APPLIED[artful]: [SRU 0/2 A/Z/Y/X/T] Follow up fixes for CVE-2017-1000364
Seth Forshee
seth.forshee at canonical.com
Mon Jul 17 21:27:19 UTC 2017
On Mon, Jul 17, 2017 at 02:53:27PM +0200, Stefan Bader wrote:
> As of today there are two follow-up changes upstream which address
> problems which were introduced by the stack guard area patches.
> The second patch has a backport version for Trusty (which only
> accepts fuzz 2 of the first hunk). Compile tested for Trusty.
>
> There was also a bug report about a i386 build failure (which I
> remembered) which now has been duplicated against a bug report
> that has a linux task that is already marked as fixed released.
> Not sure this is/was correct as there were some crashes fixed
> before but the i386 one was unique in the sense that the jvm
> code was acting that way only for i386.
>
> BugLink: https://bugs.launchpad.net/bugs/1700692 ->
> BugLink: https://bugs.launchpad.net/bugs/1699772
Applied to artful/master-next and unstable/master, thanks.
More information about the kernel-team
mailing list