Deliberately skipping "Revert "module: Add retpoline tag to VERMAGIC""
because we decided we actually are fine with flagging things that way.

Skipping because already applied:
* Slow system response time due to a monitor bug (bug 1606147)
  - x86/cpu/intel: Introduce macros for Intel family numbers
* CVE-2017-1000364
  - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
* CVE-2017-17448
  - netfilter: nfnetlink_cthelper: Add missing permission checks
* CVE-2017-17450
  - netfilter: xt_osf: Add missing permission checks

We backported the following set for (bug 16407868):
 * netfilter: x_tables: pass xt_counters struct instead of packet
   counter
 * netfilter: x_tables: pass xt_counters struct to counter allocator
 * netfilter: x_tables: pack percpu counter allocations
this caused the following stable patch to be not needed in Xenial:
 * netfilter: fix IS_ERR_VALUE usage

Skipped until later decision (Spectre v2 upstream):
* x86/retpoline: Fill RSB on context switch for affected CPUs
  -> re-defines the SPEC_CTRL bit with a different name and does
     some STUFF_RSB related things

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000364

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17448

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17450

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1754592

Title:
  Xenial update to 4.4.114 stable release

Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  In Progress

Bug description:
  
      SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.114 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

         The following patches from the 4.4.114 stable release shall be
  applied:

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1754592/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to