Public bug reported:

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree
   or a minimally backported form of that patch. The 4.4.132 upstream
   stable stable patch set is now available. It should be included
   in the Ubuntu kernel as well.

   git://git.kernel.org/

TEST CASE: TBD

   The following patches from the 4.4.132 stable release shall be
   applied:

   * Linux 4.4.132
   * perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
   * perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[]
   * perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver
   * perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr
   * perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
   * tracing/uprobe_event: Fix strncpy corner case
   * Revert "Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174"
   * atm: zatm: Fix potential Spectre v1
   * net: atm: Fix potential Spectre v1
   * can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg()
   * tracing: Fix regex_match_front() to not over compare the test string
   * libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs
   * rfkill: gpio: fix memory leak in probe error path
   * xfrm_user: fix return value from xfrm_user_rcv_msg
   * f2fs: fix a dead loop in f2fs_fiemap()
   * bdi: Fix oops in wb_workfn()
   * tcp: fix TCP_REPAIR_QUEUE bound checking
   * perf: Remove superfluous allocation error check
   * soreuseport: initialise timewait reuseport field
   * dccp: initialize ireq->ir_mark
   * net: fix uninit-value in __hw_addr_add_ex()
   * net: initialize skb->peeked when cloning
   * net: fix rtnh_ok()
   * netlink: fix uninit-value in netlink_sendmsg
   * crypto: af_alg - fix possible uninit-value in alg_bind()
   * ipvs: fix rtnl_lock lockups caused by start_sync_thread
   * usb: musb: host: fix potential NULL pointer dereference
   * USB: serial: option: adding support for ublox R410M
   * USB: serial: option: reimplement interface masking
   * USB: Accept bulk endpoints with 1024-byte maxpacket
   * USB: serial: visor: handle potential invalid device configuration
   * test_firmware: fix setting old custom fw path back on exit, second try
   * drm/vmwgfx: Fix a buffer object leak
   * IB/mlx5: Use unlimited rate when static rate is not supported
   * NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2
   * RDMA/mlx5: Protect from shift operand overflow
   * RDMA/ucma: Allow resolving address w/o specifying source address
   * xfs: prevent creating negative-sized file via INSERT_RANGE
   * Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook 
Pro
   * Input: leds - fix out of bound access
   * tracepoint: Do not warn on ENOMEM
   * ALSA: aloop: Add missing cable lock to ctl API callbacks
   * ALSA: aloop: Mark paused device as inactive
   * ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger()
   * ALSA: pcm: Check PCM state at xfern compat ioctl
   * USB: serial: option: Add support for Quectel EP06
   * gpmi-nand: Handle ECC Errors in erased pages
   * ath10k: rebuild crypto header in rx data frames
   * ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode
   * mac80211: Add RX flag to indicate ICV stripped
   * mac80211: allow same PN for AMSDU sub-frames
   * mac80211: allow not sending MIC up from driver for HW crypto
   * percpu: include linux/sched.h for cond_resched()
   * KVM: s390: Enable all facility bits that are known good for passthrough
   * bpf: map_get_next_key to return first key on NULL
   * perf/core: Fix the perf_cpu_time_max_percent check

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Invalid


** Tags: kernel-stable-tracking-bug

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Description changed:

  
  SRU Justification
  
  Impact:
     The upstream process for stable tree updates is quite similar
     in scope to the Ubuntu SRU process, e.g., each patch has to
     demonstrably fix a bug, and each patch is vetted by upstream
     by originating either directly from a mainline/stable Linux tree
     or a minimally backported form of that patch. The 4.4.132 upstream
     stable stable patch set is now available. It should be included
     in the Ubuntu kernel as well.
  
     git://git.kernel.org/
  
  TEST CASE: TBD
  
     The following patches from the 4.4.132 stable release shall be
     applied:
  
- <to-be-filled-in>
+    * Linux 4.4.132
+    * perf/x86: Fix possible Spectre-v1 indexing for x86_pmu::event_map()
+    * perf/core: Fix possible Spectre-v1 indexing for ->aux_pages[]
+    * perf/x86/msr: Fix possible Spectre-v1 indexing in the MSR driver
+    * perf/x86/cstate: Fix possible Spectre-v1 indexing for pkg_msr
+    * perf/x86: Fix possible Spectre-v1 indexing for hw_perf_event cache_*
+    * tracing/uprobe_event: Fix strncpy corner case
+    * Revert "Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174"
+    * atm: zatm: Fix potential Spectre v1
+    * net: atm: Fix potential Spectre v1
+    * can: kvaser_usb: Increase correct stats counter in 
kvaser_usb_rx_can_msg()
+    * tracing: Fix regex_match_front() to not over compare the test string
+    * libata: Apply NOLPM quirk for SanDisk SD7UB3Q*G1001 SSDs
+    * rfkill: gpio: fix memory leak in probe error path
+    * xfrm_user: fix return value from xfrm_user_rcv_msg
+    * f2fs: fix a dead loop in f2fs_fiemap()
+    * bdi: Fix oops in wb_workfn()
+    * tcp: fix TCP_REPAIR_QUEUE bound checking
+    * perf: Remove superfluous allocation error check
+    * soreuseport: initialise timewait reuseport field
+    * dccp: initialize ireq->ir_mark
+    * net: fix uninit-value in __hw_addr_add_ex()
+    * net: initialize skb->peeked when cloning
+    * net: fix rtnh_ok()
+    * netlink: fix uninit-value in netlink_sendmsg
+    * crypto: af_alg - fix possible uninit-value in alg_bind()
+    * ipvs: fix rtnl_lock lockups caused by start_sync_thread
+    * usb: musb: host: fix potential NULL pointer dereference
+    * USB: serial: option: adding support for ublox R410M
+    * USB: serial: option: reimplement interface masking
+    * USB: Accept bulk endpoints with 1024-byte maxpacket
+    * USB: serial: visor: handle potential invalid device configuration
+    * test_firmware: fix setting old custom fw path back on exit, second try
+    * drm/vmwgfx: Fix a buffer object leak
+    * IB/mlx5: Use unlimited rate when static rate is not supported
+    * NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2
+    * RDMA/mlx5: Protect from shift operand overflow
+    * RDMA/ucma: Allow resolving address w/o specifying source address
+    * xfs: prevent creating negative-sized file via INSERT_RANGE
+    * Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook 
Pro
+    * Input: leds - fix out of bound access
+    * tracepoint: Do not warn on ENOMEM
+    * ALSA: aloop: Add missing cable lock to ctl API callbacks
+    * ALSA: aloop: Mark paused device as inactive
+    * ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger()
+    * ALSA: pcm: Check PCM state at xfern compat ioctl
+    * USB: serial: option: Add support for Quectel EP06
+    * gpmi-nand: Handle ECC Errors in erased pages
+    * ath10k: rebuild crypto header in rx data frames
+    * ath10k: fix rfc1042 header retrieval in QCA4019 with eth decap mode
+    * mac80211: Add RX flag to indicate ICV stripped
+    * mac80211: allow same PN for AMSDU sub-frames
+    * mac80211: allow not sending MIC up from driver for HW crypto
+    * percpu: include linux/sched.h for cond_resched()
+    * KVM: s390: Enable all facility bits that are known good for passthrough
+    * bpf: map_get_next_key to return first key on NULL
+    * perf/core: Fix the perf_cpu_time_max_percent check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1774173

Title:
  Xenial update to 4.4.132 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1774173/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to