APPLIED[artful]: [SRU 0/2 A/Z/Y/X/T] Follow up fixes for CVE-2017-1000364

Seth Forshee seth.forshee at canonical.com
Mon Jul 17 21:27:19 UTC 2017


On Mon, Jul 17, 2017 at 02:53:27PM +0200, Stefan Bader wrote:
> As of today there are two follow-up changes upstream which address
> problems which were introduced by the stack guard area patches.
> The second patch has a backport version for Trusty (which only
> accepts fuzz 2 of the first hunk). Compile tested for Trusty.
> 
> There was also a bug report about a i386 build failure (which I
> remembered) which now has been duplicated against a bug report
> that has a linux task that is already marked as fixed released.
> Not sure this is/was correct as there were some crashes fixed
> before but the i386 one was unique in the sense that the jvm
> code was acting that way only for i386.
> 
> BugLink: https://bugs.launchpad.net/bugs/1700692 ->
> BugLink: https://bugs.launchpad.net/bugs/1699772

Applied to artful/master-next and unstable/master, thanks.




More information about the kernel-team mailing list