Activity log for bug #1642573

Date Who What changed Old value New value Message
2016-11-17 11:59:14 Luis Henriques bug added bug
2016-11-17 11:59:16 Luis Henriques tags kernel-stable-tracking-bug
2016-11-17 11:59:17 Luis Henriques bug added subscriber SRU Verification
2016-11-17 11:59:18 Luis Henriques bug added subscriber Ubuntu Stable Release Updates Team
2016-11-17 11:59:25 Luis Henriques nominated for series Ubuntu Xenial
2016-11-17 11:59:26 Luis Henriques bug task added linux (Ubuntu Xenial)
2016-11-17 12:01:46 Luis Henriques description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.32 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.32 stable release shall be applied: SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The 4.4.32 upstream stable        patch set is now available. It should be included in the Ubuntu        kernel as well.        git://git.kernel.org/     TEST CASE: TBD        The following patches from the 4.4.32 stable release shall be applied: tcp: fix overflow in __tcp_retransmit_skb() net: avoid sk_forward_alloc overflows tcp: fix wrong checksum calculation on MTU probing tcp: fix a compile error in DBGUNDO() ip6_gre: fix flowi6_proto value in ip6gre_xmit_other() ipmr, ip6mr: fix scheduling while atomic and a deadlock with ipmr_get_route tg3: Avoid NULL pointer dereference in tg3_io_error_detected() net: fec: set mac address unconditionally net: pktgen: fix pkt_size net/sched: act_vlan: Push skb->data to mac_header prior calling skb_vlan_*() functions net: Add netdev all_adj_list refcnt propagation to fix panic packet: call fanout_release, while UNREGISTERING a netdev netlink: do not enter direct reclaim from netlink_dump() ipv6: tcp: restore IP6CB for pktoptions skbs ip6_tunnel: fix ip6_tnl_lookup ipv6: correctly add local routes when lo goes up net: pktgen: remove rcu locking in pktgen_change_name() bridge: multicast: restore perm router ports on multicast enable rtnetlink: Add rtnexthop offload flag to compare mask net: add recursion limit to GRO ipv4: disable BH in set_ping_group_range() ipv4: use the right lock for ping_group_range net: sctp, forbid negative length udp: fix IP_CHECKSUM handling net sched filters: fix notification of filter delete with proper handle sctp: validate chunk len before actually using it packet: on direct_xmit, limit tso and csum to supported devices of: silence warnings due to max() usage Revert KVM: MIPS: Drop other CPU ASIDs on guest MMU changes KVM: MIPS: Drop other CPU ASIDs on guest MMU changes drm/amdgpu/dp: add back special handling for NUTMEG drm/amdgpu: fix DP mode validation drm/radeon/dp: add back special handling for NUTMEG drm/radeon: fix DP mode validation scsi: megaraid_sas: fix macro MEGASAS_IS_LOGICAL to avoid regression Linux 4.4.32
2016-11-17 12:08:10 Luis Henriques linux (Ubuntu Xenial): assignee Luis Henriques (henrix)
2016-11-17 12:08:14 Luis Henriques linux (Ubuntu Xenial): status New In Progress
2016-11-17 13:43:59 Luis Henriques linux (Ubuntu Xenial): status In Progress Fix Committed
2016-12-20 18:52:13 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2016-12-20 18:52:13 Launchpad Janitor cve linked 2016-4568
2016-12-20 18:52:13 Launchpad Janitor cve linked 2016-6213
2016-12-20 18:52:13 Launchpad Janitor cve linked 2016-7039
2016-12-20 18:52:13 Launchpad Janitor cve linked 2016-8630
2016-12-20 18:52:13 Launchpad Janitor cve linked 2016-8666
2019-10-03 08:44:29 Po-Hsu Lin linux (Ubuntu): status New Invalid