Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The v4.4.50 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the v4.4.50 stable release shall be applied: can: Fix kernel panic at security_sock_rcv_skb ipv6: fix ip6_tnl_parse_tlv_enc_lim() ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim() tcp: fix 0 divide in __tcp_select_window() net: use a work queue to defer net_disable_timestamp() work ipv4: keep skb->dst around in presence of IP options netlabel: out of bound access in cipso_v4_validate() ip6_gre: fix ip6gre_err() invalid reads ipv6: tcp: add a missing tcp_v6_restore_cb() tcp: avoid infinite loop in tcp_splice_read() tun: read vnet_hdr_sz once macvtap: read vnet_hdr_size once mlx4: Invoke softirqs after napi_reschedule sctp: avoid BUG_ON on sctp_wait_for_sndbuf sit: fix a double free on error path net: introduce device min_header_len packet: round up linear to header len ping: fix a null pointer dereference l2tp: do not use udp_ioctl() Linux 4.4.50 ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The v4.4.50 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The v4.4.50 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD + The following patches from the v4.4.50 stable release shall be + applied: - The following patches from the v4.4.50 stable release shall be - applied: + can: Fix kernel panic at security_sock_rcv_skb + ipv6: fix ip6_tnl_parse_tlv_enc_lim() + ipv6: pointer math error in ip6_tnl_parse_tlv_enc_lim() + tcp: fix 0 divide in __tcp_select_window() + net: use a work queue to defer net_disable_timestamp() work + ipv4: keep skb->dst around in presence of IP options + netlabel: out of bound access in cipso_v4_validate() + ip6_gre: fix ip6gre_err() invalid reads + ipv6: tcp: add a missing tcp_v6_restore_cb() + tcp: avoid infinite loop in tcp_splice_read() + tun: read vnet_hdr_sz once + macvtap: read vnet_hdr_size once + mlx4: Invoke softirqs after napi_reschedule + sctp: avoid BUG_ON on sctp_wait_for_sndbuf + sit: fix a double free on error path + net: introduce device min_header_len + packet: round up linear to header len + ping: fix a null pointer dereference + l2tp: do not use udp_ioctl() + Linux 4.4.50 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1666324 Title: Xenial update to v4.4.50 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1666324/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs