** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1848598
Title:
Xenial update: 4.4.196 upstream stable release
Status in linux package in Ubuntu:
Invalid
Status in linux source package in Xenial:
Fix Committed
Bug description:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
* video: ssd1307fb: Start page range at page_offset
* gpu: drm: radeon: Fix a possible null-pointer dereference in
radeon_connector_set_property()
* ipmi_si: Only schedule continuously in the thread in maintenance mode
* clk: qoriq: Fix -Wunused-const-variable
* clk: sirf: Don't reference clk_init_data after registration
* powerpc/rtas: use device model APIs and serialization during LPM
* powerpc/futex: Fix warning: 'oldval' may be used uninitialized in this
function
* powerpc/pseries/mobility: use cond_resched when updating device tree
* pinctrl: tegra: Fix write barrier placement in pmx_writel
* vfio_pci: Restore original state on release
* powerpc/64s/exception: machine check use correct cfar for late handler
* powerpc/pseries: correctly track irq state in default idle
* scsi: core: Reduce memory required for SCSI logging
* mfd: intel-lpss: Remove D3cold delay
* ARM: 8898/1: mm: Don't treat faults reported from cache maintenance as
writes
* HID: apple: Fix stuck function keys when using FN
* security: smack: Fix possible null-pointer dereferences in
smack_socket_sock_rcv_skb()
* fat: work around race with userspace's read via blockdev while mounting
* hypfs: Fix error number left in struct pointer member
* ocfs2: wait for recovering done after direct unlock request
* kmemleak: increase DEBUG_KMEMLEAK_EARLY_LOG_SIZE default to 16K
* ANDROID: binder: remove waitqueue when thread exits.
* ANDROID: binder: synchronize_rcu() when using POLLFREE.
* hso: fix NULL-deref on tty open
* ipv6: drop incoming packets having a v4mapped source address
* net: ipv4: avoid mixed n_redirects and rate_tokens usage
* net: qlogic: Fix memory leak in ql_alloc_large_buffers
* nfc: fix memory leak in llcp_sock_bind()
* sch_dsmark: fix potential NULL deref in dsmark_init()
* xen-netfront: do not use ~0U as error return value for xennet_fill_frags()
* net/rds: Fix error handling in rds_ib_add_one()
* sch_cbq: validate TCA_CBQ_WRROPT to avoid crash
* Smack: Don't ignore other bprm->unsafe flags if LSM_UNSAFE_PTRACE is set
* smack: use GFP_NOFS while holding inode_smack::smk_lock
* NFC: fix attrs checks in netlink interface
* Linux 4.4.196
4.4.196 upstream stable release
from git://git.kernel.org/
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1848598/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp