Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The v4.4.50 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.kernel.org/

    TEST CASE: TBD

       The following patches from the v4.4.50 stable release shall be
applied:

can: Fix kernel panic at security_sock_rcv_skb
ipv6: fix ip6_tnl_parse_tlv_enc_lim()
ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim()
tcp: fix 0 divide in __tcp_select_window()
net: use a work queue to defer net_disable_timestamp() work
ipv4: keep skb->dst around in presence of IP options
netlabel: out of bound access in cipso_v4_validate()
ip6_gre: fix ip6gre_err() invalid reads
ipv6: tcp: add a missing tcp_v6_restore_cb()
tcp: avoid infinite loop in tcp_splice_read()
tun: read vnet_hdr_sz once
macvtap: read vnet_hdr_size once
mlx4: Invoke softirqs after napi_reschedule
sctp: avoid BUG_ON on sctp_wait_for_sndbuf
sit: fix a double free on error path
net: introduce device min_header_len
packet: round up linear to header len
ping: fix a null pointer dereference
l2tp: do not use udp_ioctl()
Linux 4.4.50

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
         Status: New


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The v4.4.50 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The v4.4.50 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
+        The following patches from the v4.4.50 stable release shall be
+ applied:
  
-        The following patches from the v4.4.50 stable release shall be
- applied:
+ can: Fix kernel panic at security_sock_rcv_skb
+ ipv6: fix ip6_tnl_parse_tlv_enc_lim()
+ ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim()
+ tcp: fix 0 divide in __tcp_select_window()
+ net: use a work queue to defer net_disable_timestamp() work
+ ipv4: keep skb->dst around in presence of IP options
+ netlabel: out of bound access in cipso_v4_validate()
+ ip6_gre: fix ip6gre_err() invalid reads
+ ipv6: tcp: add a missing tcp_v6_restore_cb()
+ tcp: avoid infinite loop in tcp_splice_read()
+ tun: read vnet_hdr_sz once
+ macvtap: read vnet_hdr_size once
+ mlx4: Invoke softirqs after napi_reschedule
+ sctp: avoid BUG_ON on sctp_wait_for_sndbuf
+ sit: fix a double free on error path
+ net: introduce device min_header_len
+ packet: round up linear to header len
+ ping: fix a null pointer dereference
+ l2tp: do not use udp_ioctl()
+ Linux 4.4.50

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1666324

Title:
  Xenial update to v4.4.50 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The v4.4.50 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the v4.4.50 stable release shall be
  applied:

  can: Fix kernel panic at security_sock_rcv_skb
  ipv6: fix ip6_tnl_parse_tlv_enc_lim()
  ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim()
  tcp: fix 0 divide in __tcp_select_window()
  net: use a work queue to defer net_disable_timestamp() work
  ipv4: keep skb->dst around in presence of IP options
  netlabel: out of bound access in cipso_v4_validate()
  ip6_gre: fix ip6gre_err() invalid reads
  ipv6: tcp: add a missing tcp_v6_restore_cb()
  tcp: avoid infinite loop in tcp_splice_read()
  tun: read vnet_hdr_sz once
  macvtap: read vnet_hdr_size once
  mlx4: Invoke softirqs after napi_reschedule
  sctp: avoid BUG_ON on sctp_wait_for_sndbuf
  sit: fix a double free on error path
  net: introduce device min_header_len
  packet: round up linear to header len
  ping: fix a null pointer dereference
  l2tp: do not use udp_ioctl()
  Linux 4.4.50

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1666324/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to