← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1675789] [NEW] Xenial update to v4.4.56 stable release

 

Public bug reported:

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The v4.4.56 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.kernel.org/

    TEST CASE: TBD

       The following patches from the v4.4.56 stable release shall be
applied:

netlink: remove mmapped netlink support
UBUNTU: [Config] CONFIG_NETLINK_MMAP disappeared
vxlan: correctly validate VXLAN ID against VXLAN_N_VID
vti6: return GRE_KEY for vti6
ipv4: mask tos for input route
l2tp: avoid use-after-free caused by l2tp_ip_backlog_recv
net: don't call strlen() on the user buffer in packet_bind_spkt()
net: net_enable_timestamp() can be called from irq contexts
dccp: Unlock sock before calling sk_free()
tcp: fix various issues for sockets morphing to listen state
net: fix socket refcounting in skb_complete_wifi_ack()
net: fix socket refcounting in skb_complete_tx_timestamp()
dccp: fix use-after-free in dccp_feat_activate_values
vrf: Fix use-after-free in vrf_xmit
uapi: fix linux/packet_diag.h userspace compilation error
act_connmark: avoid crashing on malformed nlattrs with null parms
mpls: Send route delete notifications when router module is unloaded
ipv6: make ECMP route replacement less greedy
ipv6: avoid write to a possibly cloned skb
bridge: drop netfilter fake rtable unconditionally
dccp/tcp: fix routing redirect race
dccp: fix memory leak during tear-down of unsuccessful connection request
net sched actions: decrement module reference count after table flush.
fscrypt: fix renaming and linking special files
fscrypto: lock inode while setting encryption policy
x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
x86/perf: Fix CR4.PCE propagation to use active_mm instead of mm
futex: Fix potential use-after-free in FUTEX_REQUEUE_PI
futex: Add missing error handling to FUTEX_REQUEUE_PI
Linux 4.4.56

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu Xenial)
     Importance: Undecided
         Status: New


** Tags: kernel-stable-tracking-bug

** Tags added: kernel-stable-tracking-bug

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The v4.4.56 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The v4.4.56 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
+        The following patches from the v4.4.56 stable release shall be
+ applied:
  
-        The following patches from the v4.4.56 stable release shall be
- applied:
+ netlink: remove mmapped netlink support
+ UBUNTU: [Config] CONFIG_NETLINK_MMAP disappeared
+ vxlan: correctly validate VXLAN ID against VXLAN_N_VID
+ vti6: return GRE_KEY for vti6
+ ipv4: mask tos for input route
+ l2tp: avoid use-after-free caused by l2tp_ip_backlog_recv
+ net: don't call strlen() on the user buffer in packet_bind_spkt()
+ net: net_enable_timestamp() can be called from irq contexts
+ dccp: Unlock sock before calling sk_free()
+ tcp: fix various issues for sockets morphing to listen state
+ net: fix socket refcounting in skb_complete_wifi_ack()
+ net: fix socket refcounting in skb_complete_tx_timestamp()
+ dccp: fix use-after-free in dccp_feat_activate_values
+ vrf: Fix use-after-free in vrf_xmit
+ uapi: fix linux/packet_diag.h userspace compilation error
+ act_connmark: avoid crashing on malformed nlattrs with null parms
+ mpls: Send route delete notifications when router module is unloaded
+ ipv6: make ECMP route replacement less greedy
+ ipv6: avoid write to a possibly cloned skb
+ bridge: drop netfilter fake rtable unconditionally
+ dccp/tcp: fix routing redirect race
+ dccp: fix memory leak during tear-down of unsuccessful connection request
+ net sched actions: decrement module reference count after table flush.
+ fscrypt: fix renaming and linking special files
+ fscrypto: lock inode while setting encryption policy
+ x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
+ x86/perf: Fix CR4.PCE propagation to use active_mm instead of mm
+ futex: Fix potential use-after-free in FUTEX_REQUEUE_PI
+ futex: Add missing error handling to FUTEX_REQUEUE_PI
+ Linux 4.4.56

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1675789

Title:
  Xenial update to v4.4.56 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The v4.4.56 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the v4.4.56 stable release shall be
  applied:

  netlink: remove mmapped netlink support
  UBUNTU: [Config] CONFIG_NETLINK_MMAP disappeared
  vxlan: correctly validate VXLAN ID against VXLAN_N_VID
  vti6: return GRE_KEY for vti6
  ipv4: mask tos for input route
  l2tp: avoid use-after-free caused by l2tp_ip_backlog_recv
  net: don't call strlen() on the user buffer in packet_bind_spkt()
  net: net_enable_timestamp() can be called from irq contexts
  dccp: Unlock sock before calling sk_free()
  tcp: fix various issues for sockets morphing to listen state
  net: fix socket refcounting in skb_complete_wifi_ack()
  net: fix socket refcounting in skb_complete_tx_timestamp()
  dccp: fix use-after-free in dccp_feat_activate_values
  vrf: Fix use-after-free in vrf_xmit
  uapi: fix linux/packet_diag.h userspace compilation error
  act_connmark: avoid crashing on malformed nlattrs with null parms
  mpls: Send route delete notifications when router module is unloaded
  ipv6: make ECMP route replacement less greedy
  ipv6: avoid write to a possibly cloned skb
  bridge: drop netfilter fake rtable unconditionally
  dccp/tcp: fix routing redirect race
  dccp: fix memory leak during tear-down of unsuccessful connection request
  net sched actions: decrement module reference count after table flush.
  fscrypt: fix renaming and linking special files
  fscrypto: lock inode while setting encryption policy
  x86/kasan: Fix boot with KASAN=y and PROFILE_ANNOTATED_BRANCHES=y
  x86/perf: Fix CR4.PCE propagation to use active_mm instead of mm
  futex: Fix potential use-after-free in FUTEX_REQUEUE_PI
  futex: Add missing error handling to FUTEX_REQUEUE_PI
  Linux 4.4.56

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1675789/+subscriptions


Follow ups