kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #108519
[Bug 1419837] Re: Trusty update to v3.13.11-ckt14 stable release
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419837
Title:
Trusty update to v3.13.11-ckt14 stable release
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Trusty:
Fix Released
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from Linus' tree or in a minimally
backported form of that patch. The v3.13.11-ckt14 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches are in the v3.13.11-ckt14 stable release:
[3.13-stable only] ipv6: fix swapped ipv4/ipv6 mtu_reduced callbacks
usb: gadget: at91_udc: move prepare clk into process context
[3.13-stable only] KVM: x86: Fix far-jump to non-canonical check
x86/tls: Validate TLS entries to protect espfix
userns: Check euid no fsuid when establishing an unprivileged uid mapping
userns: Document what the invariant required for safe unprivileged mappings.
userns: Only allow the creator of the userns unprivileged mappings
x86_64, switch_to(): Load TLS descriptors before switching DS and ES
isofs: Fix infinite looping over CE entries
batman-adv: Calculate extra tail size based on queued fragments
KEYS: close race between key lookup and freeing
isofs: Fix unchecked printing of ER records
x86_64, vdso: Fix the vdso address randomization algorithm
groups: Consolidate the setgroups permission checks
userns: Don't allow setgroups until a gid mapping has been setablished
userns: Don't allow unprivileged creation of gid mappings
move d_rcu from overlapping d_child to overlapping d_alias
deal with deadlock in d_walk()
Linux 3.13.11-ckt14
The following patches were already applied to the Trusty kernel:
e1000e: Fix no connectivity when driver loaded with cable out
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1419837/+subscriptions
References