The following 3 patches were skipped as they have already been applied when 
fixing up the kernel for CVE-2017-1000364:
 - mm: larger stack guard gap, between vmas
 - Allow stack to grow up to address space limit
 - mm: fix new crash in unmapped_area_topdown()

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.74 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.74 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.74 stable release shall be
- applied:
+ The following patches from the 4.4.74 stable release shall be applied:
+ * configfs: Fix race between create_link and configfs_rmdir
+ * can: gs_usb: fix memory leak in gs_cmd_reset()
+ * cpufreq: conservative: Allow down_threshold to take values from 1 to 10
+ * vb2: Fix an off by one error in 'vb2_plane_vaddr'
+ * mac80211: don't look at the PM bit of BAR frames
+ * mac80211/wpa: use constant time memory comparison for MACs
+ * mac80211: fix CSA in IBSS mode
+ * mac80211: fix IBSS presp allocation size
+ * serial: efm32: Fix parity management in 'efm32_uart_console_get_options()'
+ * x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init()
+ * mfd: omap-usb-tll: Fix inverted bit use for USB TLL mode
+ * staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data()
+ * iio: proximity: as3935: recalibrate RCO after resume
+ * USB: hub: fix SS max number of ports
+ * usb: core: fix potential memory leak in error path during hcd creation
+ * pvrusb2: reduce stack usage pvr2_eeprom_analyze()
+ * USB: gadget: dummy_hcd: fix hub-descriptor removable fields
+ * usb: r8a66597-hcd: select a different endpoint on timeout
+ * usb: r8a66597-hcd: decrease timeout
+ * drivers/misc/c2port/c2port-duramar2150.c: checking for NULL instead of
+   IS_ERR()
+ * usb: xhci: ASMedia ASM1042A chipset need shorts TX quirk
+ * USB: gadgetfs, dummy-hcd, net2280: fix locking for callbacks
+ * mm/memory-failure.c: use compound_head() flags for huge pages
+ * swap: cond_resched in swap_cgroup_prepare()
+ * genirq: Release resources in __setup_irq() error path
+ * alarmtimer: Prevent overflow of relative timers
+ * usb: dwc3: exynos fix axius clock error path to do cleanup
+ * MIPS: Fix bnezc/jialc return address calculation
+ * alarmtimer: Rate limit periodic intervals
+ * Linux 4.4.74

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000364

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1702104

Title:
  Xenial update to 4.4.74 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.74 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

  The following patches from the 4.4.74 stable release shall be applied:
  * configfs: Fix race between create_link and configfs_rmdir
  * can: gs_usb: fix memory leak in gs_cmd_reset()
  * cpufreq: conservative: Allow down_threshold to take values from 1 to 10
  * vb2: Fix an off by one error in 'vb2_plane_vaddr'
  * mac80211: don't look at the PM bit of BAR frames
  * mac80211/wpa: use constant time memory comparison for MACs
  * mac80211: fix CSA in IBSS mode
  * mac80211: fix IBSS presp allocation size
  * serial: efm32: Fix parity management in 'efm32_uart_console_get_options()'
  * x86/mm/32: Set the '__vmalloc_start_set' flag in initmem_init()
  * mfd: omap-usb-tll: Fix inverted bit use for USB TLL mode
  * staging: rtl8188eu: prevent an underflow in rtw_check_beacon_data()
  * iio: proximity: as3935: recalibrate RCO after resume
  * USB: hub: fix SS max number of ports
  * usb: core: fix potential memory leak in error path during hcd creation
  * pvrusb2: reduce stack usage pvr2_eeprom_analyze()
  * USB: gadget: dummy_hcd: fix hub-descriptor removable fields
  * usb: r8a66597-hcd: select a different endpoint on timeout
  * usb: r8a66597-hcd: decrease timeout
  * drivers/misc/c2port/c2port-duramar2150.c: checking for NULL instead of
    IS_ERR()
  * usb: xhci: ASMedia ASM1042A chipset need shorts TX quirk
  * USB: gadgetfs, dummy-hcd, net2280: fix locking for callbacks
  * mm/memory-failure.c: use compound_head() flags for huge pages
  * swap: cond_resched in swap_cgroup_prepare()
  * genirq: Release resources in __setup_irq() error path
  * alarmtimer: Prevent overflow of relative timers
  * usb: dwc3: exynos fix axius clock error path to do cleanup
  * MIPS: Fix bnezc/jialc return address calculation
  * alarmtimer: Rate limit periodic intervals
  * Linux 4.4.74

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1702104/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to