** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1892822
Title:
Xenial update: 4.4.233 upstream stable release
Status in
This bug was fixed in the package linux - 4.4.0-190.220
---
linux (4.4.0-190.220) xenial; urgency=medium
* xenial/linux: 4.4.0-190.220 -proposed tracker (LP: #1893431)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* [Hyper-V] VSS and File Copy daem
Did not include commit "cxl: Fix kobject memleak" while applying due to
a build failure on ppc64el (thank you to Kamal for pointing this out.)
All other patches sent to the ML in this set are now on xenial/master-
next
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
The conflict in #2 is due to the change
43711a479c1eb38a6c4836e31fddd5599aa95884 "bcache: fix high CPU occupancy
during journal" which was applied as part of
https://bugs.launchpad.net/bugs/1784665.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscr
Encountered minor conflict when applying:
bcache: allocate meta data pages as compound pages
in journal.c
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1892822
Title:
Xenial update: 4
Skipped:
- xfs: don't call xfs_da_shrink_inode with NULL bp (applied already for
CVE-2018-13094)
- net: phy: mdio-bcm-unimac: fix potential NULL dereference in
unimac_mdio_probe() (fixed already for CVE-2018-8043)
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-13094
** CVE
7 matches
Mail list logo