linux: 3.13.0-134.183 -proposed tracker
Bug #1722335 reported by
Kleber Sacilotto de Souza
This bug report is a duplicate of:
Bug #1724500: linux: 3.13.0-135.184 -proposed tracker.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Invalid
|
Medium
|
Unassigned | ||
Automated-testing |
Incomplete
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Confirmed
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Juerg Haefliger | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Juerg Haefliger | ||
Prepare-package-signed |
Fix Released
|
Medium
|
Juerg Haefliger | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Andy Whitcroft | ||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
Confirmed
|
Medium
|
Canonical Security Team | ||
Upload-to-ppa |
Invalid
|
Medium
|
Unassigned | ||
Verification-testing |
Fix Released
|
Medium
|
Canonical Kernel Team | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
This bug is for tracking the 3.13.0-134.183 upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
backports: 1722336
derivatives:
-- swm properties --
boot-testing-
phase: Promoted to proposed
proposed-
proposed-
CVE References
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: trusty |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
Changed in linux (Ubuntu): | |
status: | New → Invalid |
tags: | added: kernel-sru-cycle-2017.10.09-1 |
tags: | added: kernel-sru-master-kernel |
description: | updated |
summary: |
- linux: <version to be filled> -proposed tracker + linux: 3.13.0-134.183 -proposed tracker |
Changed in linux (Ubuntu Trusty): | |
status: | New → Confirmed |
description: | updated |
description: | updated |
tags: | added: block-proposed-trusty |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Invalid |
description: | updated |
To post a comment you must log in.
This bug was fixed in the package linux - 3.13.0-135.184
---------------
linux (3.13.0-135.184) trusty; urgency=low
* linux: 3.13.0-135.184 -proposed tracker (LP: #1724500)
* Trusty NVMe boot fails on some systems (LP: #1720867) msi_range( ) and pci_enable_ msix_range( )
- NVMe: RCU protected access to io queues
- NVMe: IOCTL path RCU protect queue access
- powerpc/mm: fix ".__node_distance" undefined
- NVMe: per-cpu io queues
- nvme: Use pci_enable_
- NVMe: make setup work for devices that don't do INTx
- NVMe: Always use MSI/MSI-x interrupts
linux (3.13.0-134.183) trusty; urgency=low
* linux: 3.13.0-134.183 -proposed tracker (LP: #1722335)
[ Thadeu Lima de Souza Cascardo ]
* CVE-2017-10661
- timerfd: Protect the might cancel mechanism proper
* CVE-2017-10662
- f2fs: sanity check segment count
* CVE-2017-10663
- f2fs: sanity check checkpoint segno and blkoff
* CVE-2017-14340 REALTIME_ INODE() should be false if no rt device present
- xfs: XFS_IS_
* CVE-2017-10911
- xen-blkback: don't leak stack data via response ring
* CVE-2017-11176
- mqueue: fix a use-after-free in sys_mq_notify()
* CVE-2016-8632
- tipc: check minimum bearer MTU
-- Thadeu Lima de Souza Cascardo <email address hidden> Wed, 18 Oct 2017 07:09:04 -0200