** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress
** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Stefan Bader (smb) ** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1711535 Title: Xenial update to 4.4.82 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.82 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.82 stable release shall be applied: * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states * net: fix keepalive code vs TCP_FASTOPEN_CONNECT * bpf, s390: fix jit branch offset related to ldimm64 * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target * tcp: fastopen: tcp_connect() must refresh the route * net: avoid skb_warn_bad_offload false positives on UFO * sparc64: Prevent perf from running during super critical sections * KVM: arm/arm64: Handle hva aging while destroying the vm * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free * Linux 4.4.82 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711535/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp