** Description changed:

  SRU Justification
  
      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The v4.12.7 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.
  
         git://git.kernel.org/
  
      TEST CASE: TBD
  
         The following patches from the v4.12.7 stable release shall be
  applied:
  
  ppp: Fix false xmit recursion detect with two ppp devices
  ppp: fix xmit recursion detection on ppp channels
  tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states
  net: fix keepalive code vs TCP_FASTOPEN_CONNECT
  ipv6: set rt6i_protocol properly in the route when it is installed
  bpf, s390: fix jit branch offset related to ldimm64
  net/mlx4_en: don't set CHECKSUM_COMPLETE on SCTP packets
  net: sched: set xt_tgchk_param par.net properly in ipt_init_target
  net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target
  tcp: fastopen: tcp_connect() must refresh the route
  qmi_wwan: fix NULL deref on disconnect
  net: avoid skb_warn_bad_offload false positives on UFO
  igmp: Fix regression caused by igmp sysctl namespace code.
- udp: consistently apply ufo or fragmentation
  packet: fix tp_reserve race in packet_set_ring
  scsi: sg: only check for dxfer_len greater than 256M
  btrfs: Remove false alert when fiemap range is smaller than on-disk extent
  Linux 4.12.7
+ 
+        The following patches from the v4.12.7 stable release shall be
+ applied:
+ 
+ udp: consistently apply ufo or fragmentation

** Description changed:

  SRU Justification
  
      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The v4.12.7 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.
  
         git://git.kernel.org/
  
      TEST CASE: TBD
  
         The following patches from the v4.12.7 stable release shall be
  applied:
  
  ppp: Fix false xmit recursion detect with two ppp devices
  ppp: fix xmit recursion detection on ppp channels
  tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states
  net: fix keepalive code vs TCP_FASTOPEN_CONNECT
  ipv6: set rt6i_protocol properly in the route when it is installed
  bpf, s390: fix jit branch offset related to ldimm64
  net/mlx4_en: don't set CHECKSUM_COMPLETE on SCTP packets
  net: sched: set xt_tgchk_param par.net properly in ipt_init_target
  net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target
  tcp: fastopen: tcp_connect() must refresh the route
  qmi_wwan: fix NULL deref on disconnect
  net: avoid skb_warn_bad_offload false positives on UFO
  igmp: Fix regression caused by igmp sysctl namespace code.
- packet: fix tp_reserve race in packet_set_ring
  scsi: sg: only check for dxfer_len greater than 256M
  btrfs: Remove false alert when fiemap range is smaller than on-disk extent
  Linux 4.12.7
  
         The following patches from the v4.12.7 stable release shall be
  applied:
  
  udp: consistently apply ufo or fragmentation
+ packet: fix tp_reserve race in packet_set_ring

** Changed in: linux (Ubuntu Artful)
       Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1710649

Title:
  Artful update to v4.12.7 stable release

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Artful:
  Fix Committed

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The v4.12.7 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the v4.12.7 stable release shall be
  applied:

  ppp: Fix false xmit recursion detect with two ppp devices
  ppp: fix xmit recursion detection on ppp channels
  tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states
  net: fix keepalive code vs TCP_FASTOPEN_CONNECT
  ipv6: set rt6i_protocol properly in the route when it is installed
  bpf, s390: fix jit branch offset related to ldimm64
  net/mlx4_en: don't set CHECKSUM_COMPLETE on SCTP packets
  net: sched: set xt_tgchk_param par.net properly in ipt_init_target
  net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target
  tcp: fastopen: tcp_connect() must refresh the route
  qmi_wwan: fix NULL deref on disconnect
  net: avoid skb_warn_bad_offload false positives on UFO
  igmp: Fix regression caused by igmp sysctl namespace code.
  scsi: sg: only check for dxfer_len greater than 256M
  btrfs: Remove false alert when fiemap range is smaller than on-disk extent
  Linux 4.12.7

         The following patches from the v4.12.7 stable release shall be
  applied:

  udp: consistently apply ufo or fragmentation
  packet: fix tp_reserve race in packet_set_ring

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1710649/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to