPM quirk for Kingston flash drive
  usb: mtu3: fix panic in mtu3_gadget_stop()
  ARC: stack unwinding: avoid indefinite looping
  Revert "ARC: entry: fix potential EFA clobber when TIF_SYSCALL_TRACE"
  PM: runtime: Resume the device earlier in __device_release_driver()
  btrfs: extent_io: add proper error handling to lock_extent_buffer_for_io()
  Btrfs: fix unwritten extent buffers and hangs on future writeback attempts
  btrfs: tree-checker: fix the error message for transid error
  mm: mempolicy: fix potential pte_unmap_unlock pte error
  tools: perf: Fix build error in v4.19.y
  net: dsa: read mac address from DT for slave device
  arm64: dts: marvell: espressobin: Add ethernet switch aliases
  UBUNTU: upstream stable to v4.14.205, v4.19.156

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1905333/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to