Vivid update to v3.19.8-ckt22 stable release

Bug #1587557 reported by Kamal Mostafa on 2016-05-31
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Undecided
Unassigned
Vivid
Undecided
Unassigned

Bug Description

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The v3.19.8-ckt22 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.launchpad.net/~canonical-kernel/linux/+git/linux-stable-ckt

    TEST CASE: TBD

       The following patches from the v3.19.8-ckt22 stable release shall be applied:

Linux 3.19.8-ckt22
net: bridge: fix old ioctl unlocked net device walk
VSOCK: do not disconnect socket when peer has shutdown SEND only
netem: Segment GSO packets on enqueue
sch_dsmark: update backlog as well
sch_htb: update backlog as well
net_sched: update hierarchical backlog too
net_sched: introduce qdisc_replace() helper
bpf: fix double-fdput in replace_map_fd_with_map_ptr()
ipv4/fib: don't warn when primary address is missing if in_dev is dead
vlan: pull on __vlan_insert_tag error path and fix csum correction
net: use skb_postpush_rcsum instead of own implementations
route: do not cache fib route info on local routes with oif
decnet: Do not build routes to devices without decnet private data.
arm64: bpf: jit JMP_JSET_{X,K}
tcp: refresh skb timestamp at retransmit time
macvtap: segmented packet is consumed
net/mlx4_en: Fix endianness bug in IPV6 csum calculation
net: fec: only clear a queue's work bit if the queue was emptied
nf_conntrack: avoid kernel pointer value leak in slab name
ocfs2: fix posix_acl_create deadlock
workqueue: fix rebind bound workers warning
tools lib traceevent: Do not reassign parg after collapse_tree()
tools lib traceevent: Free filter tokens in process_filter()
ALSA: hda - Fix subwoofer pin on ASUS N751 and N551
drm/i915: Bail out of pipe config compute loop on LPT
Input: max8997-haptic - fix NULL pointer dereference
ALSA: hda - Fix white noise on Asus UX501VW headset
drm/radeon: fix PLL sharing on DCE6.1 (v2)
crypto: hash - Fix page length clamping in hash walk
atomic_open(): fix the handling of create_error
regmap: spmi: Fix regmap_spmi_ext_read in multi-byte case
regulator: s2mps11: Fix invalid selector mask and voltages for buck9
x86: LLVMLinux: Fix "incomplete type const struct x86cpu_device_id"
fix backport "IB/security: restrict use of the write() interface"
compiler-gcc: integrate the various compiler-gcc[345].h files

tags: added: kernel-stable-tracking-bug
description: updated
Changed in linux (Ubuntu Vivid):
status: New → Fix Committed
Launchpad Janitor (janitor) wrote :
Download full text (6.2 KiB)

This bug was fixed in the package linux - 3.19.0-64.72

---------------
linux (3.19.0-64.72) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1595976

  [ Upstream Kernel Changes ]

  * netfilter: x_tables: validate e->target_offset early
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
    size
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
    - LP: #1595350
  * netfilter: x_tables: validate targets of jumps
    - LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
    - LP: #1595350
  * netfilter: x_tables: kill check_entry helper
    - LP: #1595350
  * netfilter: x_tables: assert minimum target size
    - LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
    - LP: #1595350
  * netfilter: x_tables: check standard target size too
    - LP: #1595350
  * netfilter: x_tables: check for bogus target offset
    - LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
    - LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
    architectures
    - LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
    - LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
    - LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
    - LP: #1595350

linux (3.19.0-63.71) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
    - LP: #1595723

  [ Serge Hallyn ]

  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
    - LP: #1555338, #1595350

linux (3.19.0-62.70) vivid; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
    - LP: #1591307

  [ Kamal Mostafa ]

  * [debian] getabis: Only git add $abidir if running in local repo
    - LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
    - LP: #1584890

  [ Tim Gardner ]

  * [Config] Remove arc4 from nic-modules
    - LP: #1582991

  [ Upstream Kernel Changes ]

  * Revert "usb: hub: do not clear BOS field during reset device"
    - LP: #1582864
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
    - LP: #1580379
    - CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
    - LP: #1581866
    - CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
    - LP: #1581866
    - CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
    - LP: #1585366
    - CVE-2016-4580
  * get_rock_ridge_filename(): handle malformed NM entries
    - LP: #1583962
    - CVE-2016-4913
  * tipc: check nl sock before parsing nested attributes
    - LP: #1585365
    - CVE-2016-4951
  * netfilter: Set /proc/net entries owner to root in namespace
    - L...

Read more...

Changed in linux (Ubuntu Vivid):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers