This bug was fixed in the package linux-aws - 4.4.0-1126.140
--------------- linux-aws (4.4.0-1126.140) xenial; urgency=medium
* xenial/linux-aws: 4.4.0-1126.140 -proposed tracker (LP: #1922058)
[ Ubuntu: 4.4.0-208.240 ]
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069) * linux ADT test failure with linux/4.4.0-207.239 - ubuntu_qrt_kernel_security.test-kernel-security.py (LP: #1922200) // CVE-2018-5953 // CVE-2018-5995 // CVE-2018-7754 - SAUCE: Revert "printk: hash addresses printed with %p" * lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239 (LP: #1921969) - SAUCE: Fix fuse regression in 4.4.0-207.239
-- Tim Gardner <email address hidden> Thu, 01 Apr 2021 12:51:34 -0600
This bug was fixed in the package linux-aws - 4.4.0-1126.140
---------------
linux-aws (4.4.0-1126.140) xenial; urgency=medium
* xenial/linux-aws: 4.4.0-1126.140 -proposed tracker (LP: #1922058)
[ Ubuntu: 4.4.0-208.240 ]
* xenial/linux: 4.4.0-208.240 -proposed tracker (LP: #1922069) qrt_kernel_ security. test-kernel- security. py (LP: #1922200) // 0ubuntu1~ 16.04.4 ADT test failure with linux 4.4.0-207.239
* linux ADT test failure with linux/4.4.0-207.239 -
ubuntu_
CVE-2018-5953 // CVE-2018-5995 // CVE-2018-7754
- SAUCE: Revert "printk: hash addresses printed with %p"
* lxd 2.0.11-
(LP: #1921969)
- SAUCE: Fix fuse regression in 4.4.0-207.239
-- Tim Gardner <email address hidden> Thu, 01 Apr 2021 12:51:34 -0600