[Bug 1902095] Re: Xenial update: v4.4.239 upstream stable release
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1902095 Title: Xenial update: v4.4.239 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1902095/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1902095] Re: Xenial update: v4.4.239 upstream stable release
This bug was fixed in the package linux - 4.4.0-197.229 --- linux (4.4.0-197.229) xenial; urgency=medium * xenial/linux: 4.4.0-197.229 -proposed tracker (LP: #1905489) * sha1_ce and sha2_ce modules no longer load on arm64 (LP: #1905336) - SAUCE: Revert "crypto: arm64/sha - avoid non-standard inline asm tricks" * Fails to build on powerpc (LP: #1905475) - powerpc/uaccess-flush: fix corenet64_smp_defconfig build - SAUCE: powerpc/uaccess: only include kup-radix.h on PPC_BOOK3S_64 linux (4.4.0-196.228) xenial; urgency=medium * xenial/linux: 4.4.0-196.228 -proposed tracker (LP: #1905309) * CVE-2020-4788 - SAUCE: powerpc/64s: Define MASKABLE_RELON_EXCEPTION_PSERIES_OOL - SAUCE: powerpc/64s: move some exception handlers out of line - powerpc/64s: flush L1D on kernel entry - SAUCE: powerpc: Add a framework for user access tracking - powerpc: Implement user_access_begin and friends - powerpc: Fix __clear_user() with KUAP enabled - powerpc/uaccess: Evaluate macro arguments once, before user access is allowed - powerpc/64s: flush L1D after user accesses linux (4.4.0-195.227) xenial; urgency=medium * xenial/linux: 4.4.0-195.227 -proposed tracker (LP: #1903107) * Update kernel packaging to support forward porting kernels (LP: #1902957) - [Debian] Update for leader included in BACKPORT_SUFFIX * Avoid double newline when running insertchanges (LP: #1903293) - [Packaging] insertchanges: avoid double newline * EFI: Fails when BootCurrent entry does not exist (LP: #183) - efivarfs: Replace invalid slashes with exclamation marks in dentries. * CVE-2020-14351 - perf/core: Fix race in the perf_mmap_close() function * CVE-2020-25645 - geneve: add transport ports in route lookup for geneve * Xenial update: v4.4.241 upstream stable release (LP: #1902097) - ibmveth: Identify ingress large send packets. - tipc: fix the skb_unshare() in tipc_buf_append() - net/ipv4: always honour route mtu during forwarding - r8169: fix data corruption issue on RTL8402 - ALSA: bebob: potential info leak in hwdep_read() - mm/kasan: print name of mem[set,cpy,move]() caller in report - mm/kasan: add API to check memory regions - compiler.h, kasan: Avoid duplicating __read_once_size_nocheck() - compiler.h: Add read_word_at_a_time() function. - lib/strscpy: Shut up KASAN false-positives in strscpy() - x86/mm/ptdump: Fix soft lockup in page table walker - net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device - net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling ether_setup - nfc: Ensure presence of NFC_ATTR_FIRMWARE_NAME attribute in nfc_genl_fw_download() - tcp: fix to update snd_wl1 in bulk receiver fast path - icmp: randomize the global rate limiter - cifs: remove bogus debug code - ima: Don't ignore errors from crypto_shash_update() - EDAC/i5100: Fix error handling order in i5100_init_one() - crypto: ixp4xx - Fix the size used in a 'dma_free_coherent()' call - media: Revert "media: exynos4-is: Add missed check for pinctrl_lookup_state()" - media: m5mols: Check function pointer in m5mols_sensor_power - media: omap3isp: Fix memleak in isp_probe - crypto: omap-sham - fix digcnt register handling with export/import - media: tc358743: initialize variable - media: ti-vpe: Fix a missing check and reference count leak - ath6kl: prevent potential array overflow in ath6kl_add_new_sta() - ath9k: Fix potential out of bounds in ath9k_htc_txcompletion_cb() - wcn36xx: Fix reported 802.11n rx_highest rate wcn3660/wcn3680 - mwifiex: Do not use GFP_KERNEL in atomic context - drm/gma500: fix error check - scsi: qla4xxx: Fix an error handling path in 'qla4xxx_get_host_stats()' - scsi: csiostor: Fix wrong return value in csio_hw_prep_fw() - backlight: sky81452-backlight: Fix refcount imbalance on error - VMCI: check return value of get_user_pages_fast() for errors - tty: serial: earlycon dependency - pty: do tty_flip_buffer_push without port->lock in pty_write - drivers/virt/fsl_hypervisor: Fix error handling path - video: fbdev: vga16fb: fix setting of pixclock because a pass-by-value error - video: fbdev: sis: fix null ptr dereference - HID: roccat: add bounds checking in kone_sysfs_write_settings() - ath6kl: wmi: prevent a shift wrapping bug in ath6kl_wmi_delete_pstream_cmd() - misc: mic: scif: Fix error handling path - ALSA: seq: oss: Avoid mutex lock for a long-time ioctl - quota: clear padding in v2r1_mem2diskdqb() - net: enic: Cure the enic api locking trainwreck - mfd: sm501: Fix leaks in probe() - usb: gadget: u_ether: enable qmult on SuperSpeed Plus as well - nl80211: fix non-split wiphy information - mwifiex: fix double free - net: korina: fix kfree of rx/tx descriptor array - IB/mlx4: Adj
[Bug 1902095] Re: Xenial update: v4.4.239 upstream stable release
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1902095 Title: Xenial update: v4.4.239 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1902095/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1902095] Re: Xenial update: v4.4.239 upstream stable release
** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Kamal Mostafa (kamalmostafa) ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The following upstream + stable patches should be included in the Ubuntu kernel: - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The following upstream -stable patches should be included in the Ubuntu kernel: + v4.4.239 upstream stable release + from git://git.kernel.org/ -v4.4.239 upstream stable release -from git://git.kernel.org/ + gpio: tc35894: fix up tc35894 interrupt configuration + Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 + drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config + net: dec: de2104x: Increase receive ring size for Tulip + rndis_host: increase sleep time in the query-response loop + drivers/net/wan/lapbether: Make skb->protocol consistent with the header + drivers/net/wan/hdlc: Set skb->protocol before transmitting + nfs: Fix security label length not being reset + clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED + iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() + i2c: cpm: Fix i2c_ram structure + epoll: do not insert into poll queues until all sanity checks are done + epoll: replace ->visited/visited_list with generation count + epoll: EPOLL_CTL_ADD: close the race in decision to take fast path + ep_create_wakeup_source(): dentry name can change under you... + netfilter: ctnetlink: add a range check for l3/l4 protonum + fbdev, newport_con: Move FONT_EXTRA_WORDS macros into linux/font.h + Fonts: Support FONT_EXTRA_WORDS macros for built-in fonts + Revert "ravb: Fixed to be able to unload modules" + fbcon: Fix global-out-of-bounds read in fbcon_get_font() + net: wireless: nl80211: fix out-of-bounds access in nl80211_del_key() + usermodehelper: reset umask to default before executing user process + platform/x86: thinkpad_acpi: initialize tp_nvram_state variable + platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse + driver core: Fix probe_count imbalance in really_probe() + perf top: Fix stdio interface input handling with glibc 2.28+ + sctp: fix sctp_auth_init_hmacs() error path + team: set dev->needed_headroom in team_setup_by_port() + net: team: fix memory leak in __team_options_register + mtd: nand: Provide nand_cleanup() function to free NAND related resources + xfrm: clone XFRMA_REPLAY_ESN_VAL in xfrm_do_migrate + xfrm: clone whole liftime_cur structure in xfrm_do_migrate + net: stmmac: removed enabling eee in EEE set callback + xfrm: Use correct address family in xfrm_state_find + bonding: set dev->needed_headroom in bond_setup_by_slave() + rxrpc: Fix rxkad token xdr encoding + rxrpc: Downgrade the BUG() for unsupported token type in rxrpc_read() + rxrpc: Fix server keyring leak + net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails + Linux 4.4.239 + UBUNTU: upstream stable to v4.4.239 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1902095 Title: Xenial update: v4.4.239 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1902095/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs