[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2022-01-19 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868628 Title: Xenial update: 4.4.216 upstream stable release To manage notifications

[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2020-04-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-178.208 --- linux (4.4.0-178.208) xenial; urgency=medium * xenial/linux: 4.4.0-178.208 -proposed tracker (LP: #1870660) * CVE-2019-19768 - blktrace: Protect q->blk_trace with RCU - blktrace: fix dereference after null check

[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2020-04-01 Thread Kelsey Margarete Skunberg
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868628 Title: Xenial update: 4.4.216 upstream stable release To manage notifi

[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2020-03-23 Thread Khaled El Mously
Also, this patch: - mm: make page ref count overflow check tighter and more explicit seems to exist already in the xenial tree: "d4a5d4fe58f1c28 mm: make page ref count overflow check tighter and more explicit" which was part of the fix for CVE-2019-11487 Both the xenial patch and the linux-st

[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2020-03-23 Thread Khaled El Mously
Also skipped: - mm: add 'try_get_page()' helper function -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868628 Title: Xenial update: 4.4.216 upstream stable release To manage notifications about t

[Bug 1868628] Re: Xenial update: 4.4.216 upstream stable release

2020-03-23 Thread Khaled El Mously
Skipped: - include/linux/bitops.h: introduce BITS_PER_TYPE - mm, gup: ensure real head page is ref-counted when using hugepages - mm: prevent get_user_pages() from overflowing page refcount - pipe: add pipe_buf_get() helper - fs: prevent page refcount overflow in pipe_buf_get -- You received