Activity log for bug #1745263

Date Who What changed Old value New value Message
2018-01-25 00:57:34 Khaled El Mously bug added bug
2018-01-25 00:57:35 Khaled El Mously tags kernel-stable-tracking-bug
2018-01-25 00:57:36 Khaled El Mously bug added subscriber SRU Verification
2018-01-25 00:57:37 Khaled El Mously bug added subscriber Ubuntu Stable Release Updates Team
2018-01-25 01:01:09 Khaled El Mously description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.111 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.111 stable release shall be applied: SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The 4.4.111 upstream stable        patch set is now available. It should be included in the Ubuntu        kernel as well.        git://git.kernel.org/     TEST CASE: TBD        The following patches from the 4.4.111 stable release shall be applied: * x86/kasan: Write protect kasan zero shadow * kernel/acct.c: fix the acct->needcheck check in check_free_space() * crypto: n2 - cure use after free * crypto: chacha20poly1305 - validate the digest size * crypto: pcrypt - fix freeing pcrypt instances * sunxi-rsb: Include OF based modalias in device uevent * fscache: Fix the default for fscache_maybe_release_page() * kernel: make groups_sort calling a responsibility group_info allocators * kernel/signal.c: protect the traced SIGNAL_UNKILLABLE tasks from SIGKILL * kernel/signal.c: protect the SIGNAL_UNKILLABLE tasks from !sig_kernel_only() signals * kernel/signal.c: remove the no longer needed SIGNAL_UNKILLABLE check in complete_signal() * ARC: uaccess: dont use "l" gcc inline asm constraint modifier * Input: elantech - add new icbody type 15 * x86/microcode/AMD: Add support for fam17h microcode loading * parisc: Fix alignment of pa_tlb_lock in assembly on 32-bit SMP kernel * x86/tlb: Drop the _GPL from the cpu_tlbstate export * genksyms: Handle string literals with spaces in reference files * module: keep percpu symbols in module's symtab * module: Issue warnings when tainting kernel * proc: much faster /proc/vmstat * Map the vsyscall page with _PAGE_USER * Fix build error in vma.c * Linux 4.4.111
2018-02-28 13:27:16 Stefan Bader nominated for series Ubuntu Xenial
2018-02-28 13:27:16 Stefan Bader bug task added linux (Ubuntu Xenial)
2018-02-28 13:27:26 Stefan Bader linux (Ubuntu): status New Invalid
2018-02-28 13:27:32 Stefan Bader linux (Ubuntu Xenial): importance Undecided Medium
2018-02-28 14:25:44 Stefan Bader linux (Ubuntu Xenial): status New Fix Committed
2018-04-04 09:27:25 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-15129
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-16995
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-17448
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-17450
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-17741
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-17862
2018-04-04 09:27:25 Launchpad Janitor cve linked 2017-5753
2018-04-04 09:27:25 Launchpad Janitor cve linked 2018-1000026
2018-04-04 09:27:25 Launchpad Janitor cve linked 2018-5333
2018-04-04 09:27:25 Launchpad Janitor cve linked 2018-5344
2018-04-04 09:27:25 Launchpad Janitor cve linked 2018-8043