Public bug reported: SRU Justification
Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The following upstream stable patches should be included in the Ubuntu kernel: 4.4.222 upstream stable release from git://git.kernel.org/ The following patches from the 4.4.222 stable release shall be applied: * ext4: fix special inode number checks in __ext4_iget() * drm/qxl: qxl_release leak in qxl_hw_surface_alloc() * ALSA: pcm: oss: Place the plugin buffer overflow checks correctly * PM: ACPI: Output correct message on target power state * RDMA/mlx4: Initialize ib_spec on the stack * vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() * ALSA: opti9xx: shut up gcc-10 range warning * nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl * dmaengine: dmatest: Fix iteration non-stop logic * i2c: designware-pci: use IRQF_COND_SUSPEND flag * perf hists: Fix HISTC_MEM_DCACHELINE width setting * powerpc/perf: Remove PPMU_HAS_SSLOT flag for Power8 * perf/x86: Fix uninitialized value usage * exynos4-is: fix a format string bug * ASoC: wm8960: Fix WM8960_SYSCLK_PLL mode * ASoC: imx-spdif: Fix crash on suspend * ipv6: use READ_ONCE() for inet->hdrincl as in ipv4 * selinux: properly handle multiple messages in selinux_netlink_send() * Linux 4.4.222 ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags: kernel-stable-tracking-bug ** Changed in: linux (Ubuntu) Status: New => Confirmed ** Tags added: kernel-stable-tracking-bug ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1878246 Title: Xenial update: 4.4.222 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878246/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs