Cover Letter Detail
Show a cover letter.
GET /api/covers/810546/?format=api
{ "id": 810546, "url": "http://patchwork.ozlabs.org/api/covers/810546/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20170906120208.10561-1-kleber.souza@canonical.com/", "project": { "id": 15, "url": "http://patchwork.ozlabs.org/api/projects/15/?format=api", "name": "Ubuntu Kernel", "link_name": "ubuntu-kernel", "list_id": "kernel-team.lists.ubuntu.com", "list_email": "kernel-team@lists.ubuntu.com", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170906120208.10561-1-kleber.souza@canonical.com>", "list_archive_url": null, "date": "2017-09-06T12:02:07", "name": "[Trusty,SRU,CVE-2016-8632,0/1] Fix for CVE-2016-8632", "submitter": { "id": 71419, "url": "http://patchwork.ozlabs.org/api/people/71419/?format=api", "name": "Kleber Sacilotto de Souza", "email": "kleber.souza@canonical.com" }, "mbox": "http://patchwork.ozlabs.org/project/ubuntu-kernel/cover/20170906120208.10561-1-kleber.souza@canonical.com/mbox/", "series": [ { "id": 1779, "url": "http://patchwork.ozlabs.org/api/series/1779/?format=api", "web_url": "http://patchwork.ozlabs.org/project/ubuntu-kernel/list/?series=1779", "date": "2017-09-06T12:02:07", "name": "Fix for CVE-2016-8632", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/1779/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/810546/comments/", "headers": { "Return-Path": "<kernel-team-bounces@lists.ubuntu.com>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.ubuntu.com\n\t(client-ip=91.189.94.19; helo=huckleberry.canonical.com;\n\tenvelope-from=kernel-team-bounces@lists.ubuntu.com;\n\treceiver=<UNKNOWN>)", "Received": [ "from huckleberry.canonical.com (huckleberry.canonical.com\n\t[91.189.94.19])\n\tby ozlabs.org (Postfix) with ESMTP id 3xnMdz4Tt3z9sBW;\n\tWed, 6 Sep 2017 22:02:31 +1000 (AEST)", "from localhost ([127.0.0.1] helo=huckleberry.canonical.com)\n\tby huckleberry.canonical.com with esmtp (Exim 4.86_2)\n\t(envelope-from <kernel-team-bounces@lists.ubuntu.com>)\n\tid 1dpZ2H-0000px-70; Wed, 06 Sep 2017 12:02:25 +0000", "from youngberry.canonical.com ([91.189.89.112])\n\tby huckleberry.canonical.com with esmtps\n\t(TLS1.0:DHE_RSA_AES_128_CBC_SHA1:128)\n\t(Exim 4.86_2) (envelope-from <kleber.souza@canonical.com>)\n\tid 1dpZ2C-0000lV-B0\n\tfor kernel-team@lists.ubuntu.com; Wed, 06 Sep 2017 12:02:20 +0000", "from mail-wm0-f72.google.com ([74.125.82.72])\n\tby youngberry.canonical.com with esmtps\n\t(TLS1.0:RSA_AES_128_CBC_SHA1:16)\n\t(Exim 4.76) (envelope-from <kleber.souza@canonical.com>)\n\tid 1dpZ2B-0006ap-Ti\n\tfor kernel-team@lists.ubuntu.com; Wed, 06 Sep 2017 12:02:19 +0000", "by mail-wm0-f72.google.com with SMTP id u26so6067268wma.4\n\tfor <kernel-team@lists.ubuntu.com>;\n\tWed, 06 Sep 2017 05:02:19 -0700 (PDT)", "from localhost (pd95c76fe.dip0.t-ipconnect.de. [217.92.118.254])\n\tby smtp.gmail.com with ESMTPSA id\n\tt2sm1946809wre.5.2017.09.06.05.02.16\n\tfor <kernel-team@lists.ubuntu.com>\n\t(version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256);\n\tWed, 06 Sep 2017 05:02:18 -0700 (PDT)" ], "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:subject:date:message-id:mime-version\n\t:content-transfer-encoding;\n\tbh=9aLFnwCVmQLTB41TuKpL5gSB+Y0uxW2hcOK9W1oiNa4=;\n\tb=jDJagQjtFRMQISfc+xpuEK017IJ7Yl13eRwgJhV76Z6gk0lKPrFUtZpYZDs4tUpyvh\n\tnmXrdUVpoE+A1PgEpwTv3sXr/iGX7WTZkefpmK0RfuBY72auFYiffxevMTpgtIi2e8n1\n\ttrJt4jHEL9nbKvsilna2KpKJ0j7ff4B9l4OqJYhosCoL6/AdEjHhycrlP8o/dfxdabSf\n\tcavnqyPmmyYM2yWVx6nP6GcExHxMBdB9xFxVCs6Wj97BgIWVd3NtD2RnKqxe65MPoapt\n\t7Nyi3A5Kslnbdx1KUwEKJduYZu1b7mPMsIBy6h8hsKjEYezcUPNQPMphwR2PRPjrbEMe\n\tR9uQ==", "X-Gm-Message-State": "AHPjjUgDFZWOt6bWp1+NKVzkSnv10ivyczVd3hYsm9bi+s27sFEzgg5a\n\thSOOvFJSenIgzN80RQtaq7BNZwqcgHQ/WjFEojOctQlp7wgYMgf5E6Jx8TORELouEmIBcch3VOO\n\tqAHrHw1cXbC9diBVhen/n+2CSo/7F8Val", "X-Received": [ "by 10.223.184.161 with SMTP id i30mr1480915wrf.147.1504699339289;\n\tWed, 06 Sep 2017 05:02:19 -0700 (PDT)", "by 10.223.184.161 with SMTP id i30mr1480909wrf.147.1504699339035;\n\tWed, 06 Sep 2017 05:02:19 -0700 (PDT)" ], "X-Google-Smtp-Source": "ADKCNb74iM9A6KH8OCNsgUqwletzcbxzYN46rS9A37NlKxRlP8nlFBimEgHg/zCIDyIfrqPF16WvkA==", "From": "Kleber Sacilotto de Souza <kleber.souza@canonical.com>", "To": "kernel-team@lists.ubuntu.com", "Subject": "[Trusty SRU][CVE-2016-8632][PATCH 0/1] Fix for CVE-2016-8632", "Date": "Wed, 6 Sep 2017 14:02:07 +0200", "Message-Id": "<20170906120208.10561-1-kleber.souza@canonical.com>", "X-Mailer": "git-send-email 2.14.1", "MIME-Version": "1.0", "X-BeenThere": "kernel-team@lists.ubuntu.com", "X-Mailman-Version": "2.1.20", "Precedence": "list", "List-Id": "Kernel team discussions <kernel-team.lists.ubuntu.com>", "List-Unsubscribe": "<https://lists.ubuntu.com/mailman/options/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=unsubscribe>", "List-Archive": "<https://lists.ubuntu.com/archives/kernel-team>", "List-Post": "<mailto:kernel-team@lists.ubuntu.com>", "List-Help": "<mailto:kernel-team-request@lists.ubuntu.com?subject=help>", "List-Subscribe": "<https://lists.ubuntu.com/mailman/listinfo/kernel-team>,\n\t<mailto:kernel-team-request@lists.ubuntu.com?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "kernel-team-bounces@lists.ubuntu.com", "Sender": "\"kernel-team\" <kernel-team-bounces@lists.ubuntu.com>" }, "content": "Notes:\n - Only Trusty is missing this fix.\n - The macros MAX_H_SIZE and INT_H_SIZE were duplicated to avoid mutual header\n inclusion (as done by bwh on the backport for 3.16).\n - Trusty doesn't have e4d050cb (tipc: eliminate code duplication in media\n layer), so the bearer changes needed to be duplicated for eth and ib media.\n - UDP media is not supported, so the changes to udp_media.c can be dropped.\n \nTest results:\n\nI created a dummy eth device, loaded the tipc module and used tipc-config to\nconfigure it:\n\n$ sudo tipc-config -netid=1234 -a=1.1.8 -be=eth:dummy0\n\nthen changed the MTU of the dummy interface (min is 100):\n\n$ sudo ifconfig dummy0 mtu 1400\n$ sudo ifconfig dummy0 mtu 99\n\nBefore:\n$ dmesg | tail\n[ 72.021051] tipc: Activated (version 2.0.0)\n[ 72.022581] NET: Registered protocol family 30\n[ 72.023598] tipc: Started in single node mode\n[ 74.852438] tipc: Started in network mode\n[ 74.852451] tipc: Own node address <1.1.8>, network identity 1234\n[ 74.852596] tipc: Enabled bearer <eth:dummy0>, discovery domain <1.1.0>, priority 10\n[ 119.564731] tipc: Blocking bearer <eth:dummy0>\n[ 130.921262] tipc: Blocking bearer <eth:dummy0>\n\nAfter:\n[ 3257.082536] tipc: Activated (version 2.0.0)\n[ 3257.083965] NET: Registered protocol family 30\n[ 3257.084822] tipc: Started in single node mode\n[ 3305.372639] tipc: Started in network mode\n[ 3305.372652] tipc: Own node address <1.1.8>, network identity 1234\n[ 3305.372856] tipc: Enabled bearer <eth:dummy0>, discovery domain <1.1.0>, priority 10\n[ 3337.591294] tipc: Blocking bearer <eth:dummy0>\n[ 3341.842949] dummy0: MTU too low for tipc bearer\n[ 3341.842960] tipc: Disabling bearer <eth:dummy0>\n\nKleber\n\nMichal Kubeček (1):\n tipc: check minimum bearer MTU\n\n net/tipc/bearer.h | 16 ++++++++++++++++\n net/tipc/eth_media.c | 11 +++++++++--\n net/tipc/ib_media.c | 11 +++++++++--\n 3 files changed, 34 insertions(+), 4 deletions(-)" }