Xenial update to v4.4.50 stable release
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The v4.4.50 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
TEST CASE: TBD
The following patches from the v4.4.50 stable release shall be applied:
can: Fix kernel panic at security_
ipv6: fix ip6_tnl_
ipv6: pointer math error in ip6_tnl_
tcp: fix 0 divide in __tcp_select_
net: use a work queue to defer net_disable_
ipv4: keep skb->dst around in presence of IP options
netlabel: out of bound access in cipso_v4_validate()
ip6_gre: fix ip6gre_err() invalid reads
ipv6: tcp: add a missing tcp_v6_restore_cb()
tcp: avoid infinite loop in tcp_splice_read()
tun: read vnet_hdr_sz once
macvtap: read vnet_hdr_size once
mlx4: Invoke softirqs after napi_reschedule
sctp: avoid BUG_ON on sctp_wait_
sit: fix a double free on error path
net: introduce device min_header_len
packet: round up linear to header len
ping: fix a null pointer dereference
l2tp: do not use udp_ioctl()
Linux 4.4.50
CVE References
tags: | added: kernel-stable-tracking-bug |
description: | updated |
Changed in linux (Ubuntu Xenial): | |
status: | Confirmed → Fix Committed |
Changed in linux (Ubuntu): | |
status: | Confirmed → Invalid |
Status changed to 'Confirmed' because the bug affects multiple users.