------- Comment From gpicc...@br.ibm.com 2016-12-08 10:46 EDT------- (In reply to comment #55) > The patch 'tg3: Avoid NULL pointer dereference in tg3_io_error_detected()' > was packaged in Ubuntu-4.4.0-54.75. However, due to 2 emergency CVE releases > the SRU cycle has been delayed. Ubuntu-4.4.0-55.76 should complete SRU > testing within a couple of weeks.
Perfect, thank you! ------- Comment From gpicc...@br.ibm.com 2017-01-12 06:18 EDT------- Patch included on 4.4.0-59 . Marked as verified and closed the bug. Thanks Canonical! Cheers, Guilherme ** Tags added: verification-done-xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1633193 Title: Oops on EEH hit during tg3 probe Status in linux package in Ubuntu: Fix Released Status in linux source package in Xenial: In Progress Status in linux source package in Yakkety: Fix Released Bug description: -- Problem Description -- We observed that when EEH error is hit during tg3 driver probe, we might trigger a kernel oops due to a memory access to an uninitialized pointer. The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid NULL pointer dereference in tg3_io_error_detected()") https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a We want to request Canonical to add this patch to Ubuntu 16.04 kernel if possible. Thanks in advance, Guilherme To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp