[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2019-07-24 Thread Brad Figg
** Tags added: cscc -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1790620 Title: Xenial update to 4.4.141 stable release Status in linux package in Ubuntu: Invalid Status in linux

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-10-01 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-137.163 --- linux (4.4.0-137.163) xenial; urgency=medium * CVE-2018-14633 - iscsi target: Use hex2bin instead of a re-implementation * CVE-2018-17182 - mm: get rid of vmacache_flush_all() entirely linux (4.4.0-136.162)

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-06 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1790620 Title: Xenial update to 4.4.141 stable release

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-05 Thread Stefan Bader
** Description changed: + SRU Justification - SRU Justification + Impact: +    The upstream process for stable tree updates is quite similar +    in scope to the Ubuntu SRU process, e.g., each patch has to +    demonstrably fix a bug, and each patch is vetted by upstream +  

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-05 Thread Stefan Bader
Dropped "RDMA/ucm: Mark UCM interface as BROKEN" and replaced it by "UBUNTU: SAUCE: RDMA/ucm: Blacklist UCM module". We do not know whether there is some external user of the deprecated interface and just removing the module (ib_ucm) might be considered a regression. ** CVE removed:

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-04 Thread Stefan Bader
Modified: * "x86/cpufeature: Add helper macro for mask check macros" Adjust for NCAPINTS == 19. * "loop: add recursion validation to LOOP_CHANGE_FD" Work around modifications for AUFS. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-04 Thread Stefan Bader
Modified: * "x86/cpufeature: Make sure DISABLED/REQUIRED macros are updated" Adjust for NCAPINTS == 19. Done like upstream but wondering whether this all makes sense (not wrong but somehow duplicated. -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1790620] Re: Xenial update to 4.4.141 stable release

2018-09-04 Thread Stefan Bader
Already applied: * Fix up non-directory creation in SGID directories for bug #1779923 / CVE-2018-13405 * "x86/cpufeature: Cleanup get_cpu_cap()" for CVE-2018-3639. Currently applied version has one additional change for KVM. * "x86/cpufeature: Carve out X86_FEATURE_*" for bug #1397880 *