** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The following upstream - stable patches should be included in the Ubuntu kernel: + v5.4.87 upstream stable release + from git://git.kernel.org/ - v5.4.87 upstream stable release - from git://git.kernel.org/ + net/sched: sch_taprio: reset child qdiscs before freeing them + md/raid10: initialize r10_bio->read_slot before use. + thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has changed + ext4: prevent creating duplicate encrypted filenames + ubifs: prevent creating duplicate encrypted filenames + f2fs: prevent creating duplicate encrypted filenames + fscrypt: add fscrypt_is_nokey_name() + fscrypt: remove kernel-internal constants from UAPI header + vfio/pci: Move dummy_resources_list init in vfio_pci_probe() + btrfs: fix race when defragmenting leads to unnecessary IO + ext4: don't remount read-only with errors=continue on reboot + KVM: x86: avoid incorrect writes to host MSR_IA32_SPEC_CTRL + KVM: SVM: relax conditions for allowing MSR_IA32_SPEC_CTRL accesses + KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits + powerpc/bitops: Fix possible undefined behaviour with fls() and fls64() + jffs2: Allow setting rp_size to zero during remounting + jffs2: Fix NULL pointer dereference in rp_size fs option parsing + scsi: block: Fix a race in the runtime power management code + uapi: move constants from <linux/kernel.h> to <linux/const.h> + tools headers UAPI: Sync linux/const.h with the kernel headers + null_blk: Fix zone size initialization + of: fix linker-section match-table corruption + cgroup: Fix memory leak when parsing multiple source parameters + scsi: cxgb4i: Fix TLS dependency + Bluetooth: hci_h5: close serdev device and free hu in h5_close + reiserfs: add check for an invalid ih_entry_count + misc: vmw_vmci: fix kernel info-leak by initializing dbells in vmci_ctx_get_chkpt_doorbells() + media: gp8psk: initialize stats at power control logic + f2fs: fix shift-out-of-bounds in sanity_check_raw_super() + ALSA: seq: Use bool for snd_seq_queue internal flags + ALSA: rawmidi: Access runtime->avail always in spinlock + bfs: don't use WARNING: string when it's just info. + fcntl: Fix potential deadlock in send_sig{io, urg}() + rtc: sun6i: Fix memleak in sun6i_rtc_clk_init + module: set MODULE_STATE_GOING state when a module fails to load + quota: Don't overflow quota file offsets + rtc: pl031: fix resource leak in pl031_probe + powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe() + i3c master: fix missing destroy_workqueue() on error in i3c_master_register + NFSv4: Fix a pNFS layout related use-after-free race when freeing the inode + f2fs: avoid race condition for shrinker count + module: delay kobject uevent until after module init call + fs/namespace.c: WARN if mnt_count has become negative + um: ubd: Submit all data segments atomically + tick/sched: Remove bogus boot "safety" check + ALSA: pcm: Clear the full allocated memory at hw_params + dm verity: skip verity work if I/O error when system is shutting down + Linux 5.4.87 + UBUNTU: upstream stable to v5.4.87
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912681 Title: Focal update: v5.4.87 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912681/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs