** Description changed: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.130 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.130 stable release shall be applied: - <to-be-filled-in> + * Linux 4.4.130 + * s390/uprobes: implement arch_uretprobe_is_alive() + * s390/cio: update chpid descriptor after resource accessibility event + * cdrom: information leak in cdrom_ioctl_media_changed() + * scsi: mptsas: Disable WRITE SAME + * ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy + * net: af_packet: fix race in PACKET_{R|T}X_RING + * tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets + * net: fix deadlock while clearing neighbor proxy table + * tipc: add policy for TIPC_NLA_NET_ADDR + * llc: fix NULL pointer deref for SOCK_ZAPPED + * llc: hold llc_sap before release_sock() + * sctp: do not check port in sctp_inet6_cmp_addr + * vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi + * pppoe: check sockaddr length in pppoe_connect() + * packet: fix bitfield update race + * team: fix netconsole setup over team + * team: avoid adding twice the same option to the event list + * tcp: don't read out-of-bounds opsize + * llc: delete timers synchronously in llc_sk_free() + * net: validate attribute sizes in neigh_dump_table() + * l2tp: check sockaddr length in pppol2tp_connect() + * KEYS: DNS: limit the length of option strings + * bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave + * s390: correct module section names for expoline code revert + * s390: correct nospec auto detection init order + * s390: add sysfs attributes for spectre + * s390: report spectre mitigation via syslog + * s390: add automatic detection of the spectre defense + * s390: move nobp parameter functions to nospec-branch.c + * s390/entry.S: fix spurious zeroing of r0 + * s390: do not bypass BPENTER for interrupt system calls + * s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) + * s390: introduce execute-trampolines for branches + * s390: run user space and KVM guests with modified branch prediction + * s390: add options to change branch prediction behaviour for the kernel + * s390/alternative: use a copy of the facility bit mask + * s390: add optimized array_index_mask_nospec + * s390: scrub registers on kernel entry and KVM exit + * KVM: s390: wire up bpb feature + * s390: enable CPU alternatives unconditionally + * s390: introduce CPU alternatives + * Revert "ath10k: send (re)assoc peer command when NSS changed" + * jbd2: fix use after free in kjournald2() + * ath9k_hw: check if the chip failed to wake up + * Input: drv260x - fix initializing overdrive voltage + * r8152: add Linksys USB3GIGV1 id + * staging: ion : Donnot wakeup kswapd in ion system alloc + * perf: Return proper values for user stack errors + * x86/tsc: Prevent 32bit truncation in calc_hpet_ref() + * cifs: do not allow creating sockets except with SMB1 posix exensions
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1768474 Title: Xenial update to 4.4.130 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1768474/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs