** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from a mainline/stable Linux tree
or a minimally backported form of that patch. The 4.4.130 upstream
stable stable patch set is now available. It should be included
in the Ubuntu kernel as well.
git://git.kernel.org/
TEST CASE: TBD
The following patches from the 4.4.130 stable release shall be
applied:
- <to-be-filled-in>
+ * Linux 4.4.130
+ * s390/uprobes: implement arch_uretprobe_is_alive()
+ * s390/cio: update chpid descriptor after resource accessibility event
+ * cdrom: information leak in cdrom_ioctl_media_changed()
+ * scsi: mptsas: Disable WRITE SAME
+ * ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
+ * net: af_packet: fix race in PACKET_{R|T}X_RING
+ * tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
+ * net: fix deadlock while clearing neighbor proxy table
+ * tipc: add policy for TIPC_NLA_NET_ADDR
+ * llc: fix NULL pointer deref for SOCK_ZAPPED
+ * llc: hold llc_sap before release_sock()
+ * sctp: do not check port in sctp_inet6_cmp_addr
+ * vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
+ * pppoe: check sockaddr length in pppoe_connect()
+ * packet: fix bitfield update race
+ * team: fix netconsole setup over team
+ * team: avoid adding twice the same option to the event list
+ * tcp: don't read out-of-bounds opsize
+ * llc: delete timers synchronously in llc_sk_free()
+ * net: validate attribute sizes in neigh_dump_table()
+ * l2tp: check sockaddr length in pppol2tp_connect()
+ * KEYS: DNS: limit the length of option strings
+ * bonding: do not set slave_dev npinfo before slave_enable_netpoll in
bond_enslave
+ * s390: correct module section names for expoline code revert
+ * s390: correct nospec auto detection init order
+ * s390: add sysfs attributes for spectre
+ * s390: report spectre mitigation via syslog
+ * s390: add automatic detection of the spectre defense
+ * s390: move nobp parameter functions to nospec-branch.c
+ * s390/entry.S: fix spurious zeroing of r0
+ * s390: do not bypass BPENTER for interrupt system calls
+ * s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*)
+ * s390: introduce execute-trampolines for branches
+ * s390: run user space and KVM guests with modified branch prediction
+ * s390: add options to change branch prediction behaviour for the kernel
+ * s390/alternative: use a copy of the facility bit mask
+ * s390: add optimized array_index_mask_nospec
+ * s390: scrub registers on kernel entry and KVM exit
+ * KVM: s390: wire up bpb feature
+ * s390: enable CPU alternatives unconditionally
+ * s390: introduce CPU alternatives
+ * Revert "ath10k: send (re)assoc peer command when NSS changed"
+ * jbd2: fix use after free in kjournald2()
+ * ath9k_hw: check if the chip failed to wake up
+ * Input: drv260x - fix initializing overdrive voltage
+ * r8152: add Linksys USB3GIGV1 id
+ * staging: ion : Donnot wakeup kswapd in ion system alloc
+ * perf: Return proper values for user stack errors
+ * x86/tsc: Prevent 32bit truncation in calc_hpet_ref()
+ * cifs: do not allow creating sockets except with SMB1 posix exensions
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1768474
Title:
Xenial update to 4.4.130 stable release
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1768474/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs