Activity log for bug #1790884

Date Who What changed Old value New value Message
2018-09-05 14:27:58 Stefan Bader bug added bug
2018-09-05 14:28:00 Stefan Bader tags kernel-stable-tracking-bug
2018-09-05 14:28:00 Stefan Bader bug added subscriber SRU Verification
2018-09-05 14:28:03 Stefan Bader bug added subscriber Ubuntu Stable Release Updates Team
2018-09-05 14:28:19 Stefan Bader nominated for series Ubuntu Xenial
2018-09-05 14:28:19 Stefan Bader bug task added linux (Ubuntu Xenial)
2018-09-05 14:28:31 Stefan Bader linux (Ubuntu Xenial): importance Undecided Medium
2018-09-05 14:28:31 Stefan Bader linux (Ubuntu Xenial): status New In Progress
2018-09-05 14:28:31 Stefan Bader linux (Ubuntu Xenial): assignee Stefan Bader (smb)
2018-09-05 14:28:39 Stefan Bader linux (Ubuntu): status New Invalid
2018-09-06 09:24:43 Stefan Bader description SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.143 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.143 stable release shall be applied: SRU Justification     Impact:        The upstream process for stable tree updates is quite similar        in scope to the Ubuntu SRU process, e.g., each patch has to        demonstrably fix a bug, and each patch is vetted by upstream        by originating either directly from a mainline/stable Linux tree or        a minimally backported form of that patch. The 4.4.143 upstream stable        patch set is now available. It should be included in the Ubuntu        kernel as well.        git://git.kernel.org/     TEST CASE: TBD The following patches from the 4.4.143 stable release shall be applied: * compiler, clang: suppress warning for unused static inline functions * compiler, clang: properly override 'inline' for clang * compiler, clang: always inline when CONFIG_OPTIMIZE_INLINING is disabled * compiler-gcc.h: Add __attribute__((gnu_inline)) to all inline declarations * x86/asm: Add _ASM_ARG* constants for argument registers to <asm/asm.h> * ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent * bcm63xx_enet: correct clock usage * bcm63xx_enet: do not write to random DMA channel on BCM6345 * crypto: crypto4xx - remove bad list_del * crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak * atm: zatm: Fix potential Spectre v1 * net: dccp: avoid crash in ccid3_hc_rx_send_feedback() * net: dccp: switch rx_tstamp_last_feedback to monotonic clock * net/mlx5: Fix incorrect raw command length parsing * net: sungem: fix rx checksum support * qed: Limit msix vectors in kdump kernel to the minimum required count. * r8152: napi hangup fix after disconnect * tcp: fix Fast Open key endianness * tcp: prevent bogus FRTO undos with non-SACK flows * vhost_net: validate sock before trying to put its fd * net_sched: blackhole: tell upper qdisc about dropped packets * net/mlx5: Fix command interface race in polling mode * net: cxgb3_main: fix potential Spectre v1 * rtlwifi: rtl8821ae: fix firmware is not ready to run * MIPS: Call dump_stack() from show_regs() * MIPS: Use async IPIs for arch_trigger_cpumask_backtrace() * netfilter: ebtables: reject non-bridge targets * KEYS: DNS: fix parsing multiple options * rds: avoid unenecessary cong_update in loop transport * net/nfc: Avoid stalls when nfc_alloc_send_skb() returned NULL. * Linux 4.4.143
2018-09-06 12:28:01 Kleber Sacilotto de Souza linux (Ubuntu Xenial): status In Progress Fix Committed
2018-10-01 16:02:04 Launchpad Janitor linux (Ubuntu Xenial): status Fix Committed Fix Released
2018-10-01 16:02:04 Launchpad Janitor cve linked 2017-5715
2018-10-01 16:02:04 Launchpad Janitor cve linked 2017-5753
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-14633
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-15572
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-15594
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-17182
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-3620
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-3646
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-6554
2018-10-01 16:02:04 Launchpad Janitor cve linked 2018-6555