[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2022-03-16 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-09-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-190.220

---
linux (4.4.0-190.220) xenial; urgency=medium

  * xenial/linux: 4.4.0-190.220 -proposed tracker (LP: #1893431)

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  *  [Hyper-V] VSS and File Copy daemons intermittently fails to start
(LP: #1891224)
- [Packaging] Bind hv_vss_daemon startup to hv_vss device
- [Packaging] bind hv_fcopy_daemon startup to hv_fcopy device

  * CVE-2019-20811
- net-sysfs: call dev_hold if kobject_init_and_add success

  * CVE-2020-0067
- f2fs: fix to avoid memory leakage in f2fs_listxattr

  * CVE-2019-9453
- f2fs: fix to avoid accessing xattr across the boundary

  * Xenial update: 4.4.233 upstream stable release (LP: #1892822)
- media: rc: prevent memory leak in cx23888_ir_probe
- ath9k_htc: release allocated buffer if timed out
- ath9k: release allocated buffer if timed out
- nfs: Move call to security_inode_listsecurity into nfs_listxattr
- PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge
- drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl()
- drm: hold gem reference until object is no longer accessed
- f2fs: check memory boundary by insane namelen
- f2fs: check if file namelen exceeds max value
- ARM: 8986/1: hw_breakpoint: Don't invoke overflow handler on uaccess
  watchpoints
- fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
- rds: Prevent kernel-infoleak in rds_notify_queue_get()
- net/x25: Fix x25_neigh refcnt leak when x25 disconnect
- net/x25: Fix null-ptr-deref in x25_disconnect
- sh: Fix validation of system call number
- net: lan78xx: add missing endpoint sanity check
- net: lan78xx: fix transfer-buffer memory leak
- mlxsw: core: Increase scope of RCU read-side critical section
- mac80211: mesh: Free ie data when leaving mesh
- nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame
- net: ethernet: ravb: exit if re-initialization fails in tx timeout
- Revert "i2c: cadence: Fix the hold bit setting"
- xen-netfront: fix potential deadlock in xennet_remove()
- x86/i8259: Use printk_deferred() to prevent deadlock
- random32: update the net random state on interrupt and activity
- ARM: percpu.h: fix build error
- random: fix circular include dependency on arm64 after addition of 
percpu.h
- random32: remove net_rand_state from the latent entropy gcc plugin
- random32: move the pseudo-random 32-bit definitions to prandom.h
- ext4: fix direct I/O read error
- USB: serial: qcserial: add EM7305 QDL product ID
- ALSA: seq: oss: Serialize ioctls
- Bluetooth: Fix slab-out-of-bounds read in 
hci_extended_inquiry_result_evt()
- Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt()
- Bluetooth: Prevent out-of-bounds read in 
hci_inquiry_result_with_rssi_evt()
- vgacon: Fix for missing check in scrollback handling
- mtd: properly check all write ioctls for permissions
- net/9p: validate fds in p9_fd_open
- drm/nouveau/fbcon: fix module unload when fbcon init has failed for some
  reason
- cfg80211: check vendor command doit pointer before use
- igb: reinit_locked() should be called with rtnl_lock
- atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent
- tools lib traceevent: Fix memory leak in process_dynamic_array_len
- binder: Prevent context manager from incrementing ref 0
- ipv4: Silence suspicious RCU usage warning
- ipv6: fix memory leaks on IPV6_ADDRFORM path
- Revert "vxlan: fix tos value before xmit"
- net: lan78xx: replace bogus endpoint lookup
- usb: hso: check for return value in hso_serial_common_create()
- vxlan: Ensure FDB dump is performed under RCU
- Smack: fix use-after-free in smk_write_relabel_self()
- tracepoint: Mark __tracepoint_string's __used
- udp: drop corrupt packets earlier to avoid data corruption
- gpio: fix oops resulting from calling of_get_named_gpio(NULL, ...)
- EDAC: Fix reference count leaks
- m68k: mac: Don't send IOP message until channel is idle
- m68k: mac: Fix IOP status/control register writes
- ARM: at91: pm: add missing put_device() call in at91_pm_sram_init()
- ARM: socfpga: PM: add missing put_device() call in
  socfpga_setup_ocram_self_refresh()
- drm/tilcdc: fix leak & null ref in panel_connector_get_modes
- Bluetooth: add a mutex lock to avoid UAF in do_enale_set
- fs/btrfs: Add cond_resched() for try_release_extent_mapping() stalls
- drm/radeon: Fix reference count leaks caused by pm_runtime_get_sync
- video: fbdev: neofb: fix memory leak in neo_scan_monitor()
- drm/nouveau: fix multiple instances of reference count leaks
- drm/debugfs: fix plain echo to connector "force" attribute
- mm/mmap.c: Add cond_resched() for exit_mmap() CPU stalls
- brcmfmac: To fix Bss I

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-08-27 Thread Kelsey Margarete Skunberg
Did not include commit "cxl: Fix kobject memleak" while applying due to
a build failure on ppc64el  (thank you to Kamal for pointing this out.)
All other patches sent to the ML in this set are now on xenial/master-
next

** Changed in: linux (Ubuntu Xenial)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-08-24 Thread Khaled El Mously
** Description changed:

+ SRU Justification
  
- SRU Justification
+ Impact:
+    The upstream process for stable tree updates is quite similar
+    in scope to the Ubuntu SRU process, e.g., each patch has to
+    demonstrably fix a bug, and each patch is vetted by upstream
+    by originating either directly from a mainline/stable Linux tree or
+    a minimally backported form of that patch. The following upstream
+    stable patches should be included in the Ubuntu kernel:
  
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originating either directly from a mainline/stable Linux tree or
-a minimally backported form of that patch. The following upstream
-stable patches should be included in the Ubuntu kernel:
+    4.4.233 upstream stable release
+    from git://git.kernel.org/
  
-4.4.233 upstream stable release
-from git://git.kernel.org/
+ 
+ * xfs: don't call xfs_da_shrink_inode with NULL bp
+ * net: phy: mdio-bcm-unimac: fix potential NULL dereference in 
unimac_mdio_probe()
+ * media: rc: prevent memory leak in cx23888_ir_probe
+ * ath9k_htc: release allocated buffer if timed out
+ * ath9k: release allocated buffer if timed out
+ * nfs: Move call to security_inode_listsecurity into nfs_listxattr
+ * PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge
+ * drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl()
+ * drm: hold gem reference until object is no longer accessed
+ * f2fs: check memory boundary by insane namelen
+ * f2fs: check if file namelen exceeds max value
+ * ARM: 8986/1: hw_breakpoint: Don't invoke overflow handler on uaccess 
watchpoints
+ * fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
+ * rds: Prevent kernel-infoleak in rds_notify_queue_get()
+ * net/x25: Fix x25_neigh refcnt leak when x25 disconnect
+ * net/x25: Fix null-ptr-deref in x25_disconnect
+ * sh: Fix validation of system call number
+ * net: lan78xx: add missing endpoint sanity check
+ * net: lan78xx: fix transfer-buffer memory leak
+ * mlxsw: core: Increase scope of RCU read-side critical section
+ * mac80211: mesh: Free ie data when leaving mesh
+ * nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame
+ * net: ethernet: ravb: exit if re-initialization fails in tx timeout
+ * Revert "i2c: cadence: Fix the hold bit setting"
+ * xen-netfront: fix potential deadlock in xennet_remove()
+ * x86/i8259: Use printk_deferred() to prevent deadlock
+ * random32: update the net random state on interrupt and activity
+ * ARM: percpu.h: fix build error
+ * random: fix circular include dependency on arm64 after addition of percpu.h
+ * random32: remove net_rand_state from the latent entropy gcc plugin
+ * random32: move the pseudo-random 32-bit definitions to prandom.h
+ * ext4: fix direct I/O read error
+ * USB: serial: qcserial: add EM7305 QDL product ID
+ * ALSA: seq: oss: Serialize ioctls
+ * Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
+ * Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt()
+ * Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
+ * vgacon: Fix for missing check in scrollback handling
+ * mtd: properly check all write ioctls for permissions
+ * net/9p: validate fds in p9_fd_open
+ * drm/nouveau/fbcon: fix module unload when fbcon init has failed for some 
reason
+ * cfg80211: check vendor command doit pointer before use
+ * igb: reinit_locked() should be called with rtnl_lock
+ * atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent
+ * tools lib traceevent: Fix memory leak in process_dynamic_array_len
+ * binder: Prevent context manager from incrementing ref 0
+ * ipv4: Silence suspicious RCU usage warning
+ * ipv6: fix memory leaks on IPV6_ADDRFORM path
+ * Revert "vxlan: fix tos value before xmit"
+ * net: lan78xx: replace bogus endpoint lookup
+ * usb: hso: check for return value in hso_serial_common_create()
+ * vxlan: Ensure FDB dump is performed under RCU
+ * Smack: fix use-after-free in smk_write_relabel_self()
+ * tracepoint: Mark __tracepoint_string's __used
+ * udp: drop corrupt packets earlier to avoid data corruption
+ * gpio: fix oops resulting from calling of_get_named_gpio(NULL, ...)
+ * EDAC: Fix reference count leaks
+ * m68k: mac: Don't send IOP message until channel is idle
+ * m68k: mac: Fix IOP status/control register writes
+ * ARM: at91: pm: add missing put_device() call in at91_pm_sram_init()
+ * ARM: socfpga: PM: add missing put_device() call in 
socfpga_setup_ocram_self_refresh()
+ * drm/tilcdc: fix leak & null ref in panel_connector_get_modes
+ * Bluetooth: add a mutex lock to avoid UAF in do_enale_set
+ * fs/btrfs: Add cond_resched() for try_release_extent_mapping() stalls
+ * drm/radeon: Fix reference count

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-08-24 Thread Khaled El Mously
The conflict in #2 is due to the change
43711a479c1eb38a6c4836e31fddd5599aa95884 "bcache: fix high CPU occupancy
during journal" which was applied as part of
https://bugs.launchpad.net/bugs/1784665.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-08-24 Thread Khaled El Mously
Encountered minor conflict when applying:

bcache: allocate meta data pages as compound pages

in journal.c

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1892822] Re: Xenial update: 4.4.233 upstream stable release

2020-08-24 Thread Khaled El Mously
Skipped:
 - xfs: don't call xfs_da_shrink_inode with NULL bp (applied already for 
CVE-2018-13094)
 - net: phy: mdio-bcm-unimac: fix potential NULL dereference in 
unimac_mdio_probe() (fixed already for CVE-2018-8043)

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13094

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-8043

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892822

Title:
  Xenial update: 4.4.233 upstream stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1892822/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs