linux-aws: 4.4.0-1022.31 -proposed tracker
Bug #1700549 reported by
Stefan Bader
This bug affects 5 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Thadeu Lima de Souza Cascardo | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Thadeu Lima de Souza Cascardo | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Promote-to-updates |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Regression-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Fix Released
|
Medium
|
Canonical Security Team | ||
Upload-to-ppa |
Invalid
|
Medium
|
Canonical Kernel Team | ||
Verification-testing |
Invalid
|
Medium
|
Canonical Kernel Team | ||
linux-aws (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
-- swm properties --
boot-testing-
kernel-
phase: Released
proposed-
proposed-
tags: | added: kernel-release-tracking-bug |
tags: | added: block-proposed-trusty |
tags: | added: block-proposed-xenial |
tags: | added: xenial |
Changed in linux-aws (Ubuntu Xenial): | |
status: | New → Confirmed |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
Changed in linux-aws (Ubuntu): | |
status: | New → Invalid |
Changed in linux-aws (Ubuntu Xenial): | |
importance: | Undecided → Medium |
tags: | added: kernel-sru-cycle-2017.06.07-3 |
tags: | added: kernel-sru-derivative-of-1700541 |
summary: |
- linux-aws: <version to be filled> -proposed tracker + linux-aws: 4.4.0-1022.31 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: block-proposed-xenial |
tags: | removed: block-proposed |
description: | updated |
description: | updated |
To post a comment you must log in.
This bug was fixed in the package linux-aws - 4.4.0-1022.31
---------------
linux-aws (4.4.0-1022.31) xenial; urgency=low
* linux-aws: 4.4.0-1022.31 -proposed tracker (LP: #1700549)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541) area_topdown( )
* CVE-2017-1000364
- Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
- Revert "mm: do not collapse stack gap into THP"
- Revert "mm: enlarge stack guard gap"
- mm: vma_adjust: remove superfluous confusing update in remove_next == 1 case
- mm: larger stack guard gap, between vmas
- mm: fix new crash in unmapped_
- Allow stack to grow up to address space limit
linux-aws (4.4.0-1021.30) xenial; urgency=low
* linux-aws: 4.4.0-1021.30 -proposed tracker (LP: #1699069)
* linux-aws: disable floppy driver (LP: #1696193)
- [config] AWS: disable CONFIG_BLK_DEV_FD
* linux-aws needs modules: drm, drm_kms_helper (LP: #1694837)
- [config] AWS: drm.ko, drm_kms_helper moved to linux-image package
[ Ubuntu: 4.4.0-82.105 ]
* linux: 4.4.0-82.105 -proposed tracker (LP: #1699064) linux-* -cloud- tools-common (LP: #1688579) tools-common protection ac|fl}_ list from parent
* CVE-2017-1000364
- SAUCE: mm: Only expand stack if guard area is hit
* linux-aws/linux-gke incorrectly producing and using linux-*-tools-
common/
- [Config] make linux-tools-common and linux-cloud-
consistent
* CVE-2017-9242
- ipv6: fix out of bound writes in __ip6_append_data()
* CVE-2017-9075
- sctp: do not inherit ipv6_{mc|
* CVE-2017-9074
- ipv6: Prevent overrun when parsing v6 header options
* CVE-2017-9076
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-9077
- ipv6/dccp: do not inherit ipv6_mc_list from parent
* CVE-2017-8890
- dccp/tcp: do not inherit mc_list from parent
* Module signing exclusion for staging drivers does not work properly
(LP: #1690908)
- SAUCE: Fix module signing exclusion in package builds
* extend-diff-ignore should use exact matches (LP: #1693504)
- [Packaging] exact extend-diff-ignore matches
* Dell XPS 9360 wifi 5G performance is poor (LP: #1692836)
- SAUCE: ath10k: fix the wifi speed issue for kill 1535
* Upgrade Redpine WLAN/BT driver to ver. 1.2.RC12 (LP: #1694607)
- SAUCE: Redpine: Upgrade to ver. 1.2.RC12
* [DP MST] No audio output through HDMI/DP/mDP ports in Dell WD15 and TB15
docking stations (LP: #1694665)
- drm/i915: Store port enum in intel_encoder
- drm/i915: Eliminate redundant local variable definition
- drm/i915: Switch to using port stored in intel_encoder
- drm/i915: Move audio_connector to intel_encoder
- drm/i915/dp: DP audio API changes for MST
- drm/i915: abstract ddi being audio enabled
- drm/i915/audio: extend get_saved_enc() to support more scenarios
- drm/i915: enable dp mst audio
* Xenial update to 4.4.70 stable release (LP: #1694621)
- usb: misc: legousbtower: Fix buffers on stack
- usb: misc: legousbtower: Fix memory leak
- USB: ene_usb6250: fix DMA to the stack
- watchdog: pcwd_usb: fix NULL-deref at probe
- char: lp: fix possible...