← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1643637] [NEW] Xenial update to 4.4.34 stable release

 

Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The 4.4.34 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.kernel.org/

    TEST CASE: TBD

       The following patches from the 4.4.34 stable release shall be
applied:

dctcp: avoid bogus doubling of cwnd after loss
net: clear sk_err_soft in sk_clone_lock()
net: mangle zero checksum in skb_checksum_help()
bgmac: stop clearing DMA receive control register right after it is set
ip6_tunnel: Clear IP6CB in ip6tunnel_xmit()
tcp: fix potential memory corruption
dccp: do not send reset to already closed sockets
dccp: fix out of bound access in dccp_v4_err()
ipv6: dccp: fix out of bound access in dccp_v6_err()
ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped
sctp: assign assoc_id earlier in __sctp_connect
fib_trie: Correct /proc/net/route off by one error
sock: fix sendmmsg for partial sendmsg
net: __skb_flow_dissect() must cap its return value
ipv4: use new_gw for redirect neigh lookup
tcp: take care of truncations done by sk_filter()
tty: Prevent ldisc drivers from re-using stale tty fields
sparc: Don't leak context bits into thread->fault_address
sparc: serial: sunhv: fix a double lock bug
sparc64 mm: Fix base TSB sizing when hugetlb pages are used
sparc: Handle negative offsets in arch_jump_label_transform
sparc64: Handle extremely large kernel TSB range flushes sanely.
sparc64: Fix illegal relative branches in hypervisor patched TLB code.
sparc64: Fix instruction count in comment for __hypervisor_flush_tlb_pending.
sparc64: Fix illegal relative branches in hypervisor patched TLB cross-call code.
sparc64: Handle extremely large kernel TLB range flushes more gracefully.
sparc64: Delete __ret_efault.
sparc64: Prepare to move to more saner user copy exception handling.
sparc64: Convert copy_in_user to accurate exception reporting.
sparc64: Convert GENcopy_{from,to}_user to accurate exception reporting.
sparc64: Convert U1copy_{from,to}_user to accurate exception reporting.
sparc64: Convert NG4copy_{from,to}_user to accurate exception reporting.
sparc64: Convert NGcopy_{from,to}_user to accurate exception reporting.
sparc64: Convert NG2copy_{from,to}_user to accurate exception reporting.
sparc64: Convert U3copy_{from,to}_user to accurate exception reporting.
sparc64: Delete now unused user copy assembler helpers.
sparc64: Delete now unused user copy fixup functions.
Linux 4.4.34

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
     Assignee: Luis Henriques (henrix)
         Status: In Progress


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.34 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.34 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
+        The following patches from the 4.4.34 stable release shall be
+ applied:
  
-        The following patches from the 4.4.34 stable release shall be
- applied:
+ dctcp: avoid bogus doubling of cwnd after loss
+ net: clear sk_err_soft in sk_clone_lock()
+ net: mangle zero checksum in skb_checksum_help()
+ bgmac: stop clearing DMA receive control register right after it is set
+ ip6_tunnel: Clear IP6CB in ip6tunnel_xmit()
+ tcp: fix potential memory corruption
+ dccp: do not send reset to already closed sockets
+ dccp: fix out of bound access in dccp_v4_err()
+ ipv6: dccp: fix out of bound access in dccp_v6_err()
+ ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped
+ sctp: assign assoc_id earlier in __sctp_connect
+ fib_trie: Correct /proc/net/route off by one error
+ sock: fix sendmmsg for partial sendmsg
+ net: __skb_flow_dissect() must cap its return value
+ ipv4: use new_gw for redirect neigh lookup
+ tcp: take care of truncations done by sk_filter()
+ tty: Prevent ldisc drivers from re-using stale tty fields
+ sparc: Don't leak context bits into thread->fault_address
+ sparc: serial: sunhv: fix a double lock bug
+ sparc64 mm: Fix base TSB sizing when hugetlb pages are used
+ sparc: Handle negative offsets in arch_jump_label_transform
+ sparc64: Handle extremely large kernel TSB range flushes sanely.
+ sparc64: Fix illegal relative branches in hypervisor patched TLB code.
+ sparc64: Fix instruction count in comment for __hypervisor_flush_tlb_pending.
+ sparc64: Fix illegal relative branches in hypervisor patched TLB cross-call code.
+ sparc64: Handle extremely large kernel TLB range flushes more gracefully.
+ sparc64: Delete __ret_efault.
+ sparc64: Prepare to move to more saner user copy exception handling.
+ sparc64: Convert copy_in_user to accurate exception reporting.
+ sparc64: Convert GENcopy_{from,to}_user to accurate exception reporting.
+ sparc64: Convert U1copy_{from,to}_user to accurate exception reporting.
+ sparc64: Convert NG4copy_{from,to}_user to accurate exception reporting.
+ sparc64: Convert NGcopy_{from,to}_user to accurate exception reporting.
+ sparc64: Convert NG2copy_{from,to}_user to accurate exception reporting.
+ sparc64: Convert U3copy_{from,to}_user to accurate exception reporting.
+ sparc64: Delete now unused user copy assembler helpers.
+ sparc64: Delete now unused user copy fixup functions.
+ Linux 4.4.34

** Changed in: linux (Ubuntu Xenial)
     Assignee: (unassigned) => Luis Henriques (henrix)

** Changed in: linux (Ubuntu Xenial)
       Status: New => In Progress

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1643637

Title:
  Xenial update to 4.4.34 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.34 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the 4.4.34 stable release shall be
  applied:

  dctcp: avoid bogus doubling of cwnd after loss
  net: clear sk_err_soft in sk_clone_lock()
  net: mangle zero checksum in skb_checksum_help()
  bgmac: stop clearing DMA receive control register right after it is set
  ip6_tunnel: Clear IP6CB in ip6tunnel_xmit()
  tcp: fix potential memory corruption
  dccp: do not send reset to already closed sockets
  dccp: fix out of bound access in dccp_v4_err()
  ipv6: dccp: fix out of bound access in dccp_v6_err()
  ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped
  sctp: assign assoc_id earlier in __sctp_connect
  fib_trie: Correct /proc/net/route off by one error
  sock: fix sendmmsg for partial sendmsg
  net: __skb_flow_dissect() must cap its return value
  ipv4: use new_gw for redirect neigh lookup
  tcp: take care of truncations done by sk_filter()
  tty: Prevent ldisc drivers from re-using stale tty fields
  sparc: Don't leak context bits into thread->fault_address
  sparc: serial: sunhv: fix a double lock bug
  sparc64 mm: Fix base TSB sizing when hugetlb pages are used
  sparc: Handle negative offsets in arch_jump_label_transform
  sparc64: Handle extremely large kernel TSB range flushes sanely.
  sparc64: Fix illegal relative branches in hypervisor patched TLB code.
  sparc64: Fix instruction count in comment for __hypervisor_flush_tlb_pending.
  sparc64: Fix illegal relative branches in hypervisor patched TLB cross-call code.
  sparc64: Handle extremely large kernel TLB range flushes more gracefully.
  sparc64: Delete __ret_efault.
  sparc64: Prepare to move to more saner user copy exception handling.
  sparc64: Convert copy_in_user to accurate exception reporting.
  sparc64: Convert GENcopy_{from,to}_user to accurate exception reporting.
  sparc64: Convert U1copy_{from,to}_user to accurate exception reporting.
  sparc64: Convert NG4copy_{from,to}_user to accurate exception reporting.
  sparc64: Convert NGcopy_{from,to}_user to accurate exception reporting.
  sparc64: Convert NG2copy_{from,to}_user to accurate exception reporting.
  sparc64: Convert U3copy_{from,to}_user to accurate exception reporting.
  sparc64: Delete now unused user copy assembler helpers.
  sparc64: Delete now unused user copy fixup functions.
  Linux 4.4.34

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1643637/+subscriptions


Follow ups