Xenial update: 4.4.214 upstream stable release
Bug #1864775 reported by
Khaled El Mously
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
4.4.214 upstream stable release
from git://git.
Linux 4.4.214
CVE References
Changed in linux (Ubuntu): | |
status: | New → Confirmed |
tags: | added: kernel-stable-tracking-bug |
description: | updated |
Changed in linux (Ubuntu Xenial): | |
status: | New → Fix Committed |
Changed in linux (Ubuntu): | |
status: | Confirmed → Invalid |
To post a comment you must log in.
Skipped:
* Revert "ovl: modify ovl_permission() to do checks on two inodes"
resolved some minor conflicts with: DEFAULT_ COHERENT & select it on powerpc msr_[get| set]_crash_ data() from Spectre-v1/L1TF attacks join_existing( ) with RCU read lock held
* of: Add OF_DMA_
* KVM: x86: Protect kvm_hv_
* libertas: don't exit from lbs_ibss_
* dm: fix potential for q->make_request_fn NULL pointer