linux: 3.19.0-75.83 -proposed tracker

Bug #1640613 reported by Luis Henriques on 2016-11-09
10
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Pierre Equoy
Prepare-package
Medium
Luis Henriques
Prepare-package-meta
Medium
Luis Henriques
Prepare-package-signed
Medium
Luis Henriques
Promote-to-proposed
Medium
Steve Langasek
Promote-to-security
Medium
Steve Langasek
Promote-to-updates
Medium
Steve Langasek
Regression-testing
Medium
Po-Hsu Lin
Security-signoff
Medium
Steve Beattie
Upload-to-ppa-dnu
Medium
Unassigned
Verification-testing
Medium
Canonical Kernel Team
linux (Ubuntu)
Undecided
Unassigned
Vivid
Medium
Unassigned

Bug Description

This bug is for tracking the 3.19.0-75.83 upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

-- swm properties --
boot-testing-requested: true
derivative-trackers-created: true
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

CVE References

Luis Henriques (henrix) on 2016-11-09
tags: added: kernel-release-tracking-bug
tags: added: block-proposed-vivid
tags: added: vivid
Changed in linux (Ubuntu Vivid):
status: New → Confirmed
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Vivid):
importance: Undecided → Medium

Backport packages from packages here can be worked on, the following tracking bugs were opened for them:
linux-lts-vivid (14.04.1) - bug 1640621

description: updated
description: updated
Brad Figg (brad-figg) on 2016-11-09
description: updated
description: updated
Brad Figg (brad-figg) on 2016-11-10
description: updated
description: updated
Brad Figg (brad-figg) on 2016-11-10
description: updated
description: updated
Brad Figg (brad-figg) on 2016-11-17
description: updated
description: updated
Po-Hsu Lin (cypressyew) wrote :

As per http://kernel.ubuntu.com/sru/sru-report.html
Looks like there is no bug need to be verified this time.

Pierre Equoy (pieq) wrote :

Hardware Certification have begun testing this -proposed kernel.

Pierre Equoy (pieq) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/vivid/3.19.0-75.83/vivid-proposed-frozen.html

tags: added: certification-testing-passed
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 3.19.0-75.83

---------------
linux (3.19.0-75.83) vivid; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1640613

  * lxc-attach to malicious container allows access to host (LP: #1639345)
    - Revert "UBUNTU: ptrace: being capable wrt a process requires mapped
      uids/gids"
    - (upstream) mm: Add a user_ns owner to mm_struct and fix ptrace permission
      checks

  * CVE-2016-8658
    - brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()

  * CVE-2016-7425
    - scsi: arcmsr: Buffer overflow in arcmsr_iop_message_xfer()

 -- Luis Henriques <email address hidden> Wed, 09 Nov 2016 22:48:56 +0000

Changed in linux (Ubuntu Vivid):
status: Confirmed → Fix Released

The verification of the Stable Release Update for linux has completed successfully and the package has now been released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions.

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers