Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The following upstream
       stable patches should be included in the Ubuntu kernel:

       v4.4.248 upstream stable release
       from git://git.kernel.org/

net/af_iucv: set correct sk_protocol for child sockets
rose: Fix Null pointer dereference in rose_send_frame()
usbnet: ipheth: fix connectivity with iOS 14
bonding: wait for sysfs kobject destruction before freeing struct slave
netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
net/x25: prevent a couple of overflows
cxgb3: fix error return code in t3_sge_alloc_qset()
net: pasemi: fix error return code in pasemi_mac_open()
dt-bindings: net: correct interrupt flags in examples
Input: xpad - support Ardwiino Controllers
powerpc: Stop exporting __clear_user which is now inlined.
btrfs: sysfs: init devices outside of the chunk_mutex
vlan: consolidate VLAN parsing code and limit max parsing depth
usb: gadget: f_fs: Use local copy of descriptors for userspace copy
USB: serial: kl5kusb105: fix memleak on open
USB: serial: ch341: add new Product ID for CH341A
USB: serial: ch341: sort device-id entries
USB: serial: option: add Fibocom NL668 variants
USB: serial: option: add support for Thales Cinterion EXS82
tty: Fix ->pgrp locking in tiocspgrp()
ALSA: hda/realtek - Add new codec supported for ALC897
ALSA: hda/generic: Add option to enforce preferred_dacs pairs
tty: Fix ->session locking
cifs: fix potential use-after-free in cifs_echo_request()
i2c: imx: Fix reset of I2SR_IAL flag
i2c: imx: Check for I2SR_IAL after every byte
arm64: assembler: make adr_l work in modules under KASLR
iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs
spi: Introduce device-managed SPI controller allocation
spi: bcm2835: Fix use-after-free on unbind
spi: bcm2835: Release the DMA channel if probe fails after dma_init
tracing: Fix userstacktrace option for instances
btrfs: cleanup cow block on error
mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
gfs2: check for empty rgrp tree in gfs2_ri_update
Input: i8042 - fix error return code in i8042_setup_aux()
x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
Linux 4.4.248
UBUNTU: upstream stable to v4.4.248

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Confirmed

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
     Assignee: Kamal Mostafa (kamalmostafa)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Confirmed

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1910137

Title:
  Xenial update: v4.4.248 upstream stable release

Status in linux package in Ubuntu:
  Confirmed
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The following upstream
         stable patches should be included in the Ubuntu kernel:

         v4.4.248 upstream stable release
         from git://git.kernel.org/

  net/af_iucv: set correct sk_protocol for child sockets
  rose: Fix Null pointer dereference in rose_send_frame()
  usbnet: ipheth: fix connectivity with iOS 14
  bonding: wait for sysfs kobject destruction before freeing struct slave
  netfilter: bridge: reset skb->pkt_type after NF_INET_POST_ROUTING traversal
  net/x25: prevent a couple of overflows
  cxgb3: fix error return code in t3_sge_alloc_qset()
  net: pasemi: fix error return code in pasemi_mac_open()
  dt-bindings: net: correct interrupt flags in examples
  Input: xpad - support Ardwiino Controllers
  powerpc: Stop exporting __clear_user which is now inlined.
  btrfs: sysfs: init devices outside of the chunk_mutex
  vlan: consolidate VLAN parsing code and limit max parsing depth
  usb: gadget: f_fs: Use local copy of descriptors for userspace copy
  USB: serial: kl5kusb105: fix memleak on open
  USB: serial: ch341: add new Product ID for CH341A
  USB: serial: ch341: sort device-id entries
  USB: serial: option: add Fibocom NL668 variants
  USB: serial: option: add support for Thales Cinterion EXS82
  tty: Fix ->pgrp locking in tiocspgrp()
  ALSA: hda/realtek - Add new codec supported for ALC897
  ALSA: hda/generic: Add option to enforce preferred_dacs pairs
  tty: Fix ->session locking
  cifs: fix potential use-after-free in cifs_echo_request()
  i2c: imx: Fix reset of I2SR_IAL flag
  i2c: imx: Check for I2SR_IAL after every byte
  arm64: assembler: make adr_l work in modules under KASLR
  iommu/amd: Set DTE[IntTabLen] to represent 512 IRTEs
  spi: Introduce device-managed SPI controller allocation
  spi: bcm2835: Fix use-after-free on unbind
  spi: bcm2835: Release the DMA channel if probe fails after dma_init
  tracing: Fix userstacktrace option for instances
  btrfs: cleanup cow block on error
  mm/userfaultfd: do not access vma->vm_mm after calling handle_userfault()
  gfs2: check for empty rgrp tree in gfs2_ri_update
  Input: i8042 - fix error return code in i8042_setup_aux()
  x86/uprobes: Do not use prefixes.nbytes when looping over prefixes.bytes
  Linux 4.4.248
  UBUNTU: upstream stable to v4.4.248

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910137/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to