Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Femma
on 16 August 2017

Kernel Team Summary- August 16, 2017


Development (Artful / 17.10)

We intend to target a 4.13 kernel for the Ubuntu 17.10 release. The artful kernel is now based on Linux 4.11. The Ubuntu 17.10 Kernel Freeze is Thurs Oct 5, 2017.

  • The kernel in the artful-proposed pocket of the Ubuntu archive has been updated to v4.12.7
  • The kernel in the Artful staging repository has been updated to v4.13-rc5

Stable (Released & Supported)

  • Embargoed CVEs CVE-2017-1000111 and CVE-2017-1000112 have been made public and the fixes released for all the affected kernels (including their derivatives and rebases):

     trusty    3.13.0-128.177
     xenial    4.4.0-91.114
     zesty     4.10.0-32.36
    
  • The Xenial and Xenial-based kernels have been re-spun to fix a regression with OpenStack (LP: #1709032) and the following packages are on the way of getting promoted to -updates:

     xenial            4.4.0-92.115
     xenial/raspi2     4.4.0-1070.78
     xenial/snapdragon 4.4.0-1072.77
     xenial/aws        4.4.0-1031.40
     xenial/gke        4.4.0-1027.27
     trusty/lts-xenial 4.4.0-92.115~14.04.1
    
  • Current cycle: 04-Aug through 26-Aug

              04-Aug  Last day for kernel commits for this cycle.
     07-Aug - 12-Aug  Kernel prep week.
     13-Aug - 25-Aug  Bug verification & Regression testing.
              28-Aug  Release to -updates.
    
  • Next cycle: 25-Aug through 16-Sep

              25-Aug  Last day for kernel commits for this cycle.
     28-Aug - 02-Sep  Kernel prep week.
     03-Sep - 15-Sep  Bug verification & Regression testing.
              18-Sep  Release to -updates.
    

Misc

  • eventstat 0.04.00 for 17.10 has been released. This now uses kernel trace events rather than the deprecated /proc/timer_stat interface.
  • If you would like to reach the kernel team, you can find us at the #ubuntu-kernel
    channel on FreeNode. Alternatively, you can mail the Ubuntu Kernel Team mailing
    list at: [email protected].
  • The current CVE status

Related posts


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...


Nkeiruka Whenu
28 May 2025

The 2025 Frankfurt Engineering Sprint: What did you miss?

Community Article

If you have ever wondered what goes on when your friends say that they’re going on a “Business trip” abroad, then allow me to spill the beans 🫘. Let’s recap what you may have missed from Canonical’s Frankfurt Engineering Sprint this May, shall we? My name is Nkeiruka, and I work as a Software Engineer ...