** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from Linus' tree or in a minimally
+        backported form of that patch. The 3.11.7 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from Linus' tree or in a minimally
-        backported form of that patch. The 3.11.7 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches are in the 3.11.7 stable release:
+        The following patches are in the 3.11.7 stable release:
+             Linux 3.11.7
+             usb: serial: option: blacklist Olivetti Olicard200
+             USB: serial: option: add support for Inovia SEW858 device
+             USB: serial: ti_usb_3410_5052: add Abbott strip port ID to 
combined table as well.
+             serial: vt8500: add missing braces
+             wireless: cw1200: acquire hwbus lock around cw1200_irq_handler() 
call.
+             wireless: radiotap: fix parsing buffer overrun
+             w1 - call request_module with w1 master mutex unlocked
+             writeback: fix negative bdi max pause
+             ALSA: hda - Fix inverted internal mic not indicated on some 
machines
+             ALSA: us122l: Fix pcm_usb_stream mmapping regression
+             mm: fix BUG in __split_huge_page_pmd
+             mm/zswap: bugfix: memory leak when re-swapon
+             mm: migration: do not lose soft dirty bit if page is in migration 
state
+             i2c: ismt: initialize DMA buffer
+             dm snapshot: fix data corruption
+             gpio/lynxpoint: check if the interrupt is enabled in IRQ handler
+             ext[34]: fix double put in tmpfile
+             ARM: integrator: deactivate timer0 on the Integrator/CP
+             ARM: 7851/1: check for number of arguments in 
syscall_get/set_arguments()
+             davinci_emac.c: Fix IFF_ALLMULTI setup
+             ipv6: probe routes asynchronous in rt6_probe
+             netfilter: nf_conntrack: fix rt6i_gateway checks for H.323 helper
+             ipv6: fill rt6i_gateway with nexthop address
+             ipv6: always prefer rt6i_gateway if present
+             inet: fix possible memory corruption with UDP_CORK and UFO
+             net: fix cipso packet validation when !NETLABEL
+             net: unix: inherit SOCK_PASS{CRED, SEC} flags from socket to fix 
race
+             be2net: pass if_id for v1 and V2 versions of TX_CREATE cmd
+             wanxl: fix info leak in ioctl
+             sctp: Perform software checksum if packet has to be fragmented.
+             sctp: Use software crc32 checksum when xfrm transform will happen.
+             net: dst: provide accessor function to dst->xfrm
+             bridge: Correctly clamp MAX forward_delay when enabling STP
+             virtio-net: refill only when device is up during setting queues
+             virtio-net: don't respond to cpu hotplug notifier if we're not 
ready
+             bnx2x: record rx queue for LRO packets
+             connector: use nlmsg_len() to check message length
+             unix_diag: fix info leak
+             farsync: fix info leak in ioctl
+             netem: free skb's in tree on reset
+             netem: update backlog after drop
+             l2tp: must disable bh before calling l2tp_xmit_skb()
+             vti: get rid of nf mark rule in prerouting
+             Revert "bridge: only expire the mdb entry when query is received"
+             bridge: update mdb expiration timer upon reports.
+             net: vlan: fix nlmsg size calculation in vlan_get_size()
+             net/mlx4_en: Fix pages never dma unmapped on rx
+             net/mlx4_en: Rename name of mlx4_en_rx_alloc members
+             xen-netback: Don't destroy the netdev until the vif is shut down
+             net: secure_seq: Fix warning when CONFIG_IPV6 and CONFIG_INET are 
not selected
+             can: dev: fix nlmsg size calculation in can_get_size()
+             ipv4: fix ineffective source address selection
+             proc connector: fix info leaks
+             sit: amend "allow to use rtnl ops on fb tunnel"
+             net: heap overflow in __audit_sockaddr()
+             net: mv643xx_eth: fix orphaned statistics timer crash
+             net: mv643xx_eth: update statistics timer from timer context only
+             l2tp: Fix build warning with ipv6 disabled.
+             l2tp: fix kernel panic when using IPv4-mapped IPv6 addresses
+             batman-adv: set up network coding packet handlers during module 
init
+             net: do not call sock_put() on TIMEWAIT sockets
+             tcp: fix incorrect ca_state in tail loss probe
+             tcp: do not forget FIN in tcp_shifted_skb()
+             tcp: must unclone packets before mangling them
+             tcp: TSQ can use a dynamic limit
+             tcp: TSO packets automatic sizing

** Changed in: linux (Ubuntu Saucy)
       Status: New => In Progress

** Changed in: linux (Ubuntu Saucy)
   Importance: Undecided => High

** Changed in: linux (Ubuntu Saucy)
     Assignee: (unassigned) => Brad Figg (brad-figg)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1249081

Title:
  Saucy update to 3.11.7 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1249081/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to