xenial/linux: 4.4.0-200.232 -proposed tracker
Affects | Status | Importance | Assigned to | Milestone | ||
---|---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | |||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | |||
Kernel-signoff |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-meta |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Prepare-package-signed |
Fix Released
|
Medium
|
Kleber Sacilotto de Souza | |||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-security |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Promote-to-updates |
Fix Released
|
Medium
|
Andy Whitcroft | |||
Regression-testing |
Invalid
|
Medium
|
Canonical Kernel Team | |||
Security-signoff |
Fix Released
|
Medium
|
Canonical Security Team | |||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | |||
linux (Ubuntu) | ||||||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
boot-testing-
bugs-spammed: true
packages:
main: linux
meta: linux-meta
signed: linux-signed
phase: Complete
phase-changed: Thursday, 14. January 2021 22:12 UTC
proposed-
proposed-
reason: {}
synthetic:
:promote-
trackers:
trusty/
xenial/
xenial/
xenial/
xenial/
variant: debs
versions:
main: 4.4.0-200.232
meta: 4.4.0.200.206
signed: 4.4.0-200.232
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2020.11.30-8 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → In Progress |
description: | updated |
tags: | added: kernel-trello-blocked-prepare-packages |
description: | updated |
description: | updated |
summary: |
- xenial/linux: <version to be filled> -proposed tracker + xenial/linux: 4.4.0-200.232 -proposed tracker |
tags: | removed: kernel-trello-blocked-prepare-packages |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-unblock-ppa |
tags: | added: kernel-unblock-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-unblock-proposed |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Verification of the CVE fix completed successfully.