This bug was fixed in the package linux - 4.11.0-13.19
---
linux (4.11.0-13.19) artful; urgency=low
* CVE-2017-7533
- dentry name snapshots
linux (4.11.0-12.18) artful; urgency=low
* linux: 4.11.0-12.18 -proposed tracker (LP: #1707635)
- no change rebuild to pick up the
This bug was fixed in the package linux - 4.10.0-30.34
---
linux (4.10.0-30.34) zesty; urgency=low
* CVE-2017-7533
- dentry name snapshots
linux (4.10.0-29.33) zesty; urgency=low
* linux: 4.10.0-29.33 -proposed tracker (LP: #1704961)
* Opal and POWER9 DD2 (LP: #1702159)
** Tags removed: verification-needed-zesty
** Tags added: verification-done-zesty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1702749
Title:
arm64: fix crash reading /proc/kcore
To manage
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag
Preemptive verification:
root@d05-3:~# cat /proc/version
Linux version 4.10.0-29-generic (buildd@bos01-arm64-012) (gcc version 6.3.0
20170406 (Ubuntu/Linaro 6.3.0-12ubuntu2) ) #33-Ubuntu SMP Wed Jul 19 13:37:12
UTC 2017
root@d05-3:~# cat /proc/kcore > /dev/null&
[1] 9206
root@d05-3:~#
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1702749
Title:
arm64: fix crash reading /proc/kcore
To manage
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1702749
Title:
arm64: fix crash reading /proc/kcore
To manage notifications
** Description changed:
[Impact]
Reading /proc/kcore can lead to a crash on arm64 systems.
+ This was found to cause crashes when, e.g. annotating symbols in a perf top
session.
[Test Case]
# cat /proc/kcore > /dev/null
[Regression Risk]
+ 2 upstream patches need to be