The following patches were skipped because they were already applied: * bug #1623750 Request to backport cxlflash patches to Xenial SRU stream - scsi: cxlflash: Scan host only after the port is ready for I/O - scsi: cxlflash: Fix to avoid EEH and host reset collisions - scsi: cxlflash: Improve EEH recovery time * bug #1669153 Add Use-After-Free Patch for Ubuntu16.10 - EEH on BELL3 adapter fails to recover (serial/tty - 8250_pci: Fix potential use-after-free in error path
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.4.67 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.4.67 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - - The following patches from the 4.4.67 stable release shall be - applied: + The following patches from the 4.4.67 stable release shall be applied: + * timerfd: Protect the might cancel mechanism proper + * Handle mismatched open calls + * ASoC: intel: Fix PM and non-atomic crash in bytcr drivers + * ALSA: ppc/awacs: shut up maybe-uninitialized warning + * drbd: avoid redefinition of BITS_PER_PAGE + * mtd: avoid stack overflow in MTD CFI code + * net: tg3: avoid uninitialized variable warning + * netlink: Allow direct reclaim for fallback allocation + * IB/qib: rename BITS_PER_PAGE to RVT_BITS_PER_PAGE + * IB/ehca: fix maybe-uninitialized warnings + * ext4: require encryption feature for EXT4_IOC_SET_ENCRYPTION_POLICY + * ext4 crypto: revalidate dentry after adding or removing the key + * ext4 crypto: use dget_parent() in ext4_d_revalidate() + * ext4/fscrypto: avoid RCU lookup in d_revalidate + * nfsd4: minor NFSv2/v3 write decoding cleanup + * nfsd: stricter decoding of write-like NFSv2/v3 ops + * dm ioctl: prevent stack leak in dm ioctl call + * Linux 4.4.67 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1689296 Title: Xenial update to 4.4.67 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.67 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.67 stable release shall be applied: * timerfd: Protect the might cancel mechanism proper * Handle mismatched open calls * ASoC: intel: Fix PM and non-atomic crash in bytcr drivers * ALSA: ppc/awacs: shut up maybe-uninitialized warning * drbd: avoid redefinition of BITS_PER_PAGE * mtd: avoid stack overflow in MTD CFI code * net: tg3: avoid uninitialized variable warning * netlink: Allow direct reclaim for fallback allocation * IB/qib: rename BITS_PER_PAGE to RVT_BITS_PER_PAGE * IB/ehca: fix maybe-uninitialized warnings * ext4: require encryption feature for EXT4_IOC_SET_ENCRYPTION_POLICY * ext4 crypto: revalidate dentry after adding or removing the key * ext4 crypto: use dget_parent() in ext4_d_revalidate() * ext4/fscrypto: avoid RCU lookup in d_revalidate * nfsd4: minor NFSv2/v3 write decoding cleanup * nfsd: stricter decoding of write-like NFSv2/v3 ops * dm ioctl: prevent stack leak in dm ioctl call * Linux 4.4.67 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1689296/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp