kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #125834
[Bug 1311239] Re: Trusty update to v3.13.10 stable release
*** This bug is a duplicate of bug 1309007 ***
https://bugs.launchpad.net/bugs/1309007
** This bug has been marked a duplicate of bug 1309007
Trusty update to v3.13.10 stable release
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1311239
Title:
Trusty update to v3.13.10 stable release
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Trusty:
Invalid
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from Linus' tree or in a minimally
backported form of that patch. The v3.13.10 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches are in the v3.13.10 stable release:
Linux 3.13.10
crypto: ghash-clmulni-intel - use C implementation for setkey()
m68k: Skip futex_atomic_cmpxchg_inatomic() test
futex: Allow architectures to skip futex_atomic_cmpxchg_inatomic() test
ARC: [nsimosci] Unbork console
ARC: [nsimosci] Change .dts to use generic 8250 UART
powernow-k6: reorder frequencies
powernow-k6: correctly initialize default parameters
powernow-k6: disable cache when changing frequency
rds: prevent dereference of a NULL device in rds_iw_laddr_check
isdnloop: several buffer overflows
isdnloop: Validate NUL-terminated strings from user.
net: vxlan: fix crash when interface is created with no group
Call efx_set_channels() before efx->type->dimension_resources()
xen-netback: disable rogue vif in kthread context
netlink: don't compare the nul-termination in nla_strcmp
ipv6: some ipv6 statistic counters failed to disable bh
xen-netback: remove pointless clause from if statement
tcp: fix get_timewait4_sock() delay computation on 64bit
vhost: validate vhost_get_vq_desc return value
vhost: fix total length when packets are too short
vlan: Set hard_header_len according to available acceleration
usbnet: include wait queue head in device structure
virtio-net: correct error handling of virtqueue_kick()
tg3: Do not include vlan acceleration features in vlan_features
ip_tunnel: Fix dst ref-count.
tipc: fix spinlock recursion bug for failed subscriptions
netpoll: fix the skb check in pkt_is_ns
net: micrel : ks8851-ml: add vdd-supply support
ip6mr: fix mfc notification flags
ipmr: fix mfc notification flags
rtnetlink: fix fdb notification flags
tcp: syncookies: do not use getnstimeofday()
vxlan: fix nonfunctional neigh_reduce()
vxlan: fix potential NULL dereference in arp_reduce()
net: cdc_ncm: fix control message ordering
ipv6: ip6_append_data_mtu do not handle the mtu of the second fragment properly
ipv6: Avoid unnecessary temporary addresses being generated
eth: fec: Fix lost promiscuous mode after reconnecting cable
bonding: set correct vlan id for alb xmit path
net: socket: error on a negative msg_namelen
bridge: multicast: enable snooping on general queries only
bridge: multicast: add sanity check for general query destination
tcp: tcp_release_cb() should release socket ownership
skbuff: skb_segment: orphan frags before copying
skbuff: skb_segment: s/fskb/list_skb/
skbuff: skb_segment: s/skb/head_skb/
skbuff: skb_segment: s/skb_frag/frag/
skbuff: skb_segment: s/frag/nskb_frag/
vlan: Set correct source MAC address with TX VLAN offload enabled
Xen-netback: Fix issue caused by using gso_type wrongly
pkt_sched: fq: do not hold qdisc lock while allocating memory
bnx2: Fix shutdown sequence
ipv6: don't set DST_NOCOUNT for remotely added routes
ipv6: Fix exthdrs offload registration.
net: unix: non blocking recvmsg() should not return -EINTR
inet: frag: make sure forced eviction removes all frags
tipc: don't log disabled tasklet handler errors
tipc: fix memory leak during module removal
tipc: drop subscriber connection id invalidation
tipc: fix connection refcount leak
tipc: allow connection shutdown callback to be invoked in advance
bridge: multicast: add sanity check for query source addresses
net: sctp: fix skb leakage in COOKIE ECHO path of chunk->auth_chunk
net: fix for a race condition in the inet frag code
selinux: correctly label /proc inodes in use before the policy is loaded
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1311239/+subscriptions
References