** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1705707 Title: Xenial update to 4.4.78 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.78 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.78 stable release shall be applied: * net_sched: fix error recovery at qdisc creation * net: sched: Fix one possible panic when no destroy callback * net/phy: micrel: configure intterupts after autoneg workaround * ipv6: avoid unregistering inet6_dev for loopback * net: dp83640: Avoid NULL pointer dereference. * tcp: reset sk_rx_dst in tcp_disconnect() * net: prevent sign extension in dev_get_stats() * bpf: prevent leaking pointer via xadd on unpriviledged * net: handle NAPI_GRO_FREE_STOLEN_HEAD case also in napi_frags_finish() * ipv6: dad: don't remove dynamic addresses if link is down * net: ipv6: Compare lwstate in detecting duplicate nexthops * vrf: fix bug_on triggered by rx when destroying a vrf * rds: tcp: use sock_create_lite() to create the accept socket * brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx() * cfg80211: Define nla_policy for NL80211_ATTR_LOCAL_MESH_POWER_MODE * cfg80211: Validate frequencies nested in NL80211_ATTR_SCAN_FREQUENCIES * cfg80211: Check if PMKID attribute is of expected size * irqchip/gic-v3: Fix out-of-bound access in gic_set_affinity * parisc: Report SIGSEGV instead of SIGBUS when running out of stack * parisc: use compat_sys_keyctl() * parisc: DMA API: return error instead of BUG_ON for dma ops on non dma devs * parisc/mm: Ensure IRQs are off in switch_mm() * tools/lib/lockdep: Reduce MAX_LOCK_DEPTH to avoid overflowing lock_chain/: Depth * kernel/extable.c: mark core_kernel_text notrace * mm/list_lru.c: fix list_lru_count_node() to be race free * fs/dcache.c: fix spin lockup issue on nlru->lock * checkpatch: silence perl 5.26.0 unescaped left brace warnings * binfmt_elf: use ELF_ET_DYN_BASE only for PIE * arm: move ELF_ET_DYN_BASE to 4MB * arm64: move ELF_ET_DYN_BASE to 4GB / 4MB * powerpc: move ELF_ET_DYN_BASE to 4GB / 4MB * s390: reduce ELF_ET_DYN_BASE * exec: Limit arg stack to at most 75% of _STK_LIM * vt: fix unchecked __put_user() in tioclinux ioctls * mnt: In umount propagation reparent in a separate pass * mnt: In propgate_umount handle visiting mounts in any order * mnt: Make propagate_umount less slow for overlapping mount propagation trees * selftests/capabilities: Fix the test_execve test * tpm: Get rid of chip->pdev * tpm: Provide strong locking for device removal * Add "shutdown" to "struct class". * tpm: Issue a TPM2_Shutdown for TPM2 devices. * mm: fix overflow check in expand_upwards() * crypto: talitos - Extend max key length for SHA384/512-HMAC and AEAD * crypto: atmel - only treat EBUSY as transient if backlog * crypto: sha1-ssse3 - Disable avx2 * crypto: caam - fix signals handling * sched/topology: Fix overlapping sched_group_mask * sched/topology: Optimize build_group_mask() * PM / wakeirq: Convert to SRCU * PM / QoS: return -EINVAL for bogus strings * tracing: Use SOFTIRQ_OFFSET for softirq dectection for more accurate results * KVM: x86: disable MPX if host did not enable MPX XSAVE features * kvm: vmx: Do not disable intercepts for BNDCFGS * kvm: x86: Guest BNDCFGS requires guest MPX support * kvm: vmx: Check value written to IA32_BNDCFGS * kvm: vmx: allow host to access guest MSR_IA32_BNDCFGS * Linux 4.4.78 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705707/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp