Xenial update to v4.4.38 stable release
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The v4.4.38 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
TEST CASE: TBD
The following patches from the v4.4.38 stable release shall be applied:
virtio-net: add a missing synchronize_net()
net: check dead netns for peernet2id_alloc()
ip6_tunnel: disable caching when the traffic class is inherited
net: sky2: Fix shutdown crash
af_unix: conditionally use freezable blocking calls in read
rtnetlink: fix FDB size computation
l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{,6}_bind()
net: dsa: bcm_sf2: Ensure we re-negotiate EEE during after link change
net, sched: respect rcu grace period on cls destruction
net/sched: pedit: make sure that offset is valid
netlink: Call cb->done from a worker thread
netlink: Do not schedule work from sk_destruct
net/dccp: fix use-after-free in dccp_invalid_packet
net: bcmgenet: Utilize correct struct device for all DMA operations
sh_eth: remove unchecked interrupts for RZ/A1
geneve: avoid use-after-free of skb->data
net: ping: check minimum size on ICMP header length
sparc32: Fix inverted invalid_
sparc64: Fix find_node warning if numa node cannot be found
sparc64: fix compile warning section mismatch in find_node()
constify iov_iter_count() and iter_is_iovec()
Don't feed anything but regular iovec's to blk_rq_map_user_iov
ipv6: Set skb->protocol properly for local output
ipv4: Set skb->protocol properly for local output
esp4: Fix integrity verification when ESN are used
esp6: Fix integrity verification when ESN are used
Linux 4.4.38
tags: | added: kernel-stable-tracking-bug |
description: | updated |
Changed in linux (Ubuntu Xenial): | |
status: | Confirmed → Fix Committed |
Changed in linux (Ubuntu): | |
status: | Confirmed → Invalid |
Status changed to 'Confirmed' because the bug affects multiple users.