The following patches were skipped because they were already applied:

* bug #1623750 Request to backport cxlflash patches to Xenial SRU
  stream
  - scsi: cxlflash: Scan host only after the port is ready for I/O
  - scsi: cxlflash: Fix to avoid EEH and host reset collisions
  - scsi: cxlflash: Improve EEH recovery time
* bug #1669153 Add Use-After-Free Patch for Ubuntu16.10 - EEH
  on BELL3 adapter fails to recover (serial/tty
  - 8250_pci: Fix potential use-after-free in error path

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.67 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.67 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.67 stable release shall be
- applied:
+ The following patches from the 4.4.67 stable release shall be applied:
+ * timerfd: Protect the might cancel mechanism proper
+ * Handle mismatched open calls
+ * ASoC: intel: Fix PM and non-atomic crash in bytcr drivers
+ * ALSA: ppc/awacs: shut up maybe-uninitialized warning
+ * drbd: avoid redefinition of BITS_PER_PAGE
+ * mtd: avoid stack overflow in MTD CFI code
+ * net: tg3: avoid uninitialized variable warning
+ * netlink: Allow direct reclaim for fallback allocation
+ * IB/qib: rename BITS_PER_PAGE to RVT_BITS_PER_PAGE
+ * IB/ehca: fix maybe-uninitialized warnings
+ * ext4: require encryption feature for EXT4_IOC_SET_ENCRYPTION_POLICY
+ * ext4 crypto: revalidate dentry after adding or removing the key
+ * ext4 crypto: use dget_parent() in ext4_d_revalidate()
+ * ext4/fscrypto: avoid RCU lookup in d_revalidate
+ * nfsd4: minor NFSv2/v3 write decoding cleanup
+ * nfsd: stricter decoding of write-like NFSv2/v3 ops
+ * dm ioctl: prevent stack leak in dm ioctl call
+ * Linux 4.4.67

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689296

Title:
  Xenial update to 4.4.67 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.67 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

  The following patches from the 4.4.67 stable release shall be applied:
  * timerfd: Protect the might cancel mechanism proper
  * Handle mismatched open calls
  * ASoC: intel: Fix PM and non-atomic crash in bytcr drivers
  * ALSA: ppc/awacs: shut up maybe-uninitialized warning
  * drbd: avoid redefinition of BITS_PER_PAGE
  * mtd: avoid stack overflow in MTD CFI code
  * net: tg3: avoid uninitialized variable warning
  * netlink: Allow direct reclaim for fallback allocation
  * IB/qib: rename BITS_PER_PAGE to RVT_BITS_PER_PAGE
  * IB/ehca: fix maybe-uninitialized warnings
  * ext4: require encryption feature for EXT4_IOC_SET_ENCRYPTION_POLICY
  * ext4 crypto: revalidate dentry after adding or removing the key
  * ext4 crypto: use dget_parent() in ext4_d_revalidate()
  * ext4/fscrypto: avoid RCU lookup in d_revalidate
  * nfsd4: minor NFSv2/v3 write decoding cleanup
  * nfsd: stricter decoding of write-like NFSv2/v3 ops
  * dm ioctl: prevent stack leak in dm ioctl call
  * Linux 4.4.67

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1689296/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to