[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
This bug was fixed in the package linux - 4.4.0-190.220 --- linux (4.4.0-190.220) xenial; urgency=medium * xenial/linux: 4.4.0-190.220 -proposed tracker (LP: #1893431) * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * [Hyper-V] VSS and File Copy daemons intermittently fails to start (LP: #1891224) - [Packaging] Bind hv_vss_daemon startup to hv_vss device - [Packaging] bind hv_fcopy_daemon startup to hv_fcopy device * CVE-2019-20811 - net-sysfs: call dev_hold if kobject_init_and_add success * CVE-2020-0067 - f2fs: fix to avoid memory leakage in f2fs_listxattr * CVE-2019-9453 - f2fs: fix to avoid accessing xattr across the boundary * Xenial update: 4.4.233 upstream stable release (LP: #1892822) - media: rc: prevent memory leak in cx23888_ir_probe - ath9k_htc: release allocated buffer if timed out - ath9k: release allocated buffer if timed out - nfs: Move call to security_inode_listsecurity into nfs_listxattr - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() - drm: hold gem reference until object is no longer accessed - f2fs: check memory boundary by insane namelen - f2fs: check if file namelen exceeds max value - ARM: 8986/1: hw_breakpoint: Don't invoke overflow handler on uaccess watchpoints - fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins. - rds: Prevent kernel-infoleak in rds_notify_queue_get() - net/x25: Fix x25_neigh refcnt leak when x25 disconnect - net/x25: Fix null-ptr-deref in x25_disconnect - sh: Fix validation of system call number - net: lan78xx: add missing endpoint sanity check - net: lan78xx: fix transfer-buffer memory leak - mlxsw: core: Increase scope of RCU read-side critical section - mac80211: mesh: Free ie data when leaving mesh - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame - net: ethernet: ravb: exit if re-initialization fails in tx timeout - Revert "i2c: cadence: Fix the hold bit setting" - xen-netfront: fix potential deadlock in xennet_remove() - x86/i8259: Use printk_deferred() to prevent deadlock - random32: update the net random state on interrupt and activity - ARM: percpu.h: fix build error - random: fix circular include dependency on arm64 after addition of percpu.h - random32: remove net_rand_state from the latent entropy gcc plugin - random32: move the pseudo-random 32-bit definitions to prandom.h - ext4: fix direct I/O read error - USB: serial: qcserial: add EM7305 QDL product ID - ALSA: seq: oss: Serialize ioctls - Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() - vgacon: Fix for missing check in scrollback handling - mtd: properly check all write ioctls for permissions - net/9p: validate fds in p9_fd_open - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason - cfg80211: check vendor command doit pointer before use - igb: reinit_locked() should be called with rtnl_lock - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent - tools lib traceevent: Fix memory leak in process_dynamic_array_len - binder: Prevent context manager from incrementing ref 0 - ipv4: Silence suspicious RCU usage warning - ipv6: fix memory leaks on IPV6_ADDRFORM path - Revert "vxlan: fix tos value before xmit" - net: lan78xx: replace bogus endpoint lookup - usb: hso: check for return value in hso_serial_common_create() - vxlan: Ensure FDB dump is performed under RCU - Smack: fix use-after-free in smk_write_relabel_self() - tracepoint: Mark __tracepoint_string's __used - udp: drop corrupt packets earlier to avoid data corruption - gpio: fix oops resulting from calling of_get_named_gpio(NULL, ...) - EDAC: Fix reference count leaks - m68k: mac: Don't send IOP message until channel is idle - m68k: mac: Fix IOP status/control register writes - ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() - ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() - drm/tilcdc: fix leak & null ref in panel_connector_get_modes - Bluetooth: add a mutex lock to avoid UAF in do_enale_set - fs/btrfs: Add cond_resched() for try_release_extent_mapping() stalls - drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync - video: fbdev: neofb: fix memory leak in neo_scan_monitor() - drm/nouveau: fix multiple instances of reference count leaks - drm/debugfs: fix plain echo to connector "force" attribute - mm/mmap.c: Add cond_resched() for exit_mmap() CPU stalls - brcmfmac: To fix Bss I
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
Did not include commit "cxl: Fix kobject memleak" while applying due to a build failure on ppc64el (thank you to Kamal for pointing this out.) All other patches sent to the ML in this set are now on xenial/master- next ** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + 4.4.233 upstream stable release + from git://git.kernel.org/ -4.4.233 upstream stable release -from git://git.kernel.org/ + + * xfs: don't call xfs_da_shrink_inode with NULL bp + * net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe() + * media: rc: prevent memory leak in cx23888_ir_probe + * ath9k_htc: release allocated buffer if timed out + * ath9k: release allocated buffer if timed out + * nfs: Move call to security_inode_listsecurity into nfs_listxattr + * PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge + * drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() + * drm: hold gem reference until object is no longer accessed + * f2fs: check memory boundary by insane namelen + * f2fs: check if file namelen exceeds max value + * ARM: 8986/1: hw_breakpoint: Don't invoke overflow handler on uaccess watchpoints + * fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins. + * rds: Prevent kernel-infoleak in rds_notify_queue_get() + * net/x25: Fix x25_neigh refcnt leak when x25 disconnect + * net/x25: Fix null-ptr-deref in x25_disconnect + * sh: Fix validation of system call number + * net: lan78xx: add missing endpoint sanity check + * net: lan78xx: fix transfer-buffer memory leak + * mlxsw: core: Increase scope of RCU read-side critical section + * mac80211: mesh: Free ie data when leaving mesh + * nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame + * net: ethernet: ravb: exit if re-initialization fails in tx timeout + * Revert "i2c: cadence: Fix the hold bit setting" + * xen-netfront: fix potential deadlock in xennet_remove() + * x86/i8259: Use printk_deferred() to prevent deadlock + * random32: update the net random state on interrupt and activity + * ARM: percpu.h: fix build error + * random: fix circular include dependency on arm64 after addition of percpu.h + * random32: remove net_rand_state from the latent entropy gcc plugin + * random32: move the pseudo-random 32-bit definitions to prandom.h + * ext4: fix direct I/O read error + * USB: serial: qcserial: add EM7305 QDL product ID + * ALSA: seq: oss: Serialize ioctls + * Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() + * Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() + * Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() + * vgacon: Fix for missing check in scrollback handling + * mtd: properly check all write ioctls for permissions + * net/9p: validate fds in p9_fd_open + * drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason + * cfg80211: check vendor command doit pointer before use + * igb: reinit_locked() should be called with rtnl_lock + * atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent + * tools lib traceevent: Fix memory leak in process_dynamic_array_len + * binder: Prevent context manager from incrementing ref 0 + * ipv4: Silence suspicious RCU usage warning + * ipv6: fix memory leaks on IPV6_ADDRFORM path + * Revert "vxlan: fix tos value before xmit" + * net: lan78xx: replace bogus endpoint lookup + * usb: hso: check for return value in hso_serial_common_create() + * vxlan: Ensure FDB dump is performed under RCU + * Smack: fix use-after-free in smk_write_relabel_self() + * tracepoint: Mark __tracepoint_string's __used + * udp: drop corrupt packets earlier to avoid data corruption + * gpio: fix oops resulting from calling of_get_named_gpio(NULL, ...) + * EDAC: Fix reference count leaks + * m68k: mac: Don't send IOP message until channel is idle + * m68k: mac: Fix IOP status/control register writes + * ARM: at91: pm: add missing put_device() call in at91_pm_sram_init() + * ARM: socfpga: PM: add missing put_device() call in socfpga_setup_ocram_self_refresh() + * drm/tilcdc: fix leak & null ref in panel_connector_get_modes + * Bluetooth: add a mutex lock to avoid UAF in do_enale_set + * fs/btrfs: Add cond_resched() for try_release_extent_mapping() stalls + * drm/radeon: Fix reference count
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
The conflict in #2 is due to the change 43711a479c1eb38a6c4836e31fddd5599aa95884 "bcache: fix high CPU occupancy during journal" which was applied as part of https://bugs.launchpad.net/bugs/1784665. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
Encountered minor conflict when applying: bcache: allocate meta data pages as compound pages in journal.c -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release
Skipped: - xfs: don't call xfs_da_shrink_inode with NULL bp (applied already for CVE-2018-13094) - net: phy: mdio-bcm-unimac: fix potential NULL dereference in unimac_mdio_probe() (fixed already for CVE-2018-8043) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13094 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8043 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1892822 Title: Xenial update: 4.4.233 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs