Kernel security test for CVE-2016-9793 still fail with proposed Yakkety 4.8.0-34 kernel
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
QA Regression Testing |
Fix Released
|
Undecided
|
Unassigned | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned |
Bug Description
According to the changelog [1] and the ACK mail, the patch for this CVE should be applied to the proposed kernel in this SRU cycle (Current cycle: 16-Dec through 07-Jan).
But I can still see the kernel security test suite failed for this issue, not sure it's because of the tool or the kernel itself:
=======
FAIL: test_213_
Ensure setsockopt(
-------
Traceback (most recent call last):
File "./test-
self.
AssertionError: Got exit code 0, expected 1
4608
[1] * CVE-2016-9793 - net: avoid signed overflows for SO_{SND|
http://
ProblemType: Bug
DistroRelease: Ubuntu 16.10
Package: linux-image-
ProcVersionSign
Uname: Linux 4.8.0-34-generic x86_64
ApportVersion: 2.20.3-0ubuntu8.2
Architecture: amd64
AudioDevicesInUse:
USER PID ACCESS COMMAND
/dev/snd/
/dev/snd/
Date: Fri Dec 23 02:44:12 2016
HibernationDevice: RESUME=
InstallationDate: Installed on 2016-12-19 (4 days ago)
InstallationMedia: Ubuntu 16.10 "Yakkety Yak" - Release amd64 (20161012.2)
MachineType: Dell Inc. Latitude E7240
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon.
RelatedPackageV
linux-
linux-
linux-firmware 1.161.1
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 10/05/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A05
dmi.board.name: 0G05MN
dmi.board.vendor: Dell Inc.
dmi.board.version: X01
dmi.chassis.type: 9
dmi.chassis.vendor: Dell Inc.
dmi.modalias: dmi:bvnDellInc.
dmi.product.name: Latitude E7240
dmi.product.
dmi.sys.vendor: Dell Inc.
This change was made by a bot.