← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1745266] Re: Xenial update to 4.4.112 stable release

 

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1745266

Title:
  Xenial update to 4.4.112 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  New

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.112 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the 4.4.112 stable release shall be applied:
  * dm bufio: fix shrinker scans when (nr_to_scan < retain_target)
  * KVM: Fix stack-out-of-bounds read in write_mmio
  * can: gs_usb: fix return value of the "set_bittiming" callback
  * IB/srpt: Disable RDMA access by the initiator
  * MIPS: Validate PR_SET_FP_MODE prctl(2) requests against the ABI of the task
  * MIPS: Factor out NT_PRFPREG regset access helpers
  * MIPS: Guard against any partial write attempt with PTRACE_SETREGSET
  * MIPS: Consistently handle buffer counter with PTRACE_SETREGSET
  * MIPS: Fix an FCSR access API regression with NT_PRFPREG and MSA
  * MIPS: Also verify sizeof `elf_fpreg_t' with PTRACE_SETREGSET
  * MIPS: Disallow outsized PTRACE_SETREGSET NT_PRFPREG regset accesses
  * net/mac80211/debugfs.c: prevent build failure with CONFIG_UBSAN=y
  * kvm: vmx: Scrub hardware GPRs at VM-exit
  * x86/vsdo: Fix build on PARAVIRT_CLOCK=y, KVM_GUEST=n
  * x86/acpi: Handle SCI interrupts above legacy space gracefully
  * iommu/arm-smmu-v3: Don't free page table ops twice
  * ALSA: pcm: Remove incorrect snd_BUG_ON() usages
  * ALSA: pcm: Add missing error checks in OSS emulation plugin builder
  * ALSA: pcm: Abort properly at pending signal in OSS read/write loops
  * ALSA: pcm: Allow aborting mutex lock at OSS read/write loops
  * ALSA: aloop: Release cable upon open error path
  * ALSA: aloop: Fix inconsistent format due to incomplete rule
  * ALSA: aloop: Fix racy hw constraints adjustment
  * x86/acpi: Reduce code duplication in mp_override_legacy_irq()
  * mm/compaction: fix invalid free_pfn and compact_cached_free_pfn
  * mm/compaction: pass only pageblock aligned range to pageblock_pfn_to_page
  * mm/page-writeback: fix dirty_ratelimit calculation
  * mm/zswap: use workqueue to destroy pool
  * zswap: don't param_set_charp while holding spinlock
  * locks: don't check for race with close when setting OFD lock
  * futex: Replace barrier() in unqueue_me() with READ_ONCE()
  * locking/mutex: Allow next waiter lockless wakeup
  * usbvision fix overflow of interfaces array
  * usb: musb: ux500: Fix NULL pointer dereference at system PM
  * r8152: fix the wake event
  * r8152: use test_and_clear_bit
  * r8152: adjust ALDPS function
  * lan78xx: use skb_cow_head() to deal with cloned skbs
  * sr9700: use skb_cow_head() to deal with cloned skbs
  * smsc75xx: use skb_cow_head() to deal with cloned skbs
  * cx82310_eth: use skb_cow_head() to deal with cloned skbs
  * x86/mm/pat, /dev/mem: Remove superfluous error message
  * hwrng: core - sleep interruptible in read
  * sysrq: Fix warning in sysrq generated crash.
  * xhci: Fix ring leak in failure path of xhci_alloc_virt_device()
  * Revert "userfaultfd: selftest: vm: allow to build in vm/ directory"
  * x86/pti/efi: broken conversion from efi to kernel page table
  * 8021q: fix a memory leak for VLAN 0 device
  * ip6_tunnel: disable dst caching if tunnel is dual-stack
  * net: core: fix module type in sock_diag_bind
  * RDS: Heap OOB write in rds_message_alloc_sgs()
  * RDS: null pointer dereference in rds_atomic_free_op
  * sh_eth: fix TSU resource handling
  * sh_eth: fix SH7757 GEther initialization
  * net: stmmac: enable EEE in MII, GMII or RGMII only
  * ipv6: fix possible mem leaks in ipv6_make_skb()
  * crypto: algapi - fix NULL dereference in crypto_remove_spawns()
  * rbd: set max_segments to USHRT_MAX
  * x86/microcode/intel: Extend BDW late-loading with a revision check
  * KVM: x86: Add memory barrier on vmcs field lookup
  * drm/vmwgfx: Potential off by one in vmw_view_add()
  * kaiser: Set _PAGE_NX only if supported
  * bpf: add bpf_patch_insn_single helper
  * bpf: don't (ab)use instructions to store state
  * bpf: move fixup_bpf_calls() function
  * bpf: refactor fixup_bpf_calls()
  * bpf: adjust insn_aux_data when patching insns
  * bpf: prevent out-of-bounds speculation
  * bpf, array: fix overflow in max_entries and undefined behavior in index_mask
  * iscsi-target: Make TASK_REASSIGN use proper se_cmd->cmd_kref
  * target: Avoid early CMD_T_PRE_EXECUTE failures during ABORT_TASK
  * USB: serial: cp210x: add IDs for LifeScan OneTouch Verio IQ
  * USB: serial: cp210x: add new device ID ELV ALC 8xxx
  * usb: misc: usb3503: make sure reset is low for at least 100us
  * USB: fix usbmon BUG trigger
  * usbip: remove kernel addresses from usb device and urb debug msgs
  * staging: android: ashmem: fix a race condition in ASHMEM_SET_SIZE ioctl
  * Bluetooth: Prevent stack info leak from the EFS element.
  * uas: ignore UAS for Norelsys NS1068(X) chips
  * e1000e: Fix e1000_check_for_copper_link_ich8lan return value.
  * x86/Documentation: Add PTI description
  * x86/cpu: Factor out application of forced CPU caps
  * x86/cpufeatures: Make CPU bugs sticky
  * x86/cpufeatures: Add X86_BUG_CPU_INSECURE
  * x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN
  * x86/cpufeatures: Add X86_BUG_SPECTRE_V[12]
  * x86/cpu: Merge bugs.c and bugs_64.c
  * sysfs/cpu: Add vulnerability folder
  * x86/cpu: Implement CPU vulnerabilites sysfs functions
  * sysfs/cpu: Fix typos in vulnerability documentation
  * x86/alternatives: Fix optimize_nops() checking
  * x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
  * selftests/x86: Add test_vsyscall
  * Linux 4.4.112

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745266/+subscriptions