Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v5.4.92 upstream stable release
       from git://git.kernel.org/

usb: ohci: Make distrust_firmware param default to false
compiler.h: Raise minimum version of GCC to 5.1 for arm64
xen/privcmd: allow fetching resource sizes
elfcore: fix building with clang
scsi: lpfc: Make lpfc_defer_acc_rsp static
spi: npcm-fiu: simplify the return expression of npcm_fiu_probe()
spi: npcm-fiu: Disable clock in probe error path
nfsd4: readdirplus shouldn't return parent of export
bpf: Don't leak memory in bpf getsockopt when optlen == 0
bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback
udp: Prevent reuseport_select_sock from reading uninitialized socks
netxen_nic: fix MSI/MSI-x interrupts
net: introduce skb_list_walk_safe for skb segment walking
net: skbuff: disambiguate argument and member for skb_list_walk_safe helper
net: ipv6: Validate GSO SKB before finish IPv6 processing
mlxsw: core: Add validation of transceiver temperature thresholds
mlxsw: core: Increase critical threshold for ASIC thermal zone
net: mvpp2: Remove Pause and Asym_Pause support
rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
esp: avoid unneeded kmap_atomic call
net: dcb: Validate netlink message in DCB handler
net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands
rxrpc: Call state should be read with READ_ONCE() under some circumstances
net: stmmac: Fixed mtu channged by cache aligned
net: sit: unregister_netdevice on newlink's error path
net: avoid 32 x truesize under-estimation for tiny skbs
rxrpc: Fix handling of an unsupported token type in rxrpc_read()
net, sctp, filter: remap copy_from_user failure error
tipc: fix NULL deref in tipc_link_xmit()
mac80211: do not drop tx nulldata packets on encrypted links
mac80211: check if atf has been disabled in __ieee80211_schedule_txq
spi: cadence: cache reference clock rate during probe
Linux 5.4.92
UBUNTU: upstream stable to v5.4.92

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Confirmed

** Affects: linux (Ubuntu Focal)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Focal)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu Focal)
       Status: New => In Progress

** Changed in: linux (Ubuntu Focal)
     Assignee: (unassigned) => Kamal Mostafa (kamalmostafa)

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The following upstream
+        stable patches should be included in the Ubuntu kernel:
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The following upstream
-        stable patches should be included in the Ubuntu kernel:
+        v5.4.92 upstream stable release
+        from git://git.kernel.org/
  
-        v5.4.92 upstream stable release
-        from git://git.kernel.org/
+ usb: ohci: Make distrust_firmware param default to false
+ compiler.h: Raise minimum version of GCC to 5.1 for arm64
+ xen/privcmd: allow fetching resource sizes
+ elfcore: fix building with clang
+ scsi: lpfc: Make lpfc_defer_acc_rsp static
+ spi: npcm-fiu: simplify the return expression of npcm_fiu_probe()
+ spi: npcm-fiu: Disable clock in probe error path
+ nfsd4: readdirplus shouldn't return parent of export
+ bpf: Don't leak memory in bpf getsockopt when optlen == 0
+ bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback
+ udp: Prevent reuseport_select_sock from reading uninitialized socks
+ netxen_nic: fix MSI/MSI-x interrupts
+ net: introduce skb_list_walk_safe for skb segment walking
+ net: skbuff: disambiguate argument and member for skb_list_walk_safe helper
+ net: ipv6: Validate GSO SKB before finish IPv6 processing
+ mlxsw: core: Add validation of transceiver temperature thresholds
+ mlxsw: core: Increase critical threshold for ASIC thermal zone
+ net: mvpp2: Remove Pause and Asym_Pause support
+ rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request
+ esp: avoid unneeded kmap_atomic call
+ net: dcb: Validate netlink message in DCB handler
+ net: dcb: Accept RTM_GETDCB messages carrying set-like DCB commands
+ rxrpc: Call state should be read with READ_ONCE() under some circumstances
+ net: stmmac: Fixed mtu channged by cache aligned
+ net: sit: unregister_netdevice on newlink's error path
+ net: avoid 32 x truesize under-estimation for tiny skbs
+ rxrpc: Fix handling of an unsupported token type in rxrpc_read()
+ net, sctp, filter: remap copy_from_user failure error
+ tipc: fix NULL deref in tipc_link_xmit()
+ mac80211: do not drop tx nulldata packets on encrypted links
+ mac80211: check if atf has been disabled in __ieee80211_schedule_txq
+ spi: cadence: cache reference clock rate during probe
+ Linux 5.4.92
+ UBUNTU: upstream stable to v5.4.92

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915186

Title:
  Focal update: v5.4.92 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1915186/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to