linux-raspi2: 4.2.0-1032.42 -proposed tracker

Bug #1591458 reported by Brad Figg on 2016-06-11
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Yung Shen
Prepare-package
Medium
Kamal Mostafa
Prepare-package-meta
Medium
Kamal Mostafa
Promote-to-proposed
Medium
Chris J Arges
Promote-to-security
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Upload-to-ppa-dnu
Medium
Canonical Kernel Team
Verification-testing
Medium
Canonical Kernel Team
linux-raspi2 (Ubuntu)
Undecided
Unassigned
Wily
Medium
Unassigned

Bug Description

This bug is for tracking the 4.2.0-1032.42 upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
derivative-trackers-created: true
kernel-stable-master-bug: 1591301
phase: Uploaded

This tracking bug was opened to be worked from linux-4.2.0-39.46 update (bug 1591301)

tags: added: kernel-release-tracking-bug
tags: added: block-proposed-wily
tags: added: wily
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-raspi2 (Ubuntu):
status: New → Invalid
Changed in linux-raspi2 (Ubuntu Wily):
importance: Undecided → Medium
summary: - linux-raspi2: <version to be filled> -proposed tracker
+ linux-raspi2: 4.2.0-1032.42 -proposed tracker
description: updated
Brad Figg (brad-figg) on 2016-06-13
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-13
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-13
description: updated

 linux-raspi2 | 4.2.0-1032.42 | wily-proposed/universe | source
 linux-meta-raspi2 | 4.2.0.1032.35 | wily-proposed/universe | source

Here's the relevant information:

 wily linux-raspi2 4.2.0-1032.42 REGR summary<REGN: 1 MISS: 13 FAIL: 13 GOOD: 9>

Please verify test results in http://people.canonical.com/~kernel/status/adt-matrix/overall.txt

Steve Beattie (sbeattie) wrote :

USN needed.

Yung Shen (kaxing) wrote :

Hardware Certification have begun testing this -proposed kernel.

Yung Shen (kaxing) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/raspi2/4.2.0-1032.42/raspi2-wily-proposed.html

tags: added: certification-testing-passed
Launchpad Janitor (janitor) wrote :
Download full text (7.4 KiB)

This bug was fixed in the package linux-raspi2 - 4.2.0-1033.43

---------------
linux-raspi2 (4.2.0-1033.43) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1595920
  * rebased on Ubuntu-4.2.0-41.48

  [ Ubuntu: 4.2.0-41.48 ]

  * Release Tracking Bug
    - LP: #1595914
  * netfilter: x_tables: validate e->target_offset early
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: make sure e->next_offset covers remaining blob
    size
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: fix unconditional helper
    - LP: #1555338
    - CVE-2016-3134
  * netfilter: x_tables: don't move to non-existent next rule
    - LP: #1595350
  * netfilter: x_tables: validate targets of jumps
    - LP: #1595350
  * netfilter: x_tables: add and use xt_check_entry_offsets
    - LP: #1595350
  * netfilter: x_tables: kill check_entry helper
    - LP: #1595350
  * netfilter: x_tables: assert minimum target size
    - LP: #1595350
  * netfilter: x_tables: add compat version of xt_check_entry_offsets
    - LP: #1595350
  * netfilter: x_tables: check standard target size too
    - LP: #1595350
  * netfilter: x_tables: check for bogus target offset
    - LP: #1595350
  * netfilter: x_tables: validate all offsets and sizes in a rule
    - LP: #1595350
  * netfilter: x_tables: don't reject valid target size on some
    architectures
    - LP: #1595350
  * netfilter: arp_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: ip_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: ip6_tables: simplify translate_compat_table args
    - LP: #1595350
  * netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
    - LP: #1595350
  * netfilter: x_tables: do compat validation via translate_table
    - LP: #1595350
  * netfilter: x_tables: introduce and use xt_copy_counters_from_user
    - LP: #1595350

  [ Ubuntu: 4.2.0-40.47 ]

  * Release Tracking Bug
    - LP: #1595725
  * SAUCE: add a sysctl to disable unprivileged user namespace unsharing
    - LP: #1555338, #1595350

linux-raspi2 (4.2.0-1032.42) wily; urgency=low

  [ Kamal Mostafa ]

  * Release Tracking Bug
    - LP: #1591458

  [ Ubuntu: 4.2.0-39.46 ]

  * SAUCE: AUFS: mm/mmap: fix oopsing on remap_file_pages aufs mmap:
    bugfix, mainly for linux-4.5-rc5, remap_file_pages(2) emulation
    - LP: #1558120
  * [debian] getabis: Only git add $abidir if running in local repo
    - LP: #1584890
  * [debian] getabis: Fix inconsistent compiler versions check
    - LP: #1584890
  * Revert "SAUCE: mm/mmap: fix oopsing on remap_file_pages"
    - LP: #1558120
  * [Config] Remove arc4 from nic-modules
    - LP: #1582991
  * Revert "usb: hub: do not clear BOS field during reset device"
    - LP: #1582864
  * hpsa: move lockup_detected attribute to host attr
    - LP: #1581169
  * ALSA: timer: Fix leak in SNDRV_TIMER_IOCTL_PARAMS
    - LP: #1580379
    - CVE-2016-4569
  * ALSA: timer: Fix leak in events via snd_timer_user_ccallback
    - LP: #1581866
    - CVE-2016-4578
  * ALSA: timer: Fix leak in events via snd_timer_user_tinterrupt
    - LP: #1581866
    - CVE-2016-4578
  * net: fix a kernel infoleak in x25 module
 ...

Read more...

Changed in linux-raspi2 (Ubuntu Wily):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers