[Kernel-packages] [Bug 1711535] Re: Xenial update to 4.4.82 stable release
This bug was fixed in the package linux - 4.4.0-96.119 --- linux (4.4.0-96.119) xenial; urgency=low * linux: 4.4.0-96.119 -proposed tracker (LP: #1716613) * kernel panic -not syncing: Fatal exception: panic_on_oops (LP: #1708399) - s390/mm: no local TLB flush for clearing-by-ASCE IDTE - SAUCE: s390/mm: fix local TLB flushing vs. detach of an mm address space - SAUCE: s390/mm: fix race on mm->context.flush_mm * CVE-2017-1000251 - Bluetooth: Properly check L2CAP config option output buffer length linux (4.4.0-95.118) xenial; urgency=low * linux: 4.4.0-95.118 -proposed tracker (LP: #1715651) * Xenial update to 4.4.78 stable release broke Address Sanitizer (LP: #1715636) - mm: revert x86_64 and arm64 ELF_ET_DYN_BASE base changes linux (4.4.0-94.117) xenial; urgency=low * linux: 4.4.0-94.117 -proposed tracker (LP: #1713462) * mwifiex causes kernel oops when AP mode is enabled (LP: #1712746) - SAUCE: net/wireless: do not dereference invalid pointer - SAUCE: mwifiex: do not dereference invalid pointer * Backport more recent Broadcom bnxt_en driver (LP: #1711056) - SAUCE: bnxt_en_bpo: Import bnxt_en driver version 1.8.1 - SAUCE: bnxt_en_bpo: Drop distro out-of-tree detection logic - SAUCE: bnxt_en_bpo: Remove unnecessary compile flags - SAUCE: bnxt_en_bpo: Move config settings to Kconfig - SAUCE: bnxt_en_bpo: Remove PCI_IDs handled by the regular driver - SAUCE: bnxt_en_bpo: Rename the backport driver to bnxt_en_bpo - bnxt_en_bpo: [Config] Enable CONFIG_BNXT_BPO=m * HID: multitouch: Support ALPS PTP Stick and Touchpad devices (LP: #1712481) - HID: multitouch: Support PTP Stick and Touchpad device - SAUCE: HID: multitouch: Support ALPS PTP stick with pid 0x120A * igb: Support using Broadcom 54616 as PHY (LP: #1712024) - SAUCE: igb: add support for using Broadcom 54616 as PHY * IPR driver causes multipath to fail paths/stuck IO on Medium Errors (LP: #1682644) - scsi: ipr: do not set DID_PASSTHROUGH on CHECK CONDITION * accessing /dev/hvc1 with stress-ng on Ubuntu xenial causes crash (LP: #1711401) - tty/hvc: Use IRQF_SHARED for OPAL hvc consoles * memory-hotplug test needs to be fixed (LP: #1710868) - selftests: typo correction for memory-hotplug test - selftests: check hot-pluggagble memory for memory-hotplug test - selftests: check percentage range for memory-hotplug test - selftests: add missing test name in memory-hotplug test - selftests: fix memory-hotplug test * HP lt4132 LTE/HSPA+ 4G Module (03f0:a31d) does not work (LP: #1707643) - net: cdc_mbim: apply "NDP to end" quirk to HP lt4132 * Migrating KSM page causes the VM lock up as the KSM page merging list is too large (LP: #1680513) - ksm: introduce ksm_max_page_sharing per page deduplication limit - ksm: fix use after free with merge_across_nodes = 0 - ksm: cleanup stable_node chain collapse case - ksm: swap the two output parameters of chain/chain_prune - ksm: optimize refile of stable_node_dup at the head of the chain * sort ABI files with C.UTF-8 locale (LP: #1712345) - [Packaging] sort ABI files with C.UTF-8 locale * Include Broadcom GPL modules in Xenial Kernel (LP: #1665783) - [Config] OpenNSL Kconfig/Makefile - Import OpenNSL v3.1.0.17 - [Config] CONFIG_OPENNSL=y for amd64 - OpenNSL: Enable Kconfig and build - SAUCE: opennsl: add proper CFLAGS * Xenial update to 4.4.83 stable release (LP: #1711557) - cpuset: fix a deadlock due to incomplete patching of cpusets_enabled() - mm: ratelimit PFNs busy info message - iscsi-target: fix memory leak in iscsit_setup_text_cmd() - iscsi-target: Fix iscsi_np reset hung task during parallel delete - fuse: initialize the flock flag in fuse_file on allocation - nfs/flexfiles: fix leak of nfs4_ff_ds_version arrays - USB: serial: option: add D-Link DWM-222 device ID - USB: serial: cp210x: add support for Qivicon USB ZigBee dongle - USB: serial: pl2303: add new ATEN device id - usb: musb: fix tx fifo flush handling again - USB: hcd: Mark secondary HCD as dead if the primary one died - staging:iio:resolver:ad2s1210 fix negative IIO_ANGL_VEL read - iio: accel: bmc150: Always restore device to normal mode after suspend- resume - iio: light: tsl2563: use correct event code - uas: Add US_FL_IGNORE_RESIDUE for Initio Corporation INIC-3069 - USB: Check for dropped connection before switching to full speed - usb: core: unlink urbs from the tail of the endpoint's urb_list - usb: quirks: Add no-lpm quirk for Moshi USB to Ethernet Adapter - usb:xhci:Add quirk for Certain failing HP keyboard on reset after resume - iio: adc: vf610_adc: Fix VALT selection value for REFSEL bits - pnfs/blocklayout: require 64-bit sector_t - pinctrl: sunxi: add a missing function of A10/A20 pinctrl driver - pinctrl: samsung: Remove
[Kernel-packages] [Bug 1711535] Re: Xenial update to 4.4.82 stable release
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1711535 Title: Xenial update to 4.4.82 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.82 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.82 stable release shall be applied: * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states * net: fix keepalive code vs TCP_FASTOPEN_CONNECT * bpf, s390: fix jit branch offset related to ldimm64 * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target * tcp: fastopen: tcp_connect() must refresh the route * net: avoid skb_warn_bad_offload false positives on UFO * sparc64: Prevent perf from running during super critical sections * KVM: arm/arm64: Handle hva aging while destroying the vm * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free * Linux 4.4.82 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711535/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1711535] Re: Xenial update to 4.4.82 stable release
** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Stefan Bader (smb) ** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1711535 Title: Xenial update to 4.4.82 stable release Status in linux package in Ubuntu: Invalid Status in linux source package in Xenial: In Progress Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.82 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.82 stable release shall be applied: * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states * net: fix keepalive code vs TCP_FASTOPEN_CONNECT * bpf, s390: fix jit branch offset related to ldimm64 * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target * tcp: fastopen: tcp_connect() must refresh the route * net: avoid skb_warn_bad_offload false positives on UFO * sparc64: Prevent perf from running during super critical sections * KVM: arm/arm64: Handle hva aging while destroying the vm * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free * Linux 4.4.82 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711535/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp
[Kernel-packages] [Bug 1711535] Re: Xenial update to 4.4.82 stable release
Patch "packet: fix tp_reserve race in packet_set_ring" was skipped because it is already applied for CVE-2017-1000111. Skipped a whole bunch of changes, namely: * revert "net: account for current skb length when deciding about UFO" * revert "ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output" * udp: consistently apply ufo or fragmentation * ipv4: Should use consistent conditional judgement for ip fragment in __ip_append_data and ip_finish_output * net: account for current skb length when deciding about UFO I checked the resulting files net/ipv4/udp.c, net/ipv4/ip_output.c, and net/ipv6/ip6_output.c from the 4.4.y tree and our Xenial tree. And overall there is only one difference in the ip*_ouput.c files which come from applying "udp: avoid ufo handling on IP payload compression packets" and "ipv6: Don't use ufo handling on later transformed packets" which I picked as additional patches to be part of CVE-2017-1000112. And those still look like fixes to valid issues (though probably not directly related to the CVE). So I would suggest we stay at what we got right now. ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.4.82 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: -The upstream process for stable tree updates is quite similar -in scope to the Ubuntu SRU process, e.g., each patch has to -demonstrably fix a bug, and each patch is vetted by upstream -by originating either directly from a mainline/stable Linux tree or -a minimally backported form of that patch. The 4.4.82 upstream stable -patch set is now available. It should be included in the Ubuntu -kernel as well. + git://git.kernel.org/ -git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - -The following patches from the 4.4.82 stable release shall be - applied: + The following patches from the 4.4.82 stable release shall be applied: + * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states + * net: fix keepalive code vs TCP_FASTOPEN_CONNECT + * bpf, s390: fix jit branch offset related to ldimm64 + * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target + * tcp: fastopen: tcp_connect() must refresh the route + * net: avoid skb_warn_bad_offload false positives on UFO + * sparc64: Prevent perf from running during super critical sections + * KVM: arm/arm64: Handle hva aging while destroying the vm + * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free + * Linux 4.4.82 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000111 ** CVE added: https://cve.mitre.org/cgi- bin/cvename.cgi?name=2017-1000112 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1711535 Title: Xenial update to 4.4.82 stable release Status in linux package in Ubuntu: New Status in linux source package in Xenial: New Bug description: SRU Justification Impact: The upstream process for stable tree updates is quite similar in scope to the Ubuntu SRU process, e.g., each patch has to demonstrably fix a bug, and each patch is vetted by upstream by originating either directly from a mainline/stable Linux tree or a minimally backported form of that patch. The 4.4.82 upstream stable patch set is now available. It should be included in the Ubuntu kernel as well. git://git.kernel.org/ TEST CASE: TBD The following patches from the 4.4.82 stable release shall be applied: * tcp: avoid setting cwnd to invalid ssthresh after cwnd reduction states * net: fix keepalive code vs TCP_FASTOPEN_CONNECT * bpf, s390: fix jit branch offset related to ldimm64 * net: sched: set xt_tgchk_param par.nft_compat as 0 in ipt_init_target * tcp: fastopen: tcp_connect() must refresh the route * net: avoid skb_warn_bad_offload false positives on UFO * sparc64: Prevent perf from running during super critical sections * KVM: arm/arm64: Handle hva aging while destroying the vm * mm/mempool: avoid KASAN marking mempool poison checks as use-after-free * Linux 4.4.82 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1711535/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://la