------- Comment From gpicc...@br.ibm.com 2016-12-08 10:46 EDT-------
(In reply to comment #55)
> The patch 'tg3: Avoid NULL pointer dereference in tg3_io_error_detected()'
> was packaged in Ubuntu-4.4.0-54.75. However, due to 2 emergency CVE releases
> the SRU cycle has been delayed. Ubuntu-4.4.0-55.76 should complete SRU
> testing within a couple of weeks.

Perfect, thank you!

------- Comment From gpicc...@br.ibm.com 2017-01-12 06:18 EDT-------
Patch included on 4.4.0-59 .
Marked as verified and closed the bug. Thanks Canonical!

Cheers,

Guilherme

** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1633193

Title:
  Oops on EEH hit during tg3 probe

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  -- Problem Description --
  We observed that when EEH error is hit during tg3 driver probe, we might 
trigger a kernel oops due to a memory access to an uninitialized pointer.

  The following upstream patch addresses the issue: 1b0ff89852 ("tg3: Avoid 
NULL pointer dereference in tg3_io_error_detected()")
  
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1b0ff89852d79354e8a091c81a88df21f5aa9f0a

  
  We want to request Canonical to add this patch to Ubuntu 16.04 kernel if 
possible.
  Thanks in advance,

  Guilherme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1633193/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to