[SRU 0/2 A/Z/Y/X/T] Follow up fixes for CVE-2017-1000364

Stefan Bader stefan.bader at canonical.com
Mon Jul 17 12:53:27 UTC 2017


As of today there are two follow-up changes upstream which address
problems which were introduced by the stack guard area patches.
The second patch has a backport version for Trusty (which only
accepts fuzz 2 of the first hunk). Compile tested for Trusty.

There was also a bug report about a i386 build failure (which I
remembered) which now has been duplicated against a bug report
that has a linux task that is already marked as fixed released.
Not sure this is/was correct as there were some crashes fixed
before but the i386 one was unique in the sense that the jvm
code was acting that way only for i386.

BugLink: https://bugs.launchpad.net/bugs/1700692 ->
BugLink: https://bugs.launchpad.net/bugs/1699772

-Stefan




More information about the kernel-team mailing list