Xenial update to 4.4.120 stable release

Bug #1764316 reported by Juerg Haefliger
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Unassigned

Bug Description

SRU Justification

Impact:
   The upstream process for stable tree updates is quite similar
   in scope to the Ubuntu SRU process, e.g., each patch has to
   demonstrably fix a bug, and each patch is vetted by upstream
   by originating either directly from a mainline/stable Linux tree
   or a minimally backported form of that patch. The 4.4.120 upstream
   stable stable patch set is now available. It should be included
   in the Ubuntu kernel as well.

   git://git.kernel.org/

TEST CASE: TBD

   The following patches from the 4.4.120 stable release shall be
   applied:

   * Linux 4.4.120
   * MIPS: Implement __multi3 for GCC7 MIPS64r6 builds
   * net: gianfar_ptp: move set_fipers() to spinlock protecting area
   * sctp: make use of pre-calculated len
   * xen/gntdev: Fix partial gntdev_mmap() cleanup
   * xen/gntdev: Fix off-by-one error when unmapping with holes
   * SolutionEngine771x: fix Ether platform data
   * mdio-sun4i: Fix a memory leak
   * xen-netfront: enable device after manual module load
   * bnxt_en: Fix the 'Invalid VF' id check in bnxt_vf_ndo_prep routine.
   * can: flex_can: Correct the checking for frame length in flexcan_start_xmit()
   * mac80211: mesh: drop frames appearing to be from us
   * drm/ttm: check the return value of kzalloc
   * e1000: fix disabling already-disabled warning
   * xfs: quota: check result of register_shrinker()
   * xfs: quota: fix missed destroy of qi_tree_lock
   * IB/ipoib: Fix race condition in neigh creation
   * IB/mlx4: Fix mlx4_ib_alloc_mr error flow
   * s390/dasd: fix wrongly assigned configuration data
   * led: core: Fix brightness setting when setting delay_off=0
   * bnx2x: Improve reliability in case of nested PCI errors
   * tg3: Enable PHY reset in MTU change path for 5720
   * tg3: Add workaround to restrict 5762 MRRS to 2048
   * lib/mpi: Fix umul_ppmm() for MIPS64r6
   * ARM: dts: ls1021a: fix incorrect clock references
   * scsi: storvsc: Fix scsi_cmd error assignments in storvsc_handle_error
   * net: arc_emac: fix arc_emac_rx() error paths
   * spi: atmel: fixed spin_lock usage inside atmel_spi_remove
   * drm/nouveau/pci: do a msi rearm on init
   * sget(): handle failures of register_shrinker()
   * ARM: 8731/1: Fix csum_partial_copy_from_user() stack mismatch
   * ipv6: icmp6: Allow icmp messages to be looped back
   * mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM
   * f2fs: fix a bug caused by NULL extent tree
   * hrtimer: Ensure POSIX compliance (relative CLOCK_REALTIME hrtimers)

Juerg Haefliger (juergh)
Changed in linux (Ubuntu):
status: New → Invalid
description: updated
Stefan Bader (smb)
Changed in linux (Ubuntu Xenial):
importance: Undecided → Medium
status: New → In Progress
Revision history for this message
Stefan Bader (smb) wrote :

Additionally dropping "led: core: Fix brightness setting when setting delay_off=0" as I noticed it being reverted in 4.4.121 (the patch had a bit of an odd SOB chain, or rather none from upstream).

Stefan Bader (smb)
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (59.3 KiB)

This bug was fixed in the package linux - 4.4.0-127.153

---------------
linux (4.4.0-127.153) xenial; urgency=medium

  * CVE-2018-3639 (powerpc)
    - powerpc/pseries: Support firmware disable of RFI flush
    - powerpc/powernv: Support firmware disable of RFI flush
    - powerpc/rfi-flush: Move the logic to avoid a redo into the debugfs code
    - powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
    - powerpc/rfi-flush: Always enable fallback flush on pseries
    - powerpc/rfi-flush: Differentiate enabled and patched flush types
    - powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
    - powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
    - powerpc: Add security feature flags for Spectre/Meltdown
    - powerpc/pseries: Set or clear security feature flags
    - powerpc/powernv: Set or clear security feature flags
    - powerpc/64s: Move cpu_show_meltdown()
    - powerpc/64s: Enhance the information in cpu_show_meltdown()
    - powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
    - powerpc/pseries: Use the security flags in pseries_setup_rfi_flush()
    - powerpc/64s: Wire up cpu_show_spectre_v1()
    - powerpc/64s: Wire up cpu_show_spectre_v2()
    - powerpc/pseries: Fix clearing of security feature flags
    - powerpc: Move default security feature flags
    - powerpc/pseries: Restore default security feature flags on setup
    - SAUCE: powerpc/64s: Add support for a store forwarding barrier at kernel
      entry/exit

  * CVE-2018-3639 (x86)
    - SAUCE: Clean up IBPB and IBRS control functions and macros
    - SAUCE: Fix up IBPB and IBRS kernel parameters documentation
    - SAUCE: Remove #define X86_FEATURE_PTI
    - x86/cpufeature: Move some of the scattered feature bits to x86_capability
    - x86/cpufeature: Cleanup get_cpu_cap()
    - x86/cpu: Probe CPUID leaf 6 even when cpuid_level == 6
    - x86/cpufeatures: Add CPUID_7_EDX CPUID leaf
    - x86/cpufeatures: Add Intel feature bits for Speculation Control
    - SAUCE: x86/kvm: Expose SPEC_CTRL from the leaf
    - x86/cpufeatures: Add AMD feature bits for Speculation Control
    - x86/msr: Add definitions for new speculation control MSRs
    - SAUCE: x86/msr: Rename MSR spec control feature bits
    - x86/pti: Do not enable PTI on CPUs which are not vulnerable to Meltdown
    - x86/cpufeature: Blacklist SPEC_CTRL/PRED_CMD on early Spectre v2 microcodes
    - x86/speculation: Add basic IBPB (Indirect Branch Prediction Barrier) support
    - x86/speculation: Add <asm/msr-index.h> dependency
    - x86/cpufeatures: Clean up Spectre v2 related CPUID flags
    - x86/cpuid: Fix up "virtual" IBRS/IBPB/STIBP feature bits on Intel
    - SAUCE: x86/speculation: Move vendor specific IBRS/IBPB control code
    - SAUCE: x86: Add alternative_msr_write
    - SAUCE: x86/nospec: Simplify alternative_msr_write()
    - SAUCE: x86/bugs: Concentrate bug detection into a separate function
    - SAUCE: x86/bugs: Concentrate bug reporting into a separate function
    - arch: Introduce post-init read-only memory
    - SAUCE: x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
    - SAUCE: x86/bugs, KVM: Support the combination of guest a...

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers