** Description changed:

  
  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree
     or a minimally backported form of that patch. The 4.4.130 upstream
     stable stable patch set is now available. It should be included
     in the Ubuntu kernel as well.
  
     git://git.kernel.org/
  
  TEST CASE: TBD
  
     The following patches from the 4.4.130 stable release shall be
     applied:
- <to-be-filled-in>
+    * Linux 4.4.130
+    * s390/uprobes: implement arch_uretprobe_is_alive()
+    * s390/cio: update chpid descriptor after resource accessibility event
+    * cdrom: information leak in cdrom_ioctl_media_changed()
+    * scsi: mptsas: Disable WRITE SAME
+    * ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy
+    * net: af_packet: fix race in PACKET_{R|T}X_RING
+    * tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets
+    * net: fix deadlock while clearing neighbor proxy table
+    * tipc: add policy for TIPC_NLA_NET_ADDR
+    * llc: fix NULL pointer deref for SOCK_ZAPPED
+    * llc: hold llc_sap before release_sock()
+    * sctp: do not check port in sctp_inet6_cmp_addr
+    * vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi
+    * pppoe: check sockaddr length in pppoe_connect()
+    * packet: fix bitfield update race
+    * team: fix netconsole setup over team
+    * team: avoid adding twice the same option to the event list
+    * tcp: don't read out-of-bounds opsize
+    * llc: delete timers synchronously in llc_sk_free()
+    * net: validate attribute sizes in neigh_dump_table()
+    * l2tp: check sockaddr length in pppol2tp_connect()
+    * KEYS: DNS: limit the length of option strings
+    * bonding: do not set slave_dev npinfo before slave_enable_netpoll in 
bond_enslave
+    * s390: correct module section names for expoline code revert
+    * s390: correct nospec auto detection init order
+    * s390: add sysfs attributes for spectre
+    * s390: report spectre mitigation via syslog
+    * s390: add automatic detection of the spectre defense
+    * s390: move nobp parameter functions to nospec-branch.c
+    * s390/entry.S: fix spurious zeroing of r0
+    * s390: do not bypass BPENTER for interrupt system calls
+    * s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*)
+    * s390: introduce execute-trampolines for branches
+    * s390: run user space and KVM guests with modified branch prediction
+    * s390: add options to change branch prediction behaviour for the kernel
+    * s390/alternative: use a copy of the facility bit mask
+    * s390: add optimized array_index_mask_nospec
+    * s390: scrub registers on kernel entry and KVM exit
+    * KVM: s390: wire up bpb feature
+    * s390: enable CPU alternatives unconditionally
+    * s390: introduce CPU alternatives
+    * Revert "ath10k: send (re)assoc peer command when NSS changed"
+    * jbd2: fix use after free in kjournald2()
+    * ath9k_hw: check if the chip failed to wake up
+    * Input: drv260x - fix initializing overdrive voltage
+    * r8152: add Linksys USB3GIGV1 id
+    * staging: ion : Donnot wakeup kswapd in ion system alloc
+    * perf: Return proper values for user stack errors
+    * x86/tsc: Prevent 32bit truncation in calc_hpet_ref()
+    * cifs: do not allow creating sockets except with SMB1 posix exensions

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1768474

Title:
  Xenial update to 4.4.130 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1768474/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to