linux-snapdragon: 4.4.0-1066.71 -proposed tracker

Bug #1704989 reported by Stefan Bader
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Fix Released
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Prepare-package-meta
Fix Released
Medium
Thadeu Lima de Souza Cascardo
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Invalid
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Upload-to-ppa
New
Medium
Canonical Kernel Team
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-snapdragon (Ubuntu)
Fix Released
Undecided
Unassigned
Xenial
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1704982
phase: Promoted to proposed
proposed-announcement-sent: true
proposed-testing-requested: true

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: block-proposed-trusty
tags: added: block-proposed-xenial
tags: added: xenial
Changed in linux-snapdragon (Ubuntu Xenial):
status: New → Confirmed
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-snapdragon (Ubuntu):
status: New → Invalid
Changed in linux-snapdragon (Ubuntu Xenial):
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2017.06.28-4
tags: added: kernel-sru-derivative-of-1704982
Brad Figg (brad-figg)
description: updated
description: updated
summary: - linux-snapdragon: <version to be filled> -proposed tracker
+ linux-snapdragon: 4.4.0-1066.71 -proposed tracker
Brad Figg (brad-figg)
description: updated
description: updated
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

Setting HW Certification tests as 'Fix Released' as per bug #1702107.

Brad Figg (brad-figg)
tags: added: block-proposed
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (15.6 KiB)

This bug was fixed in the package linux-snapdragon - 4.4.0-1067.72

---------------
linux-snapdragon (4.4.0-1067.72) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1067.72 -proposed tracker (LP: #1705566)

  * sock_recvmsg has dropped size argument (LP: #1701697)
    - Packaging: Breaks yet another iscsitarget-dkms version

linux-snapdragon (4.4.0-1066.71) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1066.71 -proposed tracker (LP: #1704989)

  [ Ubuntu: 4.4.0-87.110 ]

  * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982)
  * CVE-2017-1000364
    - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
    - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev
  * CIFS causes oops (LP: #1704857)
    - CIFS: Fix null pointer deref during read resp processing
    - CIFS: Fix some return values in case of error in 'crypt_message'

linux-snapdragon (4.4.0-1065.70) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1065.70 -proposed tracker (LP: #1703999)

  * sock_recvmsg has dropped size argument (LP: #1701697)
    - Packaging: Breaks unfixed iscsitarget versions

  [ Ubuntu: 4.4.0-86.109 ]

  * linux: 4.4.0-86.109 -proposed tracker (LP: #1703995)
  * sock_recvmsg has dropped size argument (LP: #1701697)
    - Packaging: Breaks unfixed iscsitarget versions

  [ Ubuntu: 4.4.0-85.108 ]

  * linux: 4.4.0-85.108 -proposed tracker (LP: #1702103)
  * [Hyper-V] Implement Hyper-V PTP Source (LP: #1676635)
    - SAUCE: hv: make clocksource available for PTP device supporting
    - Drivers: hv: util: Use hv_get_current_tick() to get current tick
    - hv_util: switch to using timespec64
    - hv_utils: implement Hyper-V PTP source
    - Drivers: hv: util: Fix a typo
    - Drivers: hv: util: don't forget to init host_ts.lock
    - hv_utils: drop .getcrosststamp() support from PTP driver
    - hv_utils: fix TimeSync work on pre-TimeSync-v4 hosts

linux-snapdragon (4.4.0-1064.69) xenial; urgency=low

  * linux-snapdragon: 4.4.0-1064.69 -proposed tracker (LP: #1701027)

  [ Ubuntu: 4.4.0-84.107 ]

  * linux: 4.4.0-84.107 -proposed tracker (LP: #1701024)
  * Can't disable USB port from BIOS (LP: #1695216)
    - SAUCE: xhci: AMD Promontory USB disable port support
  * KILLER1435-S[0489:e0a2] BT cannot search BT 4.0 device (LP: #1699651)
    - Bluetooth: btusb: Add support for 0489:e0a2 QCA_ROME device
  * CIFS: Enable encryption for SMB3 (LP: #1670508)
    - Revert "Handle mismatched open calls"
    - Revert "Call echo service immediately after socket reconnect"
    - cifs: Make echo interval tunable
    - Prepare for encryption support (first part). Add decryption and encryption
      key generation. Thanks to Metze for helping with this.
    - [net] drop 'size' argument of sock_recvmsg()
    - cifs: merge the hash calculation helpers
    - cifs: no need to wank with copying and advancing iovec on recvmsg side
      either
    - cifs: don't bother with kmap on read_pages side
    - cifs_readv_receive: use cifs_read_from_socket()
    - Fix memory leaks in cifs_do_mount()
    - SMB3: Add mount parameter to allow user to override max credits
    - SMB2: Separate Kerberos authentication from SMB2_sess_setup
    - SMB2: Separate RawNTLMSS...

Changed in linux-snapdragon (Ubuntu Xenial):
status: Confirmed → Fix Released
Changed in linux-snapdragon (Ubuntu):
status: Invalid → Fix Released
Andy Whitcroft (apw)
tags: removed: kernel-release-tracking-bug-live
Changed in kernel-sru-workflow:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.