← Back to team overview

kernel-packages team mailing list archive

[Bug 1419837] Re: Trusty update to v3.13.11-ckt14 stable release

 

** Changed in: linux (Ubuntu)
       Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1419837

Title:
  Trusty update to v3.13.11-ckt14 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Trusty:
  Fix Released

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from Linus' tree or in a minimally
         backported form of that patch. The v3.13.11-ckt14 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches are in the v3.13.11-ckt14 stable release:

  [3.13-stable only] ipv6: fix swapped ipv4/ipv6 mtu_reduced callbacks
  usb: gadget: at91_udc: move prepare clk into process context
  [3.13-stable only] KVM: x86: Fix far-jump to non-canonical check
  x86/tls: Validate TLS entries to protect espfix
  userns: Check euid no fsuid when establishing an unprivileged uid mapping
  userns: Document what the invariant required for safe unprivileged mappings.
  userns: Only allow the creator of the userns unprivileged mappings
  x86_64, switch_to(): Load TLS descriptors before switching DS and ES
  isofs: Fix infinite looping over CE entries
  batman-adv: Calculate extra tail size based on queued fragments
  KEYS: close race between key lookup and freeing
  isofs: Fix unchecked printing of ER records
  x86_64, vdso: Fix the vdso address randomization algorithm
  groups: Consolidate the setgroups permission checks
  userns: Don't allow setgroups until a gid mapping has been setablished
  userns: Don't allow unprivileged creation of gid mappings
  move d_rcu from overlapping d_child to overlapping d_alias
  deal with deadlock in d_walk()
  Linux 3.13.11-ckt14

  The following patches were already applied to the Trusty kernel:

  e1000e: Fix no connectivity when driver loaded with cable out

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1419837/+subscriptions


References