← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1711535] Re: Xenial update to 4.4.82 stable release

 

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Xenial)
       Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
     Assignee: (unassigned) => Stefan Bader (smb)

** Changed in: linux (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1711535

Title:
  Xenial update to 4.4.82 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.82 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

  The following patches from the 4.4.82 stable release shall be applied:
  * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states
  * net: fix keepalive code vs TCP_FASTOPEN_CONNECT
  * bpf, s390: fix jit branch offset related to ldimm64
  * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target
  * tcp: fastopen: tcp_connect() must refresh the route
  * net: avoid skb_warn_bad_offload false positives on UFO
  * sparc64: Prevent perf from running during super critical sections
  * KVM: arm/arm64: Handle hva aging while destroying the vm
  * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free
  * Linux 4.4.82

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711535/+subscriptions


References