The following patches were skipped because they were already applied:

* CVE-2016-6213
  - mnt: Add a per mount namespace limit on the number of mounts

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.4.65 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.4.65 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.4.65 stable release shall be
- applied:
+ The following patches from the 4.4.65 stable release shall be applied:
+ * tipc: make sure IPv6 header fits in skb headroom
+ * tipc: make dist queue pernet
+ * tipc: re-enable compensation for socket receive buffer double counting
+ * tipc: correct error in node fsm
+ * tty: nozomi: avoid a harmless gcc warning
+ * hostap: avoid uninitialized variable use in hfa384x_get_rid
+ * gfs2: avoid uninitialized variable warning
+ * tipc: fix random link resets while adding a second bearer
+ * tipc: fix socket timer deadlock
+ * xc2028: avoid use after free
+ * netfilter: nfnetlink: correctly validate length of batch messages
+ * tipc: check minimum bearer MTU
+ * vfio/pci: Fix integer overflows, bitmask check
+ * staging/android/ion : fix a race condition in the ion driver
+ * ping: implement proper locking
+ * perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
+ * Linux 4.4.65

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6213

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688483

Title:
  Xenial update to 4.4.65 stable release

Status in linux package in Ubuntu:
  New
Status in linux source package in Xenial:
  In Progress

Bug description:
  SRU Justification

      Impact:
         The upstream process for stable tree updates is quite similar
         in scope to the Ubuntu SRU process, e.g., each patch has to
         demonstrably fix a bug, and each patch is vetted by upstream
         by originating either directly from a mainline/stable Linux tree or
         a minimally backported form of that patch. The 4.4.65 upstream stable
         patch set is now available. It should be included in the Ubuntu
         kernel as well.

         git://git.kernel.org/

      TEST CASE: TBD

  The following patches from the 4.4.65 stable release shall be applied:
  * tipc: make sure IPv6 header fits in skb headroom
  * tipc: make dist queue pernet
  * tipc: re-enable compensation for socket receive buffer double counting
  * tipc: correct error in node fsm
  * tty: nozomi: avoid a harmless gcc warning
  * hostap: avoid uninitialized variable use in hfa384x_get_rid
  * gfs2: avoid uninitialized variable warning
  * tipc: fix random link resets while adding a second bearer
  * tipc: fix socket timer deadlock
  * xc2028: avoid use after free
  * netfilter: nfnetlink: correctly validate length of batch messages
  * tipc: check minimum bearer MTU
  * vfio/pci: Fix integer overflows, bitmask check
  * staging/android/ion : fix a race condition in the ion driver
  * ping: implement proper locking
  * perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
  * Linux 4.4.65

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1688483/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to