** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868628
Title:
Xenial update: 4.4.216 upstream stable release
To manage notifications
This bug was fixed in the package linux - 4.4.0-178.208
---
linux (4.4.0-178.208) xenial; urgency=medium
* xenial/linux: 4.4.0-178.208 -proposed tracker (LP: #1870660)
* CVE-2019-19768
- blktrace: Protect q->blk_trace with RCU
- blktrace: fix dereference after null check
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868628
Title:
Xenial update: 4.4.216 upstream stable release
To manage notifi
Also, this patch:
- mm: make page ref count overflow check tighter and more explicit
seems to exist already in the xenial tree:
"d4a5d4fe58f1c28 mm: make page ref count overflow check tighter and more
explicit"
which was part of the fix for CVE-2019-11487
Both the xenial patch and the linux-st
Also skipped:
- mm: add 'try_get_page()' helper function
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1868628
Title:
Xenial update: 4.4.216 upstream stable release
To manage notifications about t
Skipped:
- include/linux/bitops.h: introduce BITS_PER_TYPE
- mm, gup: ensure real head page is ref-counted when using hugepages
- mm: prevent get_user_pages() from overflowing page refcount
- pipe: add pipe_buf_get() helper
- fs: prevent page refcount overflow in pipe_buf_get
--
You received