Xenial update to 4.4.68 stable release

Bug #1691418 reported by Stefan Bader
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Stefan Bader

Bug Description

SRU Justification

       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The 4.4.68 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.



The following patches from the 4.4.68 stable release shall be applied:
* 9p: fix a potential acl leak
* ARM: 8452/3: PJ4: make coprocessor access sequences buildable in Thumb2
* cpupower: Fix turbo frequency reporting for pre-Sandy Bridge cores
* powerpc/powernv: Fix opal_exit tracepoint opcode
* power: supply: bq24190_charger: Fix irq trigger to IRQF_TRIGGER_FALLING
* power: supply: bq24190_charger: Call set_mode_host() on pm_resume()
* power: supply: bq24190_charger: Install irq_handler_thread() at end of
* power: supply: bq24190_charger: Call power_supply_changed() for relevant
* power: supply: bq24190_charger: Don't read fault register outside
* power: supply: bq24190_charger: Handle fault before status on interrupt
* leds: ktd2692: avoid harmless maybe-uninitialized warning
* ARM: OMAP5 / DRA7: Fix HYP mode boot for thumb2 build
* mwifiex: debugfs: Fix (sometimes) off-by-1 SSID print
* mwifiex: remove redundant dma padding in AMSDU
* mwifiex: Avoid skipping WEP key deletion for AP
* x86/ioapic: Restore IO-APIC irq_chip retrigger callback
* x86/pci-calgary: Fix iommu_free() comparison of unsigned expression >= 0
* clk: Make x86/ conditional on CONFIG_COMMON_CLK
* kprobes/x86: Fix kernel panic when certain exception-handling addresses are
* x86/platform/intel-mid: Correct MSI IRQ line for watchdog device
* Revert "KVM: nested VMX: disable perf cpuid reporting"
* KVM: nVMX: initialize PML fields in vmcs02
* KVM: nVMX: do not leak PML full vmexit to L1
* usb: host: ehci-exynos: Decrese node refcount on exynos_ehci_get_phy()
  error paths
* usb: host: ohci-exynos: Decrese node refcount on exynos_ehci_get_phy()
  error paths
* usb: chipidea: Only read/write OTGSC from one place
* usb: chipidea: Handle extcon events properly
* USB: serial: keyspan_pda: fix receive sanity checks
* USB: serial: digi_acceleport: fix incomplete rx sanity check
* USB: serial: ssu100: fix control-message error handling
* USB: serial: io_edgeport: fix epic-descriptor handling
* USB: serial: ti_usb_3410_5052: fix control-message error handling
* USB: serial: ark3116: fix open error handling
* USB: serial: ftdi_sio: fix latency-timer error handling
* USB: serial: quatech2: fix control-message error handling
* USB: serial: mct_u232: fix modem-status error handling
* USB: serial: io_edgeport: fix descriptor error handling
* phy: qcom-usb-hs: Add depends on EXTCON
* serial: 8250_omap: Fix probe and remove for PM runtime
* scsi: mac_scsi: Fix MAC_SCSI=m option when SCSI=m
* MIPS: R2-on-R6 MULTU/MADDU/MSUBU emulation bugfix
* brcmfmac: Ensure pointer correctly set if skb data location changes
* brcmfmac: Make skb header writable before use
* staging: wlan-ng: add missing byte order conversion
* staging: emxx_udc: remove incorrect __init annotations
* ALSA: hda - Fix deadlock of controller device lock at unbinding
* tcp: do not underestimate skb->truesize in tcp_trim_head()
* bpf, arm64: fix jit branch offset related to ldimm64
* tcp: fix wraparound issue in tcp_lp
* tcp: do not inherit fastopen_req from parent
* ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
* rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
* ipv6: initialize route null entry in addrconf_init()
* ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
* bnxt_en: allocate enough space for ->ntp_fltr_bmap
* f2fs: sanity check segment count
* drm/ttm: fix use-after-free races in vm fault handling
* block: get rid of blk_integrity_revalidate()
* Linux 4.4.68

Stefan Bader (smb)
tags: added: kernel-stable-tracking-bug
Revision history for this message
Stefan Bader (smb) wrote :

The patch "block: get rid of blk_integrity_revalidate()" had to be adjusted due to having "block: Use pointer to backing_dev_info from request_queue" backported for bug #1659111 "UbuntuKVM guest crashed while running I/O stress test with Ubuntu kernel 4.4.0-47-generic".

description: updated
Changed in linux (Ubuntu Xenial):
assignee: nobody → Stefan Bader (smb)
importance: Undecided → Medium
status: New → In Progress
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (18.8 KiB)

This bug was fixed in the package linux - 4.4.0-83.106

linux (4.4.0-83.106) xenial; urgency=low

  * linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)

  * CVE-2017-1000364
    - Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
    - Revert "mm: do not collapse stack gap into THP"
    - Revert "mm: enlarge stack guard gap"
    - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
    - mm: larger stack guard gap, between vmas
    - mm: fix new crash in unmapped_area_topdown()
    - Allow stack to grow up to address space limit

linux (4.4.0-82.105) xenial; urgency=low

  * linux: 4.4.0-82.105 -proposed tracker (LP: #1699064)

  * CVE-2017-1000364
    - SAUCE: mm: Only expand stack if guard area is hit

  * linux-aws/linux-gke incorrectly producing and using linux-*-tools-
    common/linux-*-cloud-tools-common (LP: #1688579)
    - [Config] make linux-tools-common and linux-cloud-tools-common protection

  * CVE-2017-9242
    - ipv6: fix out of bound writes in __ip6_append_data()

  * CVE-2017-9075
    - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent

  * CVE-2017-9074
    - ipv6: Prevent overrun when parsing v6 header options

  * CVE-2017-9076
    - ipv6/dccp: do not inherit ipv6_mc_list from parent

  * CVE-2017-9077
    - ipv6/dccp: do not inherit ipv6_mc_list from parent

  * CVE-2017-8890
    - dccp/tcp: do not inherit mc_list from parent

  * Module signing exclusion for staging drivers does not work properly
    (LP: #1690908)
    - SAUCE: Fix module signing exclusion in package builds

  * extend-diff-ignore should use exact matches (LP: #1693504)
    - [Packaging] exact extend-diff-ignore matches

  * Dell XPS 9360 wifi 5G performance is poor (LP: #1692836)
    - SAUCE: ath10k: fix the wifi speed issue for kill 1535

  * Upgrade Redpine WLAN/BT driver to ver. 1.2.RC12 (LP: #1694607)
    - SAUCE: Redpine: Upgrade to ver. 1.2.RC12

  * [DP MST] No audio output through HDMI/DP/mDP ports in Dell WD15 and TB15
    docking stations (LP: #1694665)
    - drm/i915: Store port enum in intel_encoder
    - drm/i915: Eliminate redundant local variable definition
    - drm/i915: Switch to using port stored in intel_encoder
    - drm/i915: Move audio_connector to intel_encoder
    - drm/i915/dp: DP audio API changes for MST
    - drm/i915: abstract ddi being audio enabled
    - drm/i915/audio: extend get_saved_enc() to support more scenarios
    - drm/i915: enable dp mst audio

  * Xenial update to 4.4.70 stable release (LP: #1694621)
    - usb: misc: legousbtower: Fix buffers on stack
    - usb: misc: legousbtower: Fix memory leak
    - USB: ene_usb6250: fix DMA to the stack
    - watchdog: pcwd_usb: fix NULL-deref at probe
    - char: lp: fix possible integer overflow in lp_setup()
    - USB: core: replace %p with %pK
    - ARM: tegra: paz00: Mark panel regulator as enabled on boot
    - tpm_crb: check for bad response size
    - infiniband: call ipv6 route lookup via the stub interface
    - dm btree: fix for dm_btree_find_lowest_key()
    - dm raid: select the Kconfig option CONFIG_MD_RAID0
    - dm bufio: avoid a possible ABBA deadlock
    - dm bufio: check ...

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
Po-Hsu Lin (cypressyew)
Changed in linux (Ubuntu):
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers