Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree
   or a minimally backported form of that patch. The 4.4.126 upstream
   stable stable patch set is now available. It should be included
   in the Ubuntu kernel as well.

   git://git.kernel.org/

TEST CASE: TBD

   The following patches from the 4.4.126 stable release shall be
   applied:

   * Linux 4.4.126
   * net: systemport: Rewrite __bcm_sysport_tx_reclaim()
   * net: fec: Fix unbalanced PM runtime calls
   * ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
   * s390/qeth: on channel error, reject further cmd requests
   * s390/qeth: lock read device while queueing next buffer
   * s390/qeth: when thread completes, wake up all waiters
   * s390/qeth: free netdevice when removing a card
   * team: Fix double free in error path
   * skbuff: Fix not waking applications when errors are enqueued
   * net: Only honor ifindex in IP_PKTINFO if non-0
   * netlink: avoid a double skb free in genlmsg_mcast()
   * net/iucv: Free memory obtained by kzalloc
   * net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII PHY 
interface
   * net: ethernet: arc: Fix a potential memory leak if an optional regulator 
is deferred
   * l2tp: do not accept arbitrary sockets
   * ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()
   * dccp: check sk for closed state in dccp_sendmsg()
   * net: Fix hlist corruptions in inet_evict_bucket()
   * Revert "genirq: Use irqd_get_trigger_type to compare the trigger type for 
shared IRQs"
   * scsi: sg: don't return bogus Sg_requests

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Description changed:

  
  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree
     or a minimally backported form of that patch. The 4.4.126 upstream
     stable stable patch set is now available. It should be included
     in the Ubuntu kernel as well.
  
     git://git.kernel.org/
  
  TEST CASE: TBD
  
     The following patches from the 4.4.126 stable release shall be
     applied:
  
- <to-be-filled-in>
+    * Linux 4.4.126
+    * net: systemport: Rewrite __bcm_sysport_tx_reclaim()
+    * net: fec: Fix unbalanced PM runtime calls
+    * ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event()
+    * s390/qeth: on channel error, reject further cmd requests
+    * s390/qeth: lock read device while queueing next buffer
+    * s390/qeth: when thread completes, wake up all waiters
+    * s390/qeth: free netdevice when removing a card
+    * team: Fix double free in error path
+    * skbuff: Fix not waking applications when errors are enqueued
+    * net: Only honor ifindex in IP_PKTINFO if non-0
+    * netlink: avoid a double skb free in genlmsg_mcast()
+    * net/iucv: Free memory obtained by kzalloc
+    * net: ethernet: ti: cpsw: add check for in-band mode setting with RGMII 
PHY interface
+    * net: ethernet: arc: Fix a potential memory leak if an optional regulator 
is deferred
+    * l2tp: do not accept arbitrary sockets
+    * ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option()
+    * dccp: check sk for closed state in dccp_sendmsg()
+    * net: Fix hlist corruptions in inet_evict_bucket()
+    * Revert "genirq: Use irqd_get_trigger_type to compare the trigger type 
for shared IRQs"
+    * scsi: sg: don't return bogus Sg_requests

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1764999

Title:
  Xenial update to 4.4.126 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1764999/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to