Xenial update to 4.4.73 stable release

Bug #1698817 reported by Stefan Bader
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Stefan Bader

Bug Description

SRU Justification

       The upstream process for stable tree updates is quite similar
       in scope to the Ubuntu SRU process, e.g., each patch has to
       demonstrably fix a bug, and each patch is vetted by upstream
       by originating either directly from a mainline/stable Linux tree or
       a minimally backported form of that patch. The 4.4.73 upstream stable
       patch set is now available. It should be included in the Ubuntu
       kernel as well.



The following patches from the 4.4.73 stable release shall be applied:
* s390/vmem: fix identity mapping
* partitions/msdos: FreeBSD UFS2 file systems are not recognized
* ARM: dts: imx6dl: Fix the VDD_ARM_CAP voltage for 396MHz operation
* staging: rtl8192e: rtl92e_fill_tx_desc fix write to mapped out memory.
* net: xilinx_emaclite: fix freezes due to unordered I/O
* net: xilinx_emaclite: fix receive buffer overflow
* ipv6: Handle IPv4-mapped src to in6addr_any dst.
* ipv6: Inhibit IPv4-mapped src address on the wire.
* NET: Fix /proc/net/arp for AX.25
* NET: mkiss: Fix panic
* net: hns: Fix the device being used for dma mapping during TX
* sierra_net: Skip validating irrelevant fields for IDLE LSIs
* sierra_net: Add support for IPv6 and Dual-Stack Link Sense Indications
* i2c: piix4: Fix request_region size
* ipv6: Fix IPv6 packet loss in scenarios involving roaming + snooping
* PM / runtime: Avoid false-positive warnings from might_sleep_if()
* jump label: pass kbuild_cflags when checking for asm goto support
* kasan: respect /proc/sys/kernel/traceoff_on_warning
* log2: make order_base_2() behave correctly on const input value zero
* ethtool: do not vzalloc(0) on registers dump
* fscache: Fix dead object requeue
* fscache: Clear outstanding writes when disabling a cookie
* FS-Cache: Initialise stores_lock in netfs cookie
* ipv6: fix flow labels when the traffic class is non-0
* drm/nouveau: prevent userspace from deleting client object
* drm/nouveau/fence/g84-: protect against concurrent access to semaphore
* gianfar: synchronize DMA API usage by free_skb_rx_queue w/ gfar_new_page
* pinctrl: berlin-bg4ct: fix the value for "sd1a" of pin SCRD0_CRD_PRES
* net: adaptec: starfire: add checks for dma mapping errors
* parisc, parport_gsc: Fixes for printk continuation lines
* drm/nouveau: Don't enabling polling twice on runtime resume
* drm/ast: Fixed system hanged if disable P2A
* ravb: unmap descriptors when freeing rings
* nfs: Fix "Don't increment lock sequence ID after NFS4ERR_MOVED"
* r8152: re-schedule napi for tx
* r8152: fix rtl8152_post_reset function
* r8152: avoid start_xmit to schedule napi when napi is disabled
* sctp: sctp_addr_id2transport should verify the addr before looking up assoc
* romfs: use different way to generate fsid for BLOCK or MTD
* proc: add a schedule point in proc_pid_readdir()
* tipc: ignore requests when the connection state is not CONNECTED
* xtensa: don't use linux IRQ #0
* s390/kvm: do not rely on the ILC on kvm host protection fauls
* sparc64: make string buffers large enough
* Linux 4.4.73

CVE References

Stefan Bader (smb)
tags: added: kernel-stable-tracking-bug
Revision history for this message
Stefan Bader (smb) wrote :

Skipped the following patches as those were already applied:
* bug #1669941 CIFS: Call echo service immediately after socket reconnect
  - Call echo service immediately after socket reconnect
* bug #1650058 "[Hyper-V/Azure] Please include Mellanox OFED drivers in
  Azure kernel and image
  - net/mlx4_core: Avoid command timeouts during VF driver device

Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Xenial):
assignee: nobody → Stefan Bader (smb)
importance: Undecided → Medium
status: New → In Progress
description: updated
Stefan Bader (smb)
Changed in linux (Ubuntu Xenial):
status: In Progress → Fix Committed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 4.4.0-87.110

linux (4.4.0-87.110) xenial; urgency=low

  * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982)

  * CVE-2017-1000364
    - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
    - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev

  * CIFS causes oops (LP: #1704857)
    - CIFS: Fix null pointer deref during read resp processing
    - CIFS: Fix some return values in case of error in 'crypt_message'

 -- Kleber Sacilotto de Souza <email address hidden> Tue, 18 Jul 2017 13:58:43 +0200

Changed in linux (Ubuntu Xenial):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers