linux-aws: 4.4.0-1030.33 -proposed tracker
Bug #1791746 reported by
Kleber Sacilotto de Souza
This bug report is a duplicate of:
Bug #1794445: linux-aws: 4.4.0-1031.34 -proposed tracker.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Kernel SRU Workflow |
Fix Released
|
Medium
|
Unassigned | ||
Automated-testing |
Incomplete
|
Medium
|
Canonical Kernel Team | ||
Certification-testing |
Invalid
|
Medium
|
Canonical Hardware Certification | ||
Prepare-package |
Fix Released
|
Medium
|
Khaled El Mously | ||
Prepare-package-meta |
Fix Released
|
Medium
|
Khaled El Mously | ||
Promote-to-proposed |
Fix Released
|
Medium
|
Łukasz Zemczak | ||
Promote-to-security |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Promote-to-updates |
New
|
Medium
|
Ubuntu Stable Release Updates Team | ||
Regression-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
Security-signoff |
In Progress
|
Medium
|
Canonical Security Team | ||
Upload-to-ppa |
New
|
Medium
|
Canonical Kernel Team | ||
Verification-testing |
Confirmed
|
Medium
|
Canonical Kernel Team | ||
linux-aws (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Trusty |
Fix Released
|
Medium
|
Unassigned |
Bug Description
This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see: https:/
-- swm properties --
boot-testing-
kernel-
phase: Promoted to proposed
proposed-
proposed-
CVE References
tags: | added: kernel-release-tracking-bug |
tags: | added: kernel-release-tracking-bug-live |
tags: | added: trusty |
Changed in linux-aws (Ubuntu Trusty): | |
status: | New → Confirmed |
Changed in linux-aws (Ubuntu): | |
status: | New → Invalid |
Changed in linux-aws (Ubuntu Trusty): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | New → In Progress |
importance: | Undecided → Medium |
tags: | added: kernel-sru-cycle-2018.09.10 |
tags: | added: kernel-sru-backport-of-1791745 |
tags: | added: kernel-sru-cycle-2018.09.10-1 |
tags: | removed: kernel-sru-cycle-2018.09.10 |
description: | updated |
description: | updated |
summary: |
- linux-aws: <version to be filled> -proposed tracker + linux-aws: 4.4.0-1030.33 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: block-proposed-trusty |
tags: | added: block-proposed |
description: | updated |
description: | updated |
description: | updated |
tags: | removed: kernel-release-tracking-bug-live |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Released |
To post a comment you must log in.
This bug was fixed in the package linux-aws - 4.4.0-1031.34
---------------
linux-aws (4.4.0-1031.34) trusty; urgency=medium
[ Ubuntu: 4.4.0-137.163 ]
* CVE-2018-14633 flush_all( ) entirely
- iscsi target: Use hex2bin instead of a re-implementation
* CVE-2018-17182
- mm: get rid of vmacache_
linux-aws (4.4.0-1030.33) trusty; urgency=medium
* linux-aws: 4.4.0-1030.33 -proposed tracker (LP: #1791746)
* Xenial update to 4.4.141 stable release (LP: #1790620)
- [Config] Refresh configs for 4.4.141
[ Ubuntu: 4.4.0-136.162 ]
* linux: 4.4.0-136.162 -proposed tracker (LP: #1791745) /l1tf: Fix overflow in l1tf_pfn_limit() on 32bit /l1tf: Fix off-by-one error when warning that system has too /l1tf: Increase l1tf memory limit for Nehalem+ spec_dst branch_ prediction_ barrier( ) 64/compat: Clear registers for compat syscalls, to reduce nospec_ mask() asm constraint
* CVE-2017-5753
- bpf: properly enforce index mask to prevent out-of-bounds speculation
- Revert "UBUNTU: SAUCE: bpf: Use barrier_nospec() instead of osb()"
- Revert "bpf: prevent speculative execution in eBPF interpreter"
* L1TF mitigation not effective in some CPU and RAM combinations
(LP: #1788563) // CVE-2018-3620 // CVE-2018-3646
- x86/speculation
- x86/speculation
much RAM
- x86/speculation
* CVE-2018-15594
- x86/paravirt: Fix spectre-v2 mitigations for paravirt guests
* Xenial update to 4.4.144 stable release (LP: #1791080)
- KVM/Eventfd: Avoid crash when assign and deassign specific eventfd in
parallel.
- x86/MCE: Remove min interval polling limitation
- fat: fix memory allocation failure handling of match_strdup()
- ALSA: rawmidi: Change resized buffers atomically
- ARC: Fix CONFIG_SWAP
- ARC: mm: allow mprotect to make stack mappings executable
- mm: memcg: fix use after free in mem_cgroup_iter()
- ipv4: Return EINVAL when ping_group_range sysctl doesn't map to user ns
- ipv6: fix useless rol32 call on hash
- lib/rhashtable: consider param->min_size when setting initial table size
- net/ipv4: Set oif in fib_compute_
- net: phy: fix flag masking in __set_phy_supported
- ptp: fix missing break in switch
- tg3: Add higher cpu clock for 5762.
- net: Don't copy pfmemalloc flag in __copy_skb_header()
- skbuff: Unconditionally copy pfmemalloc in __skb_clone()
- xhci: Fix perceived dead host due to runtime suspend race with event handler
- x86/paravirt: Make native_save_fl() extern inline
- SAUCE: Add missing CPUID_7_EDX defines
- SAUCE: x86/speculation: Expose indirect_
- x86/pti: Mark constant arrays as __initconst
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs
- x86/entry/
speculation attack surface
- x86/speculation: Clean up various Spectre related details
- x86/speculation: Fix up array_index_
- x86/xen: Zero MSR_IA32_SPEC_CTRL before suspend
- x86/mm: Factor out LDT init from context init
- x86/mm: Give each mm TLB flush generation a unique ID
- SAUCE: x86/speculation: Use Indirect Branch Prediction Barrier in context
switch
- x86/speculation: Use IBRS if available before...