linux-lts-xenial: 4.4.0-87.110~14.04.1 -proposed tracker

Bug #1704985 reported by Stefan Bader
32
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Fix Released
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Kleber Sacilotto de Souza
Prepare-package-meta
Fix Released
Medium
Kleber Sacilotto de Souza
Prepare-package-signed
Fix Released
Medium
Kleber Sacilotto de Souza
Promote-to-proposed
Fix Released
Medium
Andy Whitcroft
Promote-to-security
Fix Released
Medium
Łukasz Zemczak
Promote-to-updates
Fix Released
Medium
Łukasz Zemczak
Regression-testing
Fix Released
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Upload-to-ppa
Invalid
Medium
Canonical Kernel Team
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-lts-xenial (Ubuntu)
Invalid
Undecided
Unassigned
Trusty
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1704982
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

CVE References

Stefan Bader (smb)
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: block-proposed-trusty
tags: added: trusty
Changed in linux-lts-xenial (Ubuntu Trusty):
status: New → Confirmed
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-lts-xenial (Ubuntu):
status: New → Invalid
Changed in linux-lts-xenial (Ubuntu Trusty):
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2017.06.28-4
tags: added: kernel-sru-backport-of-1704982
Brad Figg (brad-figg)
description: updated
description: updated
summary: - linux-lts-xenial: <version to be filled> -proposed tracker
+ linux-lts-xenial: 4.4.0-87.110~14.04.1 -proposed tracker
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
tags: added: block-proposed
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
tags: added: regression-testing-passed
Revision history for this message
Kleber Sacilotto de Souza (kleber-souza) wrote :

HW-certification tests completed this cycle for trusty/linux-lts-xenial with linux-image-4.4.0-85-generic==4.4.0-85.108~14.04.1:
http://people.canonical.com/~hwcert/sru-testing/trusty/4.4.0-85.108~14.04.1/trusty-4.4-proposed.html

Brad Figg (brad-figg)
tags: removed: block-proposed-trusty
tags: removed: block-proposed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-lts-xenial - 4.4.0-87.110~14.04.1

---------------
linux-lts-xenial (4.4.0-87.110~14.04.1) trusty; urgency=low

  * linux-lts-xenial: 4.4.0-87.110~14.04.1 -proposed tracker (LP: #1704985)

  * linux: 4.4.0-87.110 -proposed tracker (LP: #1704982)

  * CVE-2017-1000364
    - mm/mmap.c: do not blow on PROT_NONE MAP_FIXED holes in the stack
    - mm/mmap.c: expand_downwards: don't require the gap if !vm_prev

  * CIFS causes oops (LP: #1704857)
    - CIFS: Fix null pointer deref during read resp processing
    - CIFS: Fix some return values in case of error in 'crypt_message'

 -- Kleber Sacilotto de Souza <email address hidden> Tue, 18 Jul 2017 13:58:43 +0200

Changed in linux-lts-xenial (Ubuntu Trusty):
status: Confirmed → Fix Released
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.