kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #32404
[Bug 1250540] Re: linux: 3.11.0-14.21 -proposed tracker
This bug was fixed in the package linux - 3.11.0-14.21
---------------
linux (3.11.0-14.21) saucy; urgency=low
[Brad Figg]
* Release Tracking Bug
- LP: #1250540
[ Anthony Wong ]
* SAUCE: Work around broken ACPI backlight on Dell Inspiron 5537
- LP: #1231305
[ Colin Ian King ]
* SAUCE: eCryptfs: fix 32 bit corruption issue
- LP: #1243636
[ Ming Lei ]
* SAUCE: ext4: fix performance regression in ext4_writepages
- LP: #1242812
[ Upstream Kernel Changes ]
* Revert "bridge: only expire the mdb entry when query is received"
- LP: #1249081
* ext4: fix performance regression in writeback of random writes
- LP: #1242812
* be2net: pass if_id for v1 and V2 versions of TX_CREATE cmd
- LP: #1234019
* tcp: TSO packets automatic sizing
- LP: #1249081
* tcp: TSQ can use a dynamic limit
- LP: #1249081
* tcp: must unclone packets before mangling them
- LP: #1249081
* tcp: do not forget FIN in tcp_shifted_skb()
- LP: #1249081
* tcp: fix incorrect ca_state in tail loss probe
- LP: #1249081
* net: do not call sock_put() on TIMEWAIT sockets
- LP: #1249081
* batman-adv: set up network coding packet handlers during module init
- LP: #1249081
* l2tp: fix kernel panic when using IPv4-mapped IPv6 addresses
- LP: #1249081
* l2tp: Fix build warning with ipv6 disabled.
- LP: #1249081
* net: mv643xx_eth: update statistics timer from timer context only
- LP: #1249081
* net: mv643xx_eth: fix orphaned statistics timer crash
- LP: #1249081
* net: heap overflow in __audit_sockaddr()
- LP: #1249081
* sit: amend "allow to use rtnl ops on fb tunnel"
- LP: #1249081
* proc connector: fix info leaks
- LP: #1249081
* ipv4: fix ineffective source address selection
- LP: #1249081
* can: dev: fix nlmsg size calculation in can_get_size()
- LP: #1249081
* net: secure_seq: Fix warning when CONFIG_IPV6 and CONFIG_INET are not
selected
- LP: #1249081
* xen-netback: Don't destroy the netdev until the vif is shut down
- LP: #1249081
* net/mlx4_en: Rename name of mlx4_en_rx_alloc members
- LP: #1249081
* net/mlx4_en: Fix pages never dma unmapped on rx
- LP: #1249081
* net: vlan: fix nlmsg size calculation in vlan_get_size()
- LP: #1249081
* bridge: update mdb expiration timer upon reports.
- LP: #1249081
* vti: get rid of nf mark rule in prerouting
- LP: #1249081
* l2tp: must disable bh before calling l2tp_xmit_skb()
- LP: #1249081
* netem: update backlog after drop
- LP: #1249081
* netem: free skb's in tree on reset
- LP: #1249081
* farsync: fix info leak in ioctl
- LP: #1249081
* unix_diag: fix info leak
- LP: #1249081
* connector: use nlmsg_len() to check message length
- LP: #1249081
* bnx2x: record rx queue for LRO packets
- LP: #1249081
* virtio-net: don't respond to cpu hotplug notifier if we're not ready
- LP: #1249081
* virtio-net: refill only when device is up during setting queues
- LP: #1249081
* bridge: Correctly clamp MAX forward_delay when enabling STP
- LP: #1249081
* net: dst: provide accessor function to dst->xfrm
- LP: #1249081
* sctp: Use software crc32 checksum when xfrm transform will happen.
- LP: #1249081
* sctp: Perform software checksum if packet has to be fragmented.
- LP: #1249081
* wanxl: fix info leak in ioctl
- LP: #1249081
* net: unix: inherit SOCK_PASS{CRED, SEC} flags from socket to fix race
- LP: #1249081
* net: fix cipso packet validation when !NETLABEL
- LP: #1249081
* inet: fix possible memory corruption with UDP_CORK and UFO
- LP: #1249081
* ipv6: always prefer rt6i_gateway if present
- LP: #1249081
* ipv6: fill rt6i_gateway with nexthop address
- LP: #1249081
* netfilter: nf_conntrack: fix rt6i_gateway checks for H.323 helper
- LP: #1249081
* ipv6: probe routes asynchronous in rt6_probe
- LP: #1249081
* davinci_emac.c: Fix IFF_ALLMULTI setup
- LP: #1249081
* ARM: 7851/1: check for number of arguments in
syscall_get/set_arguments()
- LP: #1249081
* ARM: integrator: deactivate timer0 on the Integrator/CP
- LP: #1249081
* ext[34]: fix double put in tmpfile
- LP: #1249081
* gpio/lynxpoint: check if the interrupt is enabled in IRQ handler
- LP: #1249081
* dm snapshot: fix data corruption
- LP: #1249081
- CVE-2013-4299
* i2c: ismt: initialize DMA buffer
- LP: #1249081
* mm: migration: do not lose soft dirty bit if page is in migration state
- LP: #1249081
* mm/zswap: bugfix: memory leak when re-swapon
- LP: #1249081
* mm: fix BUG in __split_huge_page_pmd
- LP: #1249081
* ALSA: us122l: Fix pcm_usb_stream mmapping regression
- LP: #1249081
* ALSA: hda - Fix inverted internal mic not indicated on some machines
- LP: #1227491, #1239392, #1249081
* writeback: fix negative bdi max pause
- LP: #1249081
* w1 - call request_module with w1 master mutex unlocked
- LP: #1249081
* wireless: radiotap: fix parsing buffer overrun
- LP: #1249081
* wireless: cw1200: acquire hwbus lock around cw1200_irq_handler() call.
- LP: #1249081
* serial: vt8500: add missing braces
- LP: #1249081
* USB: serial: ti_usb_3410_5052: add Abbott strip port ID to combined
table as well.
- LP: #1249081
* USB: serial: option: add support for Inovia SEW858 device
- LP: #1249081
* usb: serial: option: blacklist Olivetti Olicard200
- LP: #1249081
* Linux 3.11.7
- LP: #1249081
* tg3: Add support for new 57786 device id.
- LP: #1242610
-- Brad Figg <brad.figg@xxxxxxxxxxxxx> Tue, 12 Nov 2013 08:10:21 -0800
** Changed in: linux (Ubuntu Saucy)
Status: New => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4299
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1250540
Title:
linux: 3.11.0-14.21 -proposed tracker
Status in Kernel SRU Workflow:
In Progress
Status in Kernel SRU Workflow certification-testing series:
Fix Released
Status in Kernel SRU Workflow prepare-package series:
Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
Fix Released
Status in Kernel SRU Workflow promote-to-security series:
Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
Fix Released
Status in Kernel SRU Workflow regression-testing series:
Fix Released
Status in Kernel SRU Workflow security-signoff series:
Fix Released
Status in Kernel SRU Workflow verification-testing series:
Fix Released
Status in “linux” package in Ubuntu:
Invalid
Status in “linux” source package in Saucy:
Fix Released
Bug description:
This bug is for tracking the 3.11.0-14.21 upload package. This bug
will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Tuesday, 12. November 2013 16:15 UTC
kernel-stable-Prepare-package-end:Tuesday, 12. November 2013 23:08 UTC
kernel-stable-Promote-to-proposed-start:Tuesday, 12. November 2013 23:08 UTC
kernel-stable-Promote-to-proposed-end:Thursday, 14. November 2013 12:00 UTC
kernel-stable-Verification-testing-start:Thursday, 14. November 2013 13:01 UTC
kernel-stable-Certification-testing-start:Thursday, 14. November 2013 13:01 UTC
kernel-stable-Security-signoff-start:Thursday, 14. November 2013 13:01 UTC
kernel-stable-Regression-testing-start:Thursday, 14. November 2013 13:01 UTC
kernel-stable-Security-signoff-end:Monday, 18. November 2013 23:02 UTC
kernel-stable-Certification-testing-end:Friday, 22. November 2013 21:00 UTC
kernel-stable-Verification-testing-end:Monday, 25. November 2013 22:00 UTC
kernel-stable-phase:CopyToUpdates
kernel-stable-phase-changed:Tuesday, 26. November 2013 10:00 UTC
kernel-stable-Promote-to-updates-start:Tuesday, 26. November 2013 10:00 UTC
kernel-stable-Regression-testing-end:Tuesday, 26. November 2013 10:00 UTC
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1250540/+subscriptions
References