This bug was fixed in the package linux-raspi2 - 4.4.0-1061.69
---
linux-raspi2 (4.4.0-1061.69) xenial; urgency=low
* linux-raspi2: 4.4.0-1061.69 -proposed tracker (LP: #1700544)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000
This bug was fixed in the package linux-snapdragon - 4.4.0-1063.68
---
linux-snapdragon (4.4.0-1063.68) xenial; urgency=low
* linux-snapdragon: 4.4.0-1063.68 -proposed tracker (LP: #1700545)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CV
This bug was fixed in the package linux-aws - 4.4.0-1022.31
---
linux-aws (4.4.0-1022.31) xenial; urgency=low
* linux-aws: 4.4.0-1022.31 -proposed tracker (LP: #1700549)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000364
-
This bug was fixed in the package linux-gke - 4.4.0-1018.18
---
linux-gke (4.4.0-1018.18) xenial; urgency=low
* linux-gke: 4.4.0-1018.18 -proposed tracker (LP: #1700550)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000364
-
This bug was fixed in the package linux-gke - 4.4.0-1018.18
---
linux-gke (4.4.0-1018.18) xenial; urgency=low
* linux-gke: 4.4.0-1018.18 -proposed tracker (LP: #1700550)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000364
-
This bug was fixed in the package linux-snapdragon - 4.4.0-1063.68
---
linux-snapdragon (4.4.0-1063.68) xenial; urgency=low
* linux-snapdragon: 4.4.0-1063.68 -proposed tracker (LP: #1700545)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CV
This bug was fixed in the package linux-aws - 4.4.0-1022.31
---
linux-aws (4.4.0-1022.31) xenial; urgency=low
* linux-aws: 4.4.0-1022.31 -proposed tracker (LP: #1700549)
[ Ubuntu: 4.4.0-83.106 ]
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000364
-
This bug was fixed in the package linux - 4.4.0-83.106
---
linux (4.4.0-83.106) xenial; urgency=low
* linux: 4.4.0-83.106 -proposed tracker (LP: #1700541)
* CVE-2017-1000364
- Revert "UBUNTU: SAUCE: mm: Only expand stack if guard area is hit"
- Revert "mm: do not collapse
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-raspi2 (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-snapdragon (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-lts-xe
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1691814
Title:
linux xenial derivatives fail to build
Status
This bug was fixed in the package linux-aws - 4.4.0-1018.27
---
linux-aws (4.4.0-1018.27) xenial; urgency=low
* linux-aws: 4.4.0-1018.27 -proposed tracker (LP: #1691184)
* linux xenial derivatives fail to build (LP: #1691814)
- [Packaging] Set do_tools_common in common vars
This bug was fixed in the package linux-gke - 4.4.0-1014.14
---
linux-gke (4.4.0-1014.14) xenial; urgency=low
* linux-gke: 4.4.0-1014.14 -proposed tracker (LP: #1691186)
* linux xenial derivatives fail to build (LP: #1691814)
- [Packaging] Set do_tools_common in common vars
This bug was fixed in the package linux-raspi2 - 4.4.0-1057.64
---
linux-raspi2 (4.4.0-1057.64) xenial; urgency=low
* linux-raspi2: 4.4.0-1057.64 -proposed tracker (LP: #1692040)
* linux xenial derivatives fail to build (LP: #1691814)
- [Packaging] Set do_tools_common in comm
This bug was fixed in the package linux-lts-xenial -
4.4.0-79.100~14.04.1
---
linux-lts-xenial (4.4.0-79.100~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-79.100~14.04.1 -proposed tracker (LP:
#1691181)
* linux xenial derivatives fail to build (LP: #1691814)
- [Packa
This bug was fixed in the package linux-snapdragon - 4.4.0-1059.63
---
linux-snapdragon (4.4.0-1059.63) xenial; urgency=low
* linux-snapdragon: 4.4.0-1059.63 -proposed tracker (LP: #1691183)
* linux xenial derivatives fail to build (LP: #1691814)
- [Packaging] Set do_tools_co
Confirmed that all derivatives from xenial kernel 4.4.0-79.100 were
built successfully.
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1691814
Titl
** Also affects: linux-lts-xenial (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-aws (Ubuntu)
Status: New => Fix Committed
** Changed in: linux-gke (Ubuntu)
Status: New => Fix Committed
** Changed in: linux-lts-xenial (Ubuntu)
Status: New => Fix Co
** Also affects: linux-snapdragon (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-snapdragon (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https
** Changed in: linux-raspi2 (Ubuntu)
Status: New => Invalid
** Changed in: linux-raspi2 (Ubuntu)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.ne
19 matches
Mail list logo