linux: 4.4.0-84.107 -proposed tracker
Bug #1701024 reported by
Thadeu Lima de Souza Cascardo
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
Incomplete
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Confirmed
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Thadeu Lima de Souza Cascardo | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Thadeu Lima de Souza Cascardo | ||
Prepare-package-signed |
Fix Released
|
Medium
|
Thadeu Lima de Souza Cascardo | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
In Progress
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Fix Released
|
Medium
|
Steve Beattie | ||
Upload-to-ppa |
Invalid
|
Medium
|
Unassigned | ||
Verification-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
backports: 1701025
derivatives: 1701026,
-- swm properties --
boot-testing-
phase: Promoted to proposed
proposed-
proposed-
CVE References
tags: | added: kernel-release-tracking-bug |
tags: | added: block-proposed-xenial |
tags: | added: xenial |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
tags: | added: kernel-sru-cycle-2017.06.28-1 |
tags: | added: kernel-sru-master-kernel |
description: | updated |
summary: |
- linux: <version to be filled> -proposed tracker + linux: 4.4.0-84.107 -proposed tracker |
description: | updated |
description: | updated |
summary: |
- linux: 4.4.0-84.107 -proposed tracker + linux: 3.13.0-124.173 -proposed tracker |
summary: |
- linux: 3.13.0-124.173 -proposed tracker + linux: 4.4.0-84.107 -proposed tracker |
tags: | added: block-proposed |
description: | updated |
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux - 4.4.0-87.110
---------------
linux (4.4.0-87.110) xenial; urgency=low
* linux: 4.4.0-87.110 -proposed tracker (LP: #1704982)
* CVE-2017-1000364
- mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
- mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
* CIFS causes oops (LP: #1704857)
- CIFS: Fix null pointer deref during read resp processing
- CIFS: Fix some return values in case of error in 'crypt_message'
-- Kleber Sacilotto de Souza <email address hidden> Tue, 18 Jul 2017 13:58:43 +0200