The following patches were skipped because they were already applied for
CVE-2017-15115 :

sctp: do not peel off an assoc from one netns to another one

** Description changed:

+ SRU Justification
  
-     SRU Justification
+     Impact:
+        The upstream process for stable tree updates is quite similar
+        in scope to the Ubuntu SRU process, e.g., each patch has to
+        demonstrably fix a bug, and each patch is vetted by upstream
+        by originating either directly from a mainline/stable Linux tree or
+        a minimally backported form of that patch. The 4.13.16 upstream stable
+        patch set is now available. It should be included in the Ubuntu
+        kernel as well.
  
-     Impact:
-        The upstream process for stable tree updates is quite similar
-        in scope to the Ubuntu SRU process, e.g., each patch has to
-        demonstrably fix a bug, and each patch is vetted by upstream
-        by originating either directly from a mainline/stable Linux tree or
-        a minimally backported form of that patch. The 4.13.16 upstream stable
-        patch set is now available. It should be included in the Ubuntu
-        kernel as well.
+        git://git.kernel.org/
  
-        git://git.kernel.org/
+     TEST CASE: TBD
  
-     TEST CASE: TBD
- 
-        The following patches from the 4.13.16 stable release shall be
- applied:
+        The following patches from the 4.13.16 stable release shall be applied:
+ * tcp_nv: fix division by zero in tcpnv_acked()
+ * net: vrf: correct FRA_L3MDEV encode type
+ * tcp: do not mangle skb->cb[] in tcp_make_synack()
+ * net: systemport: Correct IPG length settings
+ * netfilter/ipvs: clear ipvs_property flag when SKB net namespace changed
+ * l2tp: don't use l2tp_tunnel_find() in l2tp_ip and l2tp_ip6
+ * bonding: discard lowest hash bit for 802.3ad layer3+4
+ * net: cdc_ether: fix divide by 0 on bad descriptors
+ * net: qmi_wwan: fix divide by 0 on bad descriptors
+ * qmi_wwan: Add missing skb_reset_mac_header-call
+ * net: usb: asix: fill null-ptr-deref in asix_suspend
+ * tcp: gso: avoid refcount_t warning from tcp_gso_segment()
+ * tcp: fix tcp_fastretrans_alert warning
+ * vlan: fix a use-after-free in vlan_device_event()
+ * net/mlx5: Cancel health poll before sending panic teardown command
+ * net/mlx5e: Set page to null in case dma mapping fails
+ * af_netlink: ensure that NLMSG_DONE never fails in dumps
+ * vxlan: fix the issue that neigh proxy blocks all icmpv6 packets
+ * net: cdc_ncm: GetNtbFormat endian fix
+ * sctp: do not peel off an assoc from one netns to another one
+ * fealnx: Fix building error on MIPS
+ * net/sctp: Always set scope_id in sctp_inet6_skb_msgname
+ * ima: do not update security.ima if appraisal status is not INTEGRITY_PASS
+ * serial: omap: Fix EFR write on RTS deassertion
+ * serial: 8250_fintek: Fix finding base_port with activated SuperIO
+ * tpm-dev-common: Reject too short writes
+ * rcu: Fix up pending cbs check in rcu_prepare_for_idle
+ * mm/pagewalk.c: report holes in hugetlb ranges
+ * ocfs2: fix cluster hang after a node dies
+ * ocfs2: should wait dio before inode lock in ocfs2_setattr()
+ * ipmi: fix unsigned long underflow
+ * mm/page_alloc.c: broken deferred calculation
+ * mm/page_ext.c: check if page_ext is not prepared
+ * x86/cpu/amd: Derive L3 shared_cpu_map from cpu_llc_shared_mask
+ * coda: fix 'kernel memory exposure attempt' in fsync
+ * Linux 4.13.16

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15115

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1744213

Title:
  Artful update to 4.13.16 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1744213/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to