This newsletter is to provide a status update from the Ubuntu Kernel Team. There will also be highlights provided for any interesting subjects the team may be working on.
If you would like to reach the kernel team, you can find us at the #ubuntu-kernel channel on FreeNode. Alternatively, you can mail the Ubuntu Kernel Team mailing list at: firstname.lastname@example.org
Due to that, the proposed updates for the above packages being prepared
on the current SRU cycle are being re-spun to include the fix.
 CVE description: It was discovered that the stack guard page for
processes in the Linux kernel was not sufficiently large enough to
prevent overlapping with the heap. An attacker could leverage this with
another vulnerability to execute arbitrary code and gain administrative
We intend to target a 4.13 kernel for the Ubuntu 17.10 release. The Ubuntu 17.10 Kernel Freeze is Thurs Oct 5, 2017.
The current CVE status can be reviewed at the following:
Ubuntu offers all the training, software infrastructure, tools, services and support you need for your public and private clouds.
As details of the Meltdown and Spectre vulnerabilities1 have become clearer a number of statements have been published by the multiple vendors affected; Canonical has issued advisories and updates on fixes and mitigations, the latest of…
Canonical holds Ubuntu to the highest standards of security and quality. This week we published candidate Ubuntu kernels providing mitigation for CVE-2017-5715 and CVE-2017-5753 (ie, Spectre / Variants 1 & 2) to their respective…
For up-to-date patch, package, and USN links, please refer to: https://wiki.ubuntu.com/Securi... Unfortunately, you’ve probably already read about one of the most widespread security issues…