89bfe3e...
by
Andy Whitcroft
on 2020-05-21
UBUNTU: [Config] wireguard -- enable on all architectures
Signed-off-by: Andy Whitcroft <email address hidden>
2c86917...
by
Andy Whitcroft
on 2020-05-20
UBUNTU: update dkms package versions
BugLink: https:/ /bugs.launchpad .net/bugs/ 1786013
Signed-off-by: Andy Whitcroft <email address hidden>
fc06716...
by
Andy Whitcroft
on 2020-01-24
UBUNTU: [Packaging] wireguard -- add support for building signed .ko
Add support for building, signing, and shipping the wireguard.ko from
the wireguard-dkms package. Drop this into the linux-modules package.
BugLink: https:/ /bugs.launchpad .net/bugs/ 1861284
Signed-off-by: Andy Whitcroft <email address hidden>
d53d4b6...
by
Kleber Sacilotto de Souza
on 2020-05-15
UBUNTU: Ubuntu-5.3.0-54.48
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>
08e6dc7...
by
Andy Whitcroft
on 2020-05-15
UBUNTU: [Packaging] file-downloader not handling positive failures correctly
Seems we are not handling positive failures such as 404 correctly. Add
--fail to get server reported errors converted into errors.
BugLink: https:/ /bugs.launchpad .net/bugs/ 1878897
Signed-off-by: Andy Whitcroft <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>
765bbee...
by
Kleber Sacilotto de Souza
on 2020-05-15
UBUNTU: link-to-tracker: update tracking bug
BugLink: https:/ /bugs.launchpad .net/bugs/ 1878820
Properties: no-test-build
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>
5ab082f...
by
Kleber Sacilotto de Souza
on 2020-05-15
UBUNTU: Start new release
Ignore: yes
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>
43bf818...
by
Luca Coelho
on 2020-04-28
iwlwifi: pcie: handle QuZ configs with killer NICs as well
BugLink: https:/ /bugs.launchpad .net/bugs/ 1874685
The killer devices were left out of the checks that convert Qu-B0 to
QuZ configurations. Add them.
Cc: <email address hidden> # v5.3+
Fixes: 5a8c31aa6357 ("iwlwifi: pcie: fix recognition of QuZ devices")
Signed-off-by: Luca Coelho <email address hidden>
Link:
https:/ /lore.kernel. org/r/iwlwifi. 20200424121518. b715acfbe211. I273a098064a225 77e4fca767910fd 9cf0013f5cb@ changeid
(backported from f92f26f2ed2c9f9 2c9270c705bca96 310c3cdf5a linux-next)
Signed-off-by: You-Sheng Yang <email address hidden>
Acked-by: Kleber Souza <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Khalid Elmously <email address hidden>
6e8c81a...
by
Al Viro <email address hidden>
on 2020-05-14
propagate_one(): mnt_set_ mountpoint( ) needs mount_lock
... to protect the modification of mp->m_count done by it. Most of
the places that modify that thing also have namespace_lock held,
but not all of them can do so, so we really need mount_lock here.
Kudos to Piotr Krysiuk <email address hidden>, who'd spotted a related
bug in pivot_root(2) (fixed unnoticed in 5.3); search for other
similar turds has caught out this one.
Cc: <email address hidden>
Signed-off-by: Al Viro <email address hidden>
(cherry picked from commit b0d3869ce9eeacb b1bbd541909beee f4126426d5)
CVE-2020-12114
Signed-off-by: Thadeu Lima de Souza Cascardo <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Acked-by: Kleber Sacilotto de Souza <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>
6b0b298...
by
Kamal Mostafa
on 2020-05-11
UBUNTU: upstream stable to v4.19.119, v5.4.36
BugLink: https:/ /bugs.launchpad .net/bugs/ 1878073
Ignore: yes
Signed-off-by: Kamal Mostafa <email address hidden>
Signed-off-by: Kleber Sacilotto de Souza <email address hidden>