** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+ * net: cdc_ncm: Signedness bug in cdc_ncm_set_dgram_size()
+ * block, bfq: deschedule empty bfq_queues not referred by any process
+ * mm/memory_hotplug: don't access uninitialized memmaps in shrink_pgdat_span()
+ * mm/memory_hotplug: fix updating the node span
+ * arm64: uaccess: Ensure PAN is re-enabled after unhandled uaccess fault
+ * fbdev: Ditch fb_edid_add_monspecs
+ * Linux 5.3.13
+ * UBUNTU: upstream stable to v5.3.13
  
-        5.3.13 upstream stable release
-        from git://git.kernel.org/
+        5.3.13 upstream stable release
+        from git://git.kernel.org/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853882

Title:
  Eoan update: 5.3.13 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1853882/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to