Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 15 June 2017

Kernel Team Summary- June 15, 2017


Introduction

This blog is to provide a status update from the Ubuntu Kernel Team. There will also be highlights provided for any interesting subjects the team may be working on. If you would like to reach the kernel team, you can find us at the #ubuntu-kernel channel on FreeNode. Alternatively, you can mail the Ubuntu Kernel Team mailing list at: [email protected]

Highlights

  • Unstable updated to 4.12-rc5
  • Virtualbox and zfs enabled in unstable/4.12
  • artful/4.11 updated to 4.11.4
  • Stress-ng 0.08.04 uploaded
  • Add new softlockup stressor, use with caution(!)
  • This is going to the be the first of a bunch of RT stressors

The following kernels were promoted to -proposed for testing:

  • Zesty 4.10.0-23.25
  • Yakkety 4.8.0-55.58
  • Xenial 4.4.0-80.101
  • Trusty 3.13.0-120.167

 

The following kernels were promoted to -proposed for testing:

  • trusty/linux-lts-xenial 4.4.0-80.101~14.04.1
  • xenial/linux-hwe-edge 4.10.0-23.25~16.04.1
  • xenial/linux-hwe 4.8.0-55.58~16.04.1
  • xenial/linux-raspi2 4.4.0-1058.65
  • xenial/linux-snapdragon 4.4.0-1060.64
  • xenial/linux-aws 4.4.0-1019.28
  • xenial/linux-gke 4.4.0-1015.15
  • xenial/linux-joule 4.4.0-1002.7
  • yakkety/linux-raspi2 4.8.0-1039.42
  • zesty/linux-raspi2 4.10.0-1007.9

 

The following kernel snaps were uploaded to the store:

  • pc-kernel 4.4.0-79.100
  • pi2-kernel 4.4.0-1057.64
  • dragonboard-kernel 4.4.0-1059.63

 

Devel Kernel Announcements

The 4.11 kernel in artful-proposed has been updated to 4.11.4. It is also available for testing in the following PPA: https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/proposed

We intend to target a 4.13 kernel for the Ubuntu 17.10 release. The Ubuntu 17.10 Kernel Freeze is Thurs Oct 5, 2017.

Stable Kernel Announcements

Current cycle: 02-Jun through 24-Jun

  • 02-Jun Last day for kernel commits for this cycle
  • 05-Jun – 10-Jun Kernel prep week
  • 11-Jun – 23-Jun Bug verification & Regression testing
  • 26-Jun Release to -updates.

Kernel Versions

  • precise 3.2.0-126.169
  • trusty 3.13.0-119.166
  • vivid 3.19.0-84.92
  • xenial 4.4.0-78.99
  • yakkety 4.8.0-53.56
  • linux-lts-trusty 3.13.0-117.164~precise1
  • linux-lts-vivid 3.19.0-80.88~14.04.1
  • linux-lts-xenial 4.4.0-78.99~14.04.1

Next cycle: 23-Jun through 15-Jul

23-Jun Last day for kernel commits for this cycle 26-Jun – 01-Jul Kernel prep week. 02-Jul – 14-Jul Bug verification & Regression testing.. 17-Jul Release to -updates.

Status: CVE’s

The current CVE status can be reviewed at the following: http://people.canonical.com/~kernel/cve/pkg/ALL-linux.html

Related posts


Henry Coggill
6 June 2025

What is CMMC compliance?

Hardening Article

CMMC version 2.0 came into effect on December 26, 2023, and is designed to ensure adherence to rigorous cybersecurity policies and practices within the public sector and amongst wider industry partners. ...


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...