Xenial update: v4.4.240 upstream stable release
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Kamal Mostafa |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The following upstream
stable patches should be included in the Ubuntu kernel:
v4.4.240 upstream stable release
from git://git.
Bluetooth: MGMT: Fix not checking if BT_HS is enabled
Bluetooth: fix kernel oops in store_pending_
Bluetooth: Consolidate encryption handling in hci_encrypt_cfm
Bluetooth: Fix update of connection state in `hci_encrypt_cfm`
Bluetooth: Disconnect if E0 is used for Level 4
media: usbtv: Fix refcounting mixup
USB: serial: option: add Cellient MPL200 card
USB: serial: option: Add Telit FT980-KS composition
staging: comedi: check validity of wMaxPacketSize of usb endpoints found
USB: serial: pl2303: add device-id for HP GC device
USB: serial: ftdi_sio: add support for FreeCalypso JTAG+UART adapters
reiserfs: Initialize inode keys properly
reiserfs: Fix oops during mount
spi: unbinding slave before calling spi_destroy_queue
crypto: qat - check cipher length for aead AES-CBC-HMAC-SHA
Linux 4.4.240
UBUNTU: upstream stable to v4.4.240
CVE References
Changed in linux (Ubuntu): | |
status: | New → Confirmed |
tags: | added: kernel-stable-tracking-bug |
Changed in linux (Ubuntu Xenial): | |
status: | New → In Progress |
assignee: | nobody → Kamal Mostafa (kamalmostafa) |
description: | updated |
Changed in linux (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu): | |
status: | Confirmed → Invalid |
This bug was fixed in the package linux - 4.4.0-197.229
---------------
linux (4.4.0-197.229) xenial; urgency=medium
* xenial/linux: 4.4.0-197.229 -proposed tracker (LP: #1905489)
* sha1_ce and sha2_ce modules no longer load on arm64 (LP: #1905336)
- SAUCE: Revert "crypto: arm64/sha - avoid non-standard inline asm tricks"
* Fails to build on powerpc (LP: #1905475) uaccess- flush: fix corenet64_ smp_defconfig build
- powerpc/
- SAUCE: powerpc/uaccess: only include kup-radix.h on PPC_BOOK3S_64
linux (4.4.0-196.228) xenial; urgency=medium
* xenial/linux: 4.4.0-196.228 -proposed tracker (LP: #1905309)
* CVE-2020-4788 RELON_EXCEPTION _PSERIES_ OOL
- SAUCE: powerpc/64s: Define MASKABLE_
- SAUCE: powerpc/64s: move some exception handlers out of line
- powerpc/64s: flush L1D on kernel entry
- SAUCE: powerpc: Add a framework for user access tracking
- powerpc: Implement user_access_begin and friends
- powerpc: Fix __clear_user() with KUAP enabled
- powerpc/uaccess: Evaluate macro arguments once, before user access is
allowed
- powerpc/64s: flush L1D after user accesses
linux (4.4.0-195.227) xenial; urgency=medium
* xenial/linux: 4.4.0-195.227 -proposed tracker (LP: #1903107)
* Update kernel packaging to support forward porting kernels (LP: #1902957)
- [Debian] Update for leader included in BACKPORT_SUFFIX
* Avoid double newline when running insertchanges (LP: #1903293)
- [Packaging] insertchanges: avoid double newline
* EFI: Fails when BootCurrent entry does not exist (LP: #1899993)
- efivarfs: Replace invalid slashes with exclamation marks in dentries.
* CVE-2020-14351
- perf/core: Fix race in the perf_mmap_close() function
* CVE-2020-25645
- geneve: add transport ports in route lookup for geneve
* Xenial update: v4.4.241 upstream stable release (LP: #1902097) once_size_ nocheck( ) at_a_time( ) function. FIRMWARE_ NAME attribute in genl_fw_ download( ) shash_update( ) coherent( )' call lookup_ state() "
- ibmveth: Identify ingress large send packets.
- tipc: fix the skb_unshare() in tipc_buf_append()
- net/ipv4: always honour route mtu during forwarding
- r8169: fix data corruption issue on RTL8402
- ALSA: bebob: potential info leak in hwdep_read()
- mm/kasan: print name of mem[set,cpy,move]() caller in report
- mm/kasan: add API to check memory regions
- compiler.h, kasan: Avoid duplicating __read_
- compiler.h: Add read_word_
- lib/strscpy: Shut up KASAN false-positives in strscpy()
- x86/mm/ptdump: Fix soft lockup in page table walker
- net: hdlc: In hdlc_rcv, check to make sure dev is an HDLC device
- net: hdlc_raw_eth: Clear the IFF_TX_SKB_SHARING flag after calling
ether_setup
- nfc: Ensure presence of NFC_ATTR_
nfc_
- tcp: fix to update snd_wl1 in bulk receiver fast path
- icmp: randomize the global rate limiter
- cifs: remove bogus debug code
- ima: Don't ignore errors from crypto_
- EDAC/i5100: Fix error handling order in i5100_init_one()
- crypto: ixp4xx - Fix the size used in a 'dma_free_
- media: Revert "media: exynos4-is: Add missed check for
pinctrl_
...