The following patches were skipped because they were already applied for CVE-2017-15115 :
sctp: do not peel off an assoc from one netns to another one ** Description changed: + SRU Justification - SRU Justification + Impact: + The upstream process for stable tree updates is quite similar + in scope to the Ubuntu SRU process, e.g., each patch has to + demonstrably fix a bug, and each patch is vetted by upstream + by originating either directly from a mainline/stable Linux tree or + a minimally backported form of that patch. The 4.13.16 upstream stable + patch set is now available. It should be included in the Ubuntu + kernel as well. - Impact: - The upstream process for stable tree updates is quite similar - in scope to the Ubuntu SRU process, e.g., each patch has to - demonstrably fix a bug, and each patch is vetted by upstream - by originating either directly from a mainline/stable Linux tree or - a minimally backported form of that patch. The 4.13.16 upstream stable - patch set is now available. It should be included in the Ubuntu - kernel as well. + git://git.kernel.org/ - git://git.kernel.org/ + TEST CASE: TBD - TEST CASE: TBD - - The following patches from the 4.13.16 stable release shall be - applied: + The following patches from the 4.13.16 stable release shall be applied: + * tcp_nv: fix division by zero in tcpnv_acked() + * net: vrf: correct FRA_L3MDEV encode type + * tcp: do not mangle skb->cb[] in tcp_make_synack() + * net: systemport: Correct IPG length settings + * netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed + * l2tp: don't use l2tp_tunnel_find() in l2tp_ip and l2tp_ip6 + * bonding: discard lowest hash bit for 802.3ad layer3+4 + * net: cdc_ether: fix divide by 0 on bad descriptors + * net: qmi_wwan: fix divide by 0 on bad descriptors + * qmi_wwan: Add missing skb_reset_mac_header-call + * net: usb: asix: fill null-ptr-deref in asix_suspend + * tcp: gso: avoid refcount_t warning from tcp_gso_segment() + * tcp: fix tcp_fastretrans_alert warning + * vlan: fix a use-after-free in vlan_device_event() + * net/mlx5: Cancel health poll before sending panic teardown command + * net/mlx5e: Set page to null in case dma mapping fails + * af_netlink: ensure that NLMSG_DONE never fails in dumps + * vxlan: fix the issue that neigh proxy blocks all icmpv6 packets + * net: cdc_ncm: GetNtbFormat endian fix + * sctp: do not peel off an assoc from one netns to another one + * fealnx: Fix building error on MIPS + * net/sctp: Always set scope_id in sctp_inet6_skb_msgname + * ima: do not update security.ima if appraisal status is not INTEGRITY_PASS + * serial: omap: Fix EFR write on RTS deassertion + * serial: 8250_fintek: Fix finding base_port with activated SuperIO + * tpm-dev-common: Reject too short writes + * rcu: Fix up pending cbs check in rcu_prepare_for_idle + * mm/pagewalk.c: report holes in hugetlb ranges + * ocfs2: fix cluster hang after a node dies + * ocfs2: should wait dio before inode lock in ocfs2_setattr() + * ipmi: fix unsigned long underflow + * mm/page_alloc.c: broken deferred calculation + * mm/page_ext.c: check if page_ext is not prepared + * x86/cpu/amd: Derive L3 shared_cpu_map from cpu_llc_shared_mask + * coda: fix 'kernel memory exposure attempt' in fsync + * Linux 4.13.16 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15115 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744213 Title: Artful update to 4.13.16 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1744213/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
