** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The v4.4.59 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The v4.4.59 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches from the v4.4.59 stable release shall be + applied: - The following patches from the v4.4.59 stable release shall be - applied: + xfrm: policy: init locks early + xfrm_user: validate XFRM_MSG_NEWAE XFRMA_REPLAY_ESN_VAL replay_window + xfrm_user: validate XFRM_MSG_NEWAE incoming ESN size harder + virtio_balloon: init 1st buffer in stats vq + pinctrl: qcom: Don't clear status bit on irq_unmask + c6x/ptrace: Remove useless PTRACE_SETREGSET implementation + h8300/ptrace: Fix incorrect register transfer count + mips/ptrace: Preserve previous registers for short regset write + sparc/ptrace: Preserve previous registers for short regset write + metag/ptrace: Preserve previous registers for short regset write + metag/ptrace: Provide default TXSTATUS for short NT_PRSTATUS + metag/ptrace: Reject partial NT_METAG_RPIPE writes + fscrypt: remove broken support for detecting keyring key revocation + sched/rt: Add a missing rescheduling point + Linux 4.4.59
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1678960 Title: Xenial update to v4.4.59 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1678960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs