[Kernel-packages] [Bug 1697001] Re: Xenial update to 4.4.71 stable release

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1697001 Title: Xenial update to 4.4.71 stable release Status in linux package

[Kernel-packages] [Bug 1697001] Re: Xenial update to 4.4.71 stable release

2017-07-24 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-87.110 --- linux (4.4.0-87.110) xenial; urgency=low * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982) * CVE-2017-1000364 - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack - mm/mmap.c: expand_downwards:

[Kernel-packages] [Bug 1697001] Re: Xenial update to 4.4.71 stable release

2017-06-21 Thread Stefan Bader
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1697001 Title: Xenial update to 4.4.71 stable release Sta

[Kernel-packages] [Bug 1697001] Re: Xenial update to 4.4.71 stable release

2017-06-09 Thread Stefan Bader
The following patches were skipped as they already were applied: * CVE-2017-9242 - pv6: fix out of bound writes in __ip6_append_data() * CVE-2017-9074 - ipv6: Prevent overrun when parsing v6 header options * CVE-2017-9075 - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent * CVE-2017-9076