** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.87 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.87 upstream stable release
-        from git://git.kernel.org/
+ net/sched: sch_taprio: reset child qdiscs before freeing them
+ md/raid10: initialize r10_bio->read_slot before use.
+ thermal/drivers/cpufreq_cooling: Update cpufreq_state only if state has 
changed
+ ext4: prevent creating duplicate encrypted filenames
+ ubifs: prevent creating duplicate encrypted filenames
+ f2fs: prevent creating duplicate encrypted filenames
+ fscrypt: add fscrypt_is_nokey_name()
+ fscrypt: remove kernel-internal constants from UAPI header
+ vfio/pci: Move dummy_resources_list init in vfio_pci_probe()
+ btrfs: fix race when defragmenting leads to unnecessary IO
+ ext4: don't remount read-only with errors=continue on reboot
+ KVM: x86: avoid incorrect writes to host MSR_IA32_SPEC_CTRL
+ KVM: SVM: relax conditions for allowing MSR_IA32_SPEC_CTRL accesses
+ KVM: x86: reinstate vendor-agnostic check on SPEC_CTRL cpuid bits
+ powerpc/bitops: Fix possible undefined behaviour with fls() and fls64()
+ jffs2: Allow setting rp_size to zero during remounting
+ jffs2: Fix NULL pointer dereference in rp_size fs option parsing
+ scsi: block: Fix a race in the runtime power management code
+ uapi: move constants from <linux/kernel.h> to <linux/const.h>
+ tools headers UAPI: Sync linux/const.h with the kernel headers
+ null_blk: Fix zone size initialization
+ of: fix linker-section match-table corruption
+ cgroup: Fix memory leak when parsing multiple source parameters
+ scsi: cxgb4i: Fix TLS dependency
+ Bluetooth: hci_h5: close serdev device and free hu in h5_close
+ reiserfs: add check for an invalid ih_entry_count
+ misc: vmw_vmci: fix kernel info-leak by initializing dbells in 
vmci_ctx_get_chkpt_doorbells()
+ media: gp8psk: initialize stats at power control logic
+ f2fs: fix shift-out-of-bounds in sanity_check_raw_super()
+ ALSA: seq: Use bool for snd_seq_queue internal flags
+ ALSA: rawmidi: Access runtime->avail always in spinlock
+ bfs: don't use WARNING: string when it's just info.
+ fcntl: Fix potential deadlock in send_sig{io, urg}()
+ rtc: sun6i: Fix memleak in sun6i_rtc_clk_init
+ module: set MODULE_STATE_GOING state when a module fails to load
+ quota: Don't overflow quota file offsets
+ rtc: pl031: fix resource leak in pl031_probe
+ powerpc: sysdev: add missing iounmap() on error in mpic_msgr_probe()
+ i3c master: fix missing destroy_workqueue() on error in i3c_master_register
+ NFSv4: Fix a pNFS layout related use-after-free race when freeing the inode
+ f2fs: avoid race condition for shrinker count
+ module: delay kobject uevent until after module init call
+ fs/namespace.c: WARN if mnt_count has become negative
+ um: ubd: Submit all data segments atomically
+ tick/sched: Remove bogus boot "safety" check
+ ALSA: pcm: Clear the full allocated memory at hw_params
+ dm verity: skip verity work if I/O error when system is shutting down
+ Linux 5.4.87
+ UBUNTU: upstream stable to v5.4.87

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912681

Title:
  Focal update: v5.4.87 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912681/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to