[Kernel-packages] [Bug 1940315] Re: Bionic update: upstream stable patchset 2021-08-17

2021-09-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-159.167

---
linux (4.15.0-159.167) bionic; urgency=medium

  * Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (main/2021.09.06)

  * dell300x: rsi wifi and bluetooth crash after suspend and resume
(LP: #1940488)
- Revert "rsi: Use resume_noirq for SDIO"

  *  LRMv5: switch primary version handling to kernel-versions data set
(LP: #1928921)
- [Packaging] switch to kernel-versions

  * kvm_unit_tests: emulator test fails on 4.4 / 4.15 kernel, timeout
(LP: #1932966)
- kvm: Add emulation for movups/movupd

  * memory leaking when removing a profile (LP: #1939915)
- security/apparmor/label.c: Clean code by removing redundant instructions
- apparmor: Fix memory leak of profile proxy

  * ubunut_kernel_selftests: memory-hotplug: avoid spamming logs with
dump_page() (LP: #1941829)
- selftests: memory-hotplug: avoid spamming logs with dump_page(), ratio 
limit
  hot-remove error test

  * Bionic update: upstream stable patchset 2021-08-27 (LP: #1941916)
- btrfs: mark compressed range uptodate only if all bio succeed
- regulator: rt5033: Fix n_voltages settings for BUCK and LDO
- r8152: Fix potential PM refcount imbalance
- qed: fix possible unpaired spin_{un}lock_bh in _qed_mcp_cmd_and_union()
- net: Fix zero-copy head len calculation.
- Revert "Bluetooth: Shutdown controller after workqueues are flushed or
  cancelled"
- KVM: do not allow mapping valid but non-reference-counted pages
- Revert "watchdog: iTCO_wdt: Account for rebooting on second timeout"
- spi: mediatek: Fix fifo transfer
- padata: validate cpumask without removed CPU during offline
- Revert "ACPICA: Fix memory leak caused by _CID repair function"
- ALSA: seq: Fix racy deletion of subscriber
- clk: stm32f4: fix post divisor setup for I2S/SAI PLLs
- omap5-board-common: remove not physically existing vdds_1v8_main fixed-
  regulator
- scsi: sr: Return correct event when media event code is 3
- media: videobuf2-core: dequeue if start_streaming fails
- net: natsemi: Fix missing pci_disable_device() in probe and remove
- nfp: update ethtool reporting of pauseframe control
- mips: Fix non-POSIX regexp
- bnx2x: fix an error code in bnx2x_nic_load()
- net: pegasus: fix uninit-value in get_interrupt_interval
- net: fec: fix use-after-free in fec_drv_remove
- net: vxge: fix use-after-free in vxge_device_unregister
- Bluetooth: defer cleanup of resources in hci_unregister_dev()
- USB: usbtmc: Fix RCU stall warning
- USB: serial: option: add Telit FD980 composition 0x1056
- USB: serial: ch341: fix character loss at high transfer rates
- USB: serial: ftdi_sio: add device ID for Auto-M3 OP-COM v2
- usb: gadget: f_hid: added GET_IDLE and SET_IDLE handlers
- usb: gadget: f_hid: fixed NULL pointer dereference
- usb: gadget: f_hid: idle uses the highest byte for duration
- usb: otg-fsm: Fix hrtimer list corruption
- scripts/tracing: fix the bug that can't parse raw_trace_func
- staging: rtl8723bs: Fix a resource leak in sd_int_dpc
- media: rtl28xxu: fix zero-length control request
- pipe: increase minimum default pipe size to 2 pages
- ext4: fix potential htree corruption when growing large_dir directories
- serial: 8250: Mask out floating 16/32-bit bus bits
- MIPS: Malta: Do not byte-swap accesses to the CBUS UART
- pcmcia: i82092: fix a null pointer dereference bug
- spi: meson-spicc: fix memory leak in meson_spicc_remove
- perf/x86/amd: Don't touch the AMD64_EVENTSEL_HOSTONLY bit inside the guest
- qmi_wwan: add network device usage statistics for qmimux devices
- libata: fix ata_pio_sector for CONFIG_HIGHMEM
- reiserfs: add check for root_inode in reiserfs_fill_super
- reiserfs: check directory items on read from disk
- alpha: Send stop IPI to send to online CPUs
- net/qla3xxx: fix schedule while atomic in ql_wait_for_drvr_lock and
  ql_adapter_reset
- USB:ehci:fix Kunpeng920 ehci hardware problem
- ppp: Fix generating ppp unit id when ifname is not specified
- ovl: prevent private clone if bind mount is not allowed
- net: xilinx_emaclite: Do not print real IOMEM pointer
- KVM: x86: accept userspace interrupt only if no event is injected
- KVM: x86/mmu: Fix per-cpu counter corruption on 32-bit builds

  * Bionic update: upstream stable patchset 2021-08-17 (LP: #1940315)
- selftest: fix build error in tools/testing/selftests/vm/userfaultfd.c
- KVM: x86: determine if an exception has an error code only when injecting
  it.
- net: split out functions related to registering inflight socket files
- [Config] updateconfigs for UNIX_SCM
- af_unix: fix garbage collect vs MSG_PEEK
- net/802/mrp: fix memleak in mrp_request_join()
- net/802/garp: fix memleak in 

[Kernel-packages] [Bug 1940315] Re: Bionic update: upstream stable patchset 2021-08-17

2021-08-27 Thread Kelsey Skunberg
** Changed in: linux (Ubuntu Bionic)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1940315

Title:
  Bionic update: upstream stable patchset 2021-08-17

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Bionic:
  Fix Committed

Bug description:
  SRU Justification

  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree or
     a minimally backported form of that patch. The following upstream
     stable patches should be included in the Ubuntu kernel:

     upstream stable patchset 2021-08-17

  Ported from the following upstream stable releases:
  v4.14.242, v4.19.201

     from git://git.kernel.org/

  selftest: fix build error in tools/testing/selftests/vm/userfaultfd.c
  KVM: x86: determine if an exception has an error code only when injecting it.
  net: split out functions related to registering inflight socket files
  UBUNTU: [Config] updateconfigs for UNIX_SCM
  af_unix: fix garbage collect vs MSG_PEEK
  net/802/mrp: fix memleak in mrp_request_join()
  net/802/garp: fix memleak in garp_request_join()
  net: annotate data race around sk_ll_usec
  sctp: move 198 addresses from unusable to private scope
  hfs: add missing clean-up in hfs_fill_super
  hfs: fix high memory mapping in hfs_bnode_read
  hfs: add lock nesting notation to hfs_find_init
  ARM: dts: versatile: Fix up interrupt controller node names
  virtio_net: Do not pull payload in skb->head
  gro: ensure frag0 meets IP header alignment
  x86/kvm: fix vcpu-id indexed array sizes
  ocfs2: fix zero out valid data
  ocfs2: issue zeroout to EOF blocks
  can: raw: raw_setsockopt(): fix raw_rcv panic for sock UAF
  can: mcba_usb_start(): add missing urb->transfer_dma initialization
  can: usb_8dev: fix memory leak
  can: ems_usb: fix memory leak
  can: esd_usb2: fix memory leak
  NIU: fix incorrect error return, missed in previous revert
  nfc: nfcsim: fix use after free during module unload
  x86/asm: Ensure asm/proto.h can be included stand-alone
  cfg80211: Fix possible memory leak in function cfg80211_bss_update
  netfilter: conntrack: adjust stop timestamp to real expiry value
  netfilter: nft_nat: allow to specify layer 4 protocol NAT only
  tipc: fix sleeping in tipc accept routine
  mlx4: Fix missing error code in mlx4_load_one()
  net: llc: fix skb_over_panic
  net/mlx5: Fix flow table chaining
  sctp: fix return value check in __sctp_rcv_asconf_lookup
  tulip: windbond-840: Fix missing pci_disable_device() in probe and remove
  sis900: Fix missing pci_disable_device() in probe and remove
  can: hi311x: fix a signedness bug in hi3110_cmd()
  i40e: Fix log TC creation failure when max num of queues is exceeded
  i40e: Add additional info to PHY type error
  UBUNTU: upstream stable to v4.14.242, v4.19.201

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940315/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp