Xenial update to 4.4.73 stable release

Bug #1698817 reported by Stefan Bader
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Undecided
Unassigned
Xenial
Medium
Stefan Bader

Bug Description

SRU Justification

    Impact:
       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The 4.4.73 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.

       git://git.kernel.org/

    TEST CASE: TBD

The following patches from the 4.4.73 stable release shall be applied:
* s390/vmem: fix identity mapping
* partitions/msdos: FreeBSD UFS2 file systems are not recognized
* ARM: dts: imx6dl: Fix the VDD_ARM_CAP voltage for 396MHz operation
* staging: rtl8192e: rtl92e_fill_tx_desc fix write to mapped out memory.
* net: xilinx_emaclite: fix freezes due to unordered I/O
* net: xilinx_emaclite: fix receive buffer overflow
* ipv6: Handle IPv4-mapped src to in6addr_any dst.
* ipv6: Inhibit IPv4-mapped src address on the wire.
* NET: Fix /proc/net/arp for AX.25
* NET: mkiss: Fix panic
* net: hns: Fix the device being used for dma mapping during TX
* sierra_net: Skip validating irrelevant fields for IDLE LSIs
* sierra_net: Add support for IPv6 and Dual-Stack Link Sense Indications
* i2c: piix4: Fix request_region size
* ipv6: Fix IPv6 packet loss in scenarios involving roaming + snooping
  switches
* PM / runtime: Avoid false-positive warnings from might_sleep_if()
* jump label: pass kbuild_cflags when checking for asm goto support
* kasan: respect /proc/sys/kernel/traceoff_on_warning
* log2: make order_base_2() behave correctly on const input value zero
* ethtool: do not vzalloc(0) on registers dump
* fscache: Fix dead object requeue
* fscache: Clear outstanding writes when disabling a cookie
* FS-Cache: Initialise stores_lock in netfs cookie
* ipv6: fix flow labels when the traffic class is non-0
* drm/nouveau: prevent userspace from deleting client object
* drm/nouveau/fence/g84-: protect against concurrent access to semaphore
  buffers
* gianfar: synchronize DMA API usage by free_skb_rx_queue w/ gfar_new_page
* pinctrl: berlin-bg4ct: fix the value for "sd1a" of pin SCRD0_CRD_PRES
* net: adaptec: starfire: add checks for dma mapping errors
* parisc, parport_gsc: Fixes for printk continuation lines
* drm/nouveau: Don't enabling polling twice on runtime resume
* drm/ast: Fixed system hanged if disable P2A
* ravb: unmap descriptors when freeing rings
* nfs: Fix "Don't increment lock sequence ID after NFS4ERR_MOVED"
* r8152: re-schedule napi for tx
* r8152: fix rtl8152_post_reset function
* r8152: avoid start_xmit to schedule napi when napi is disabled
* sctp: sctp_addr_id2transport should verify the addr before looking up assoc
* romfs: use different way to generate fsid for BLOCK or MTD
* proc: add a schedule point in proc_pid_readdir()
* tipc: ignore requests when the connection state is not CONNECTED
* xtensa: don't use linux IRQ #0
* s390/kvm: do not rely on the ILC on kvm host protection fauls
* sparc64: make string buffers large enough
* Linux 4.4.73

CVE References

Stefan Bader (smb)
tags: added: kernel-stable-tracking-bug
Revision history for this message
Stefan Bader (smb) wrote :

Skipped the following patches as those were already applied:
* bug #1669941 CIFS: Call echo service immediately after socket reconnect
  - Call echo service immediately after socket reconnect
* bug #1650058 "[Hyper-V/Azure] Please include Mellanox OFED drivers in
  Azure kernel and image
  - net/mlx4_core: Avoid command timeouts during VF driver device
    shutdown

Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Xenial):
assignee: nobody → Stefan Bader (smb)
importance: Undecided → Medium
status: New → In Progress
description: updated
Stefan Bader (smb)
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 4.4.0-87.110

---------------
linux (4.4.0-87.110) xenial; urgency=low

  * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982)

  * CVE-2017-1000364
    - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
    - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev

  * CIFS causes oops (LP: #1704857)
    - CIFS: Fix null pointer deref during read resp processing
    - CIFS: Fix some return values in case of error in 'crypt_message'

 -- Kleber Sacilotto de Souza <email address hidden> Tue, 18 Jul 2017 13:58:43 +0200

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers