Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree or
a minimally backported form of that patch. The v4.10.7 upstream stable
patch set is now available. It should be included in the Ubuntu
kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches from the v4.11.1 stable release shall be
applied:
dm ioctl: prevent stack leak in dm ioctl call
drm/sti: fix GDP size to support up to UHD resolution
power: supply: lp8788: prevent out of bounds array access
brcmfmac: Ensure pointer correctly set if skb data location changes
brcmfmac: Make skb header writable before use
sparc64: fix fault handling in NGbzero.S and GENbzero.S
refcount: change EXPORT_SYMBOL markings
net: macb: fix phy interrupt parsing
tcp: fix access to sk->sk_state in tcp_poll()
geneve: fix incorrect setting of UDP checksum flag
bpf: enhance verifier to understand stack pointer arithmetic
bpf, arm64: fix jit branch offset related to ldimm64
tcp: fix wraparound issue in tcp_lp
net: ipv6: Do not duplicate DAD on link up
net: usb: qmi_wwan: add Telit ME910 support
tcp: do not inherit fastopen_req from parent
ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
ipv6: initialize route null entry in addrconf_init()
ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
tcp: randomize timestamps on syncookies
bnxt_en: allocate enough space for ->ntp_fltr_bmap
bpf: don't let ldimm64 leak map addresses on unprivileged
net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
f2fs: sanity check segment count
xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
xen: Revert commits da72ff5bfcb0 and 72a9b186292d
block: get rid of blk_integrity_revalidate()
Linux 4.11.1
** Affects: linux (Ubuntu)
Importance: Medium
Assignee: Seth Forshee (sforshee)
Status: In Progress
** Description changed:
SRU Justification
- Impact:
- The upstream process for stable tree updates is quite similar
- in scope to the Ubuntu SRU process, e.g., each patch has to
- demonstrably fix a bug, and each patch is vetted by upstream
- by originating either directly from a mainline/stable Linux tree or
- a minimally backported form of that patch. The v4.10.7 upstream stable
- patch set is now available. It should be included in the Ubuntu
- kernel as well.
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+ by originating either directly from a mainline/stable Linux tree or
+ a minimally backported form of that patch. The v4.10.7 upstream stable
+ patch set is now available. It should be included in the Ubuntu
+ kernel as well.
- git://git.kernel.org/
+ git://git.kernel.org/
- TEST CASE: TBD
+ TEST CASE: TBD
- The following patches from the v4.10.7 stable release shall be
+ The following patches from the v4.11.1 stable release shall be
applied:
+
+ dm ioctl: prevent stack leak in dm ioctl call
+ drm/sti: fix GDP size to support up to UHD resolution
+ power: supply: lp8788: prevent out of bounds array access
+ brcmfmac: Ensure pointer correctly set if skb data location changes
+ brcmfmac: Make skb header writable before use
+ sparc64: fix fault handling in NGbzero.S and GENbzero.S
+ refcount: change EXPORT_SYMBOL markings
+ net: macb: fix phy interrupt parsing
+ tcp: fix access to sk->sk_state in tcp_poll()
+ geneve: fix incorrect setting of UDP checksum flag
+ bpf: enhance verifier to understand stack pointer arithmetic
+ bpf, arm64: fix jit branch offset related to ldimm64
+ tcp: fix wraparound issue in tcp_lp
+ net: ipv6: Do not duplicate DAD on link up
+ net: usb: qmi_wwan: add Telit ME910 support
+ tcp: do not inherit fastopen_req from parent
+ ipv4, ipv6: ensure raw socket message is big enough to hold an IP header
+ rtnetlink: NUL-terminate IFLA_PHYS_PORT_NAME string
+ ipv6: initialize route null entry in addrconf_init()
+ ipv6: reorder ip6_route_dev_notifier after ipv6_dev_notf
+ tcp: randomize timestamps on syncookies
+ bnxt_en: allocate enough space for ->ntp_fltr_bmap
+ bpf: don't let ldimm64 leak map addresses on unprivileged
+ net: mdio-mux: bcm-iproc: call mdiobus_free() in error path
+ f2fs: sanity check segment count
+ xen/arm,arm64: fix xen_dma_ops after 815dd18 "Consolidate get_dma_ops..."
+ xen: Revert commits da72ff5bfcb0 and 72a9b186292d
+ block: get rid of blk_integrity_revalidate()
+ Linux 4.11.1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690814
Title:
Artful update to 4.11.1 stable
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1690814/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs