Activity log for bug #1764367

Date Who What changed Old value New value Message
2018-04-16 10:02:06 Juerg Haefliger bug added bug
2018-04-16 10:02:07 Juerg Haefliger bug added subscriber SRU Verification
2018-04-16 10:02:08 Juerg Haefliger bug added subscriber Ubuntu Stable Release Updates Team
2018-04-16 10:02:11 Juerg Haefliger nominated for series Ubuntu Xenial
2018-04-16 10:03:37 Juerg Haefliger linux (Ubuntu): status New Invalid
2018-04-16 10:07:18 Juerg Haefliger description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.121 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.121 stable release shall be applied: <to-be-filled-in> SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.121 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.121 stable release shall be applied: * Linux 4.4.121 * btrfs: preserve i_mode if __btrfs_set_acl() fails * bpf, x64: implement retpoline for tail call * dm io: fix duplicate bio completion due to missing ref count * mpls, nospec: Sanitize array index in mpls_label_ok() * net: mpls: Pull common label check into helper * sctp: verify size of a new chunk in _sctp_make_chunk() * s390/qeth: fix IPA command submission race * s390/qeth: fix SETIP command handling * sctp: fix dst refcnt leak in sctp_v6_get_dst() * sctp: fix dst refcnt leak in sctp_v4_get_dst * udplite: fix partial checksum initialization * ppp: prevent unregistered channels from connecting to PPP units * netlink: ensure to loop over all netns in genlmsg_multicast_allns() * net: ipv4: don't allow setting net.ipv4.route.min_pmtu below 68 * net: fix race on decreasing number of TX queues * ipv6 sit: work around bogus gcc-8 -Wrestrict warning * hdlc_ppp: carrier detect ok, don't turn off negotiation * fib_semantics: Don't match route with mismatching tclassid * bridge: check brport attr show in brport_show * Revert "led: core: Fix brightness setting when setting delay_off=0" * x86/spectre: Fix an error message * leds: do not overflow sysfs buffer in led_trigger_show * x86/apic/vector: Handle legacy irq data correctly * ARM: dts: LogicPD Torpedo: Fix I2C1 pinmux * btrfs: Don't clear SGID when inheriting ACLs * x86/syscall: Sanitize syscall table de-references under speculation fix * KVM: mmu: Fix overlap between public and private memslots * ARM: mvebu: Fix broken PL310_ERRATA_753970 selects * nospec: Allow index argument to have const-qualified type * media: m88ds3103: don't call a non-initalized function * cpufreq: s3c24xx: Fix broken s3c_cpufreq_init() * ALSA: hda: Add a power_save blacklist * ALSA: usb-audio: Add a quirck for B&W PX headphones * tpm_i2c_nuvoton: fix potential buffer overruns caused by bit glitches on the bus * tpm_i2c_infineon: fix potential buffer overruns caused by bit glitches on the bus * tpm: st33zp24: fix potential buffer overruns caused by bit glitches on the bus
2018-04-16 15:59:57 Stefan Bader bug task added linux (Ubuntu Xenial)
2018-04-16 16:00:18 Stefan Bader linux (Ubuntu Xenial): importance Undecided Medium
2018-04-16 16:00:18 Stefan Bader linux (Ubuntu Xenial): status New In Progress
2018-04-16 16:51:05 Stefan Bader linux (Ubuntu Xenial): status In Progress Fix Committed
2018-05-22 00:00:38 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2018-05-22 00:00:38 Launchpad Janitor cve linked 2017-16995
2018-05-22 00:00:38 Launchpad Janitor cve linked 2017-17862
2018-05-22 00:00:38 Launchpad Janitor cve linked 2018-1000004
2018-05-22 00:00:38 Launchpad Janitor cve linked 2018-3639