This bug was fixed in the package linux - 4.12.0-11.12

---------------
linux (4.12.0-11.12) artful; urgency=low

  * linux: 4.12.0-11.12 -proposed tracker (LP: #1709929)

  * CVE-2017-1000111
    - packet: fix tp_reserve race in packet_set_ring

  * CVE-2017-1000112
    - udp: consistently apply ufo or fragmentation

  * Please only recommend or suggest initramfs-tools | linux-initramfs-tool for
    kernels able to boot without initramfs (LP: #1700972)
    - Revert "UBUNTU: [Debian] Don't depend on initramfs-tools"
    - [Debian] Don't depend on initramfs-tools

  * Miscellaneous Ubuntu changes
    - SAUCE: (noup) Update spl to 0.6.5.11-ubuntu1, zfs to 0.6.5.11-1ubuntu3
    - SAUCE: powerpc: Always initialize input array when calling 
epapr_hypercall()

  * Miscellaneous upstream changes
    - selftests: typo correction for memory-hotplug test
    - selftests: check hot-pluggagble memory for memory-hotplug test
    - selftests: check percentage range for memory-hotplug test
    - selftests: add missing test name in memory-hotplug test
    - selftests: fix memory-hotplug test

 -- Seth Forshee <seth.fors...@canonical.com>  Thu, 10 Aug 2017 13:37:00
-0500

** Changed in: linux (Ubuntu)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000111

** CVE added: https://cve.mitre.org/cgi-
bin/cvename.cgi?name=2017-1000112

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696852

Title:
  [SRU][Zesty] arm64: Add support for handling memory corruption

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  Enable memory corruption handling for arm64

  [Test]
  run mce-test mce-test/cases/function/hwpoison

  [Fix]
  [0] https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1376052.html
  [1] https://www.spinics.net/lists/arm-kernel/msg581657.html
  [1] https://lkml.org/lkml/2017/4/7/486
  [2] https://lkml.org/lkml/2017/4/5/402

  Jonathan (Zhixiong) Zhang (2):
    arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling
    arm64: kconfig: allow support for memory failure handling

  Punit Agrawal (2):
    arm64: hugetlb: Fix huge_pte_offset to return poisoned page table
      entries
    arm64: mm: Update perf accounting to handle poison faults

   arch/arm64/Kconfig               |  1 +
   arch/arm64/include/asm/pgtable.h |  2 +-
   arch/arm64/mm/fault.c            | 90 
++++++++++++++++++++++++----------------
   arch/arm64/mm/hugetlbpage.c      | 29 +++++--------
   4 files changed, 67 insertions(+), 55 deletions(-)

  [Regression Potential]
  Changes are confined to ARM64 architecture. Detailed test results are posted 
to this bug as comments.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696852/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to