← Back to team overview

kernel-packages team mailing list archive

[Bug 1485100] Re: Trusty update to 3.13.11-ckt25 stable release


** Changed in: linux (Ubuntu)
       Status: New => Invalid

You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.

  Trusty update to 3.13.11-ckt25 stable release

Status in linux package in Ubuntu:
Status in linux source package in Trusty:
  Fix Committed

Bug description:
  SRU Justification

         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from Linus' tree or in a minimally
         backported form of that patch. The 3.13.11-ckt25 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.



         The following patches are in the 3.13.11-ckt25 stable release:
              Linux 3.13.11-ckt25
              ipv6: Make MLD packets to only be processed locally
              rds: rds_ib_device.refcount overflow
              net: dsa: Test array index before use
              net: dsa: Fix off-by-one in switch address parsing
              net: graceful exit from netif_alloc_netdev_queues()
              net: do not process device backlog during unregistration
              bridge: mdb: zero out the local br_ip variable before use
              bridge: mdb: start delete timer for temp static entries
              ip_tunnel: fix ipv4 pmtu check to honor inner ip header df
              genirq: Prevent resend to interrupts marked IRQ_NESTED_THREAD
              drm/radeon: Don't flush the GART TLB if rdev->gart.ptr == NULL
              drm/radeon: add a dpm quirk for Sapphire Radeon R9 270X 2GB GDDR5
              st: null pointer dereference panic caused by use after kref_put by st_open
              s390/process: fix sfpc inline assembly
              ARC: make sure instruction_pointer() returns unsigned value
              Btrfs: fix memory leak in the extent_same ioctl
              USB: serial: Destroy serial_minors IDR on module exit
              drivers: net: cpsw: fix crash while accessing second slave ethernet interface
              tracing: Have branch tracer use recursive field of task struct
              ARM: dts: mx23: fix iio-hwmon support
              drm: add a check for x/y in drm_mode_setcrtc
              s390/sclp: clear upper register halves in _sclp_print_early
              usb: musb: host: rely on port_mode to call musb_start()
              dm btree: silence lockdep lock inversion in dm_btree_del()
              USB: cp210x: add ID for Aruba Networks controllers
              USB: option: add 2020:4000 ID
              dm btree remove: fix bug in redistribute3
              iio: tmp006: Check channel info on write
              ALSA: usb-audio: Add MIDI support for Steinberg MI2/MI4
              iio: adc: at91_adc: allow to use full range of startup time
              iio: DAC: ad5624r_spi: fix bit shift of output data value
              iio: inv-mpu: Specify the expected format/precision for write channels
              freeing unlinked file indefinitely delayed
              9p: don't leave a half-initialized inode sitting around
              hpfs: kstrdup() out of memory handling
              ACPI / PNP: Reserve ACPI resources at the fs_initcall_sync stage
              ext4: replace open coded nofail allocation in ext4_free_blocks()
              ext4: correctly migrate a file with a hole at the beginning
              ext4: be more strict when migrating to non-extent based file
              ext4: fix reservation release on invalidatepage for delalloc fs
              Btrfs: fix fsync data loss after append write
              Btrfs: fix race between caching kthread and returning inode to inode cache
              Btrfs: use kmem_cache_free when freeing entry in inode cache
              sg_start_req(): make sure that there's not too many elements in iovec
              KEYS: ensure we free the assoc array edit if edit is valid

To manage notifications about this bug go to: