linux-raspi2: 4.8.0-1041.45 -proposed tracker

Bug #1699037 reported by Kleber Sacilotto de Souza on 2017-06-20
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Canonical Hardware Certification
Prepare-package
Medium
Juerg Haefliger
Prepare-package-meta
Medium
Juerg Haefliger
Promote-to-proposed
Medium
Łukasz Zemczak
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Upload-to-ppa-dnu
Medium
Canonical Kernel Team
Verification-testing
Medium
Canonical Kernel Team
linux-raspi2 (Ubuntu)
Undecided
Unassigned
Yakkety
Undecided
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1699035
phase: Promoted to proposed
proposed-announcement-sent: true
proposed-testing-requested: true

tags: added: kernel-release-tracking-bug
tags: added: block-proposed-xenial
tags: added: block-proposed-yakkety
tags: added: yakkety
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-raspi2 (Ubuntu):
status: New → Invalid
tags: added: kernel-sru-cycle-2017.06.07-2
tags: added: kernel-sru-derivative-of-1699035
Juerg Haefliger (juergh) on 2017-06-21
summary: - linux-raspi2: <version to be filled> -proposed tracker
+ linux-raspi2: 4.8.0-1040.44 -proposed tracker
Brad Figg (brad-figg) on 2017-06-21
description: updated
description: updated
Juerg Haefliger (juergh) on 2017-06-21
summary: - linux-raspi2: 4.8.0-1040.44 -proposed tracker
+ linux-raspi2: 4.8.0-1041.45 -proposed tracker
Juerg Haefliger (juergh) on 2017-06-21
description: updated
Brad Figg (brad-figg) on 2017-06-21
description: updated
description: updated
Brad Figg (brad-figg) on 2017-06-21
description: updated
description: updated
Brad Figg (brad-figg) on 2017-06-21
tags: added: block-proposed
description: updated
Brad Figg (brad-figg) on 2017-06-22
description: updated
description: updated
Taihsiang Ho (taihsiangho) wrote :

Skip Certification-testing for limited test time of the recent respin.

Brad Figg (brad-figg) on 2017-06-26
tags: removed: block-proposed-yakkety
tags: removed: block-proposed
Launchpad Janitor (janitor) wrote :
Download full text (4.2 KiB)

This bug was fixed in the package linux-raspi2 - 4.8.0-1042.46

---------------
linux-raspi2 (4.8.0-1042.46) yakkety; urgency=low

  * linux-raspi2: 4.8.0-1042.46 -proposed tracker (LP: #1700536)

  [ Ubuntu: 4.8.0-58.63 ]

  * linux: 4.8.0-58.63 -proposed tracker (LP: #1700533)
  * CVE-2017-1000364
    - Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
    - Revert "mm: do not collapse stack gap into THP"
    - Revert "mm: enlarge stack guard gap"
    - mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
    - mm: larger stack guard gap, between vmas
    - mm: fix new crash in unmapped_area_topdown()
    - Allow stack to grow up to address space limit

linux-raspi2 (4.8.0-1041.45) yakkety; urgency=low

  * linux-raspi2: 4.8.0-1041.45 -proposed tracker (LP: #1699037)

  * raspi2 config diverges from master/generic armhf (LP: #1693250)
    - [Config] config sync wrt master/generic
    - [Config] disable FB_SIMPLE
    - [Config] config sync wrt master/generic =m
    - remove the of_mmc_spi module

  [ Ubuntu: 4.8.0-57.62 ]

  * linux: 4.8.0-57.62 -proposed tracker (LP: #1699035)
  * CVE-2017-1000364
    - SAUCE: mm: Only expand stack if guard area is hit
  * CVE-2017-7374
    - fscrypt: remove broken support for detecting keyring key revocation
  * CVE-2017-100363
    - char: lp: fix possible integer overflow in lp_setup()
  * CVE-2017-9242
    - ipv6: fix out of bound writes in __ip6_append_data()
  * CVE-2017-9075
    - sctp: do not inherit ipv6_{mc|ac|fl}_list from parent
  * CVE-2017-9074
    - ipv6: Prevent overrun when parsing v6 header options
  * CVE-2017-9076
    - ipv6/dccp: do not inherit ipv6_mc_list from parent
  * CVE-2017-9077
    - ipv6/dccp: do not inherit ipv6_mc_list from parent
  * CVE-2017-8890
    - dccp/tcp: do not inherit mc_list from parent
  * extend-diff-ignore should use exact matches (LP: #1693504)
    - [Packaging] exact extend-diff-ignore matches
  * APST quirk needed for Intel NVMe (LP: #1686592)
    - nvme: Quirk APST on Intel 600P/P3100 devices
  * regression: the 4.8 hwe kernel does not create the
    /sys/block/*/device/enclosure_device:* symlinks (LP: #1691899)
    - scsi: ses: Fix SAS device detection in enclosure
  * datapath: Add missing case OVS_TUNNEL_KEY_ATTR_PAD (LP: #1676679)
    - openvswitch: Add missing case OVS_TUNNEL_KEY_ATTR_PAD
  * connection flood to port 445 on mounting cifs volume under kernel
    (LP: #1686099)
    - cifs: Do not send echoes before Negotiate is complete
  * Support IPMI system interface on Cavium ThunderX (LP: #1688132)
    - i2c: octeon: Rename driver to prepare for split
    - i2c: octeon: Split the driver into two parts
    - [Config] CONFIG_I2C_THUNDERX=m
    - i2c: thunderx: Add i2c driver for ThunderX SOC
    - i2c: thunderx: Add SMBUS alert support
    - i2c: octeon,thunderx: Move register offsets to struct
    - i2c: octeon: Sort include files alphabetically
    - i2c: octeon: Use booleon values for booleon variables
    - i2c: octeon: thunderx: Add MAINTAINERS entry
    - i2c: octeon: Fix set SCL recovery function
    - i2c: octeon: Avoid sending STOP during recovery
    - i2c: octeon: Fix high-level controller status che...

Read more...

Changed in linux-raspi2 (Ubuntu Yakkety):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers