This bug was fixed in the package linux - 4.9.0-11.12 --------------- linux (4.9.0-11.12) zesty; urgency=low
* Miscellaneous Ubuntu changes - UBUNTU: SAUCE: Add '-fno-pie -no-pie' to cflags for x86 selftests - UBUNTU: SAUCE: (no-up) aufs: for v4.9-rc1, support setattr_prepare() [ Upstream Kernel Changes ] * rebase to v4.9 -- Tim Gardner <tim.gard...@canonical.com> Mon, 12 Dec 2016 06:40:40 -0700 ** Changed in: linux (Ubuntu Zesty) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1642368 Title: linux: Staging modules should be unsigned Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: In Progress Status in linux source package in Xenial: Fix Committed Status in linux source package in Yakkety: In Progress Status in linux source package in Zesty: Fix Released Bug description: Modules under the drivers/staging hierarchy get little attention when it comes to vulnerabilities. It is possible that memory mapping tricks that expose kernel internals would go unnoticed. Therefore, do not sign staging modules so that they cannot be loaded in a secure boot environment. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1642368/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp