Activity log for bug #1768474

Date Who What changed Old value New value Message
2018-05-02 09:27:08 Juerg Haefliger bug added bug
2018-05-02 09:27:11 Juerg Haefliger bug added subscriber SRU Verification
2018-05-02 09:27:15 Juerg Haefliger bug added subscriber Ubuntu Stable Release Updates Team
2018-05-02 09:27:22 Juerg Haefliger nominated for series Ubuntu Xenial
2018-05-02 09:27:35 Juerg Haefliger linux (Ubuntu): status New Invalid
2018-05-02 14:46:00 Juerg Haefliger description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.130 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.130 stable release shall be applied: <to-be-filled-in> SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.130 upstream stable stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.130 stable release shall be applied: * Linux 4.4.130 * s390/uprobes: implement arch_uretprobe_is_alive() * s390/cio: update chpid descriptor after resource accessibility event * cdrom: information leak in cdrom_ioctl_media_changed() * scsi: mptsas: Disable WRITE SAME * ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy * net: af_packet: fix race in PACKET_{R|T}X_RING * tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established sockets * net: fix deadlock while clearing neighbor proxy table * tipc: add policy for TIPC_NLA_NET_ADDR * llc: fix NULL pointer deref for SOCK_ZAPPED * llc: hold llc_sap before release_sock() * sctp: do not check port in sctp_inet6_cmp_addr * vlan: Fix reading memory beyond skb->tail in skb_vlan_tagged_multi * pppoe: check sockaddr length in pppoe_connect() * packet: fix bitfield update race * team: fix netconsole setup over team * team: avoid adding twice the same option to the event list * tcp: don't read out-of-bounds opsize * llc: delete timers synchronously in llc_sk_free() * net: validate attribute sizes in neigh_dump_table() * l2tp: check sockaddr length in pppol2tp_connect() * KEYS: DNS: limit the length of option strings * bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave * s390: correct module section names for expoline code revert * s390: correct nospec auto detection init order * s390: add sysfs attributes for spectre * s390: report spectre mitigation via syslog * s390: add automatic detection of the spectre defense * s390: move nobp parameter functions to nospec-branch.c * s390/entry.S: fix spurious zeroing of r0 * s390: do not bypass BPENTER for interrupt system calls * s390: Replace IS_ENABLED(EXPOLINE_*) with IS_ENABLED(CONFIG_EXPOLINE_*) * s390: introduce execute-trampolines for branches * s390: run user space and KVM guests with modified branch prediction * s390: add options to change branch prediction behaviour for the kernel * s390/alternative: use a copy of the facility bit mask * s390: add optimized array_index_mask_nospec * s390: scrub registers on kernel entry and KVM exit * KVM: s390: wire up bpb feature * s390: enable CPU alternatives unconditionally * s390: introduce CPU alternatives * Revert "ath10k: send (re)assoc peer command when NSS changed" * jbd2: fix use after free in kjournald2() * ath9k_hw: check if the chip failed to wake up * Input: drv260x - fix initializing overdrive voltage * r8152: add Linksys USB3GIGV1 id * staging: ion : Donnot wakeup kswapd in ion system alloc * perf: Return proper values for user stack errors * x86/tsc: Prevent 32bit truncation in calc_hpet_ref() * cifs: do not allow creating sockets except with SMB1 posix exensions
2018-05-15 14:22:06 Kleber Sacilotto de Souza bug task added linux (Ubuntu Xenial)
2018-05-15 14:22:12 Kleber Sacilotto de Souza linux (Ubuntu Xenial): status New Fix Committed
2018-06-11 15:09:13 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2018-06-11 15:09:13 Launchpad Janitor cve linked 2017-5715
2018-06-11 15:09:13 Launchpad Janitor cve linked 2017-5753
2018-06-11 15:09:13 Launchpad Janitor cve linked 2018-3639
2018-06-11 15:09:13 Launchpad Janitor cve linked 2018-8087