Activity log for bug #1688505

Date Who What changed Old value New value Message
2017-05-05 09:42:06 Stefan Bader bug added bug
2017-05-05 09:42:07 Stefan Bader tags kernel-stable-tracking-bug
2017-05-05 09:42:08 Stefan Bader bug added subscriber SRU Verification
2017-05-05 09:42:09 Stefan Bader bug added subscriber Ubuntu Stable Release Updates Team
2017-05-05 09:42:12 Stefan Bader nominated for series Ubuntu Xenial
2017-05-05 09:42:13 Stefan Bader bug task added linux (Ubuntu Xenial)
2017-05-05 09:43:06 Stefan Bader linux (Ubuntu Xenial): importance Undecided Medium
2017-05-05 09:43:06 Stefan Bader linux (Ubuntu Xenial): status New In Progress
2017-05-05 09:43:06 Stefan Bader linux (Ubuntu Xenial): assignee Stefan Bader (smb)
2017-05-05 09:46:20 Stefan Bader cve linked 2017-7308
2017-05-05 09:57:31 Stefan Bader description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.66 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.66 stable release shall be applied: SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The 4.4.66 upstream stable        patch set is now available. It should be included in the Ubuntu        kernel as well.        git://git.kernel.org/     TEST CASE: TBD The following patches from the 4.4.66 stable release shall be applied: * f2fs: do more integrity verification for superblock * xc2028: unlock on error in xc2028_set_config() * ARM: OMAP2+: timer: add probe for clocksources * clk: sunxi: Add apb0 gates for H3 * crypto: testmgr - fix out of bound read in __test_aead() * drm/amdgpu: fix array out of bounds * ext4: check if in-inode xattr is corrupted in ext4_expand_extra_isize_ea() * md:raid1: fix a dead loop when read from a WriteMostly disk * MIPS: Fix crash registers on non-crashing CPUs * net: cavium: liquidio: Avoid dma_unmap_single on uninitialized ndata * net_sched: close another race condition in tcf_mirred_release() * RDS: Fix the atomicity for congestion map update * regulator: core: Clear the supply pointer if enabling fails * usb: gadget: f_midi: Fixed a bug when buflen was smaller than wMaxPacketSize * xen/x86: don't lose event interrupts * sparc64: kern_addr_valid regression * sparc64: Fix kernel panic due to erroneous #ifdef surrounding pmd_write() * net: neigh: guard against NULL solicit() method * net: phy: handle state correctly in phy_stop_machine * l2tp: purge socket queues in the .destruct() callback * l2tp: take reference on sessions being dumped * l2tp: fix PPP pseudo-wire auto-loading * net: ipv4: fix multipath RTM_GETROUTE behavior when iif is given * sctp: listen on the sock only when it's state is listening or closed * tcp: clear saved_syn in tcp_disconnect() * dp83640: don't recieve time stamps twice * net: ipv6: RTF_PCPU should not be settable from userspace * netpoll: Check for skb->queue_mapping * ip6mr: fix notification device destruction * macvlan: Fix device ref leak when purging bc_queue * ipv6: check skb->protocol before lookup for nexthop * ipv6: check raw payload size correctly in ioctl * ALSA: firewire-lib: fix inappropriate assignment between signed/unsigned type * ALSA: seq: Don't break snd_use_lock_sync() loop by timeout * MIPS: KGDB: Use kernel context for sleeping threads * MIPS: Avoid BUG warning in arch_check_elf * p9_client_readdir() fix * Input: i8042 - add Clevo P650RS to the i8042 reset list * nfsd: check for oversized NFSv2/v3 arguments * ARCv2: save r30 on kernel entry as gcc uses it for code-gen * ftrace/x86: Fix triple fault with graph tracing and suspend-to-ram * Linux 4.4.66
2017-05-05 17:56:12 Thadeu Lima de Souza Cascardo linux (Ubuntu Xenial): status In Progress Fix Committed
2017-06-06 14:51:25 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2017-06-06 14:51:25 Launchpad Janitor cve linked 2017-0605
2019-10-03 08:30:41 Po-Hsu Lin linux (Ubuntu): status New Invalid