The following patches were skipped because they were already applied: * CVE-2016-6213 - mnt: Add a per mount namespace limit on the number of mounts
** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.4.65 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.4.65 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - - The following patches from the 4.4.65 stable release shall be - applied: + The following patches from the 4.4.65 stable release shall be applied: + * tipc: make sure IPv6 header fits in skb headroom + * tipc: make dist queue pernet + * tipc: re-enable compensation for socket receive buffer double counting + * tipc: correct error in node fsm + * tty: nozomi: avoid a harmless gcc warning + * hostap: avoid uninitialized variable use in hfa384x_get_rid + * gfs2: avoid uninitialized variable warning + * tipc: fix random link resets while adding a second bearer + * tipc: fix socket timer deadlock + * xc2028: avoid use after free + * netfilter: nfnetlink: correctly validate length of batch messages + * tipc: check minimum bearer MTU + * vfio/pci: Fix integer overflows, bitmask check + * staging/android/ion : fix a race condition in the ion driver + * ping: implement proper locking + * perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race + * Linux 4.4.65 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-6213 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1688483 Title: Xenial update to 4.4.65 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1688483/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
