Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree
or a minimally backported form of that patch. The 4.4.126 upstream
stable stable patch set is now available. It should be included
in the Ubuntu kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches from the 4.4.126 stable release shall be
applied:
* Linux 4.4.126
* net: systemport: Rewrite __bcm_sysport_tx_reclaim()
* net: fec: Fix unbalanced PM runtime calls
* ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
* s390/qeth: on channel error, reject further cmd requests
* s390/qeth: lock read device while queueing next buffer
* s390/qeth: when thread completes, wake up all waiters
* s390/qeth: free netdevice when removing a card
* team: Fix double free in error path
* skbuff: Fix not waking applications when errors are enqueued
* net: Only honor ifindex in IP_PKTINFO if non-0
* netlink: avoid a double skb free in genlmsg_mcast()
* net/iucv: Free memory obtained by kzalloc
* net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY
interface
* net: ethernet: arc: Fix a potential memory leak if an optional regulator
is deferred
* l2tp: do not accept arbitrary sockets
* ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()
* dccp: check sk for closed state in dccp_sendmsg()
* net: Fix hlist corruptions in inet_evict_bucket()
* Revert "genirq: Use irqd_get_trigger_type to compare the trigger type for
shared IRQs"
* scsi: sg: don't return bogus Sg_requests
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Tags: kernel-stable-tracking-bug
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree
or a minimally backported form of that patch. The 4.4.126 upstream
stable stable patch set is now available. It should be included
in the Ubuntu kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches from the 4.4.126 stable release shall be
applied:
- <to-be-filled-in>
+ * Linux 4.4.126
+ * net: systemport: Rewrite __bcm_sysport_tx_reclaim()
+ * net: fec: Fix unbalanced PM runtime calls
+ * ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
+ * s390/qeth: on channel error, reject further cmd requests
+ * s390/qeth: lock read device while queueing next buffer
+ * s390/qeth: when thread completes, wake up all waiters
+ * s390/qeth: free netdevice when removing a card
+ * team: Fix double free in error path
+ * skbuff: Fix not waking applications when errors are enqueued
+ * net: Only honor ifindex in IP_PKTINFO if non-0
+ * netlink: avoid a double skb free in genlmsg_mcast()
+ * net/iucv: Free memory obtained by kzalloc
+ * net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII
PHY interface
+ * net: ethernet: arc: Fix a potential memory leak if an optional regulator
is deferred
+ * l2tp: do not accept arbitrary sockets
+ * ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()
+ * dccp: check sk for closed state in dccp_sendmsg()
+ * net: Fix hlist corruptions in inet_evict_bucket()
+ * Revert "genirq: Use irqd_get_trigger_type to compare the trigger type
for shared IRQs"
+ * scsi: sg: don't return bogus Sg_requests
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1764999
Title:
Xenial update to 4.4.126 stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1764999/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs