linux-lts-vivid: 3.19.0-65.73~14.04.1 -proposed tracker

Bug #1596643 reported by Brad Figg on 2016-06-27
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Yung Shen
Prepare-package
Medium
Ben Romer
Prepare-package-meta
Medium
Ben Romer
Prepare-package-signed
Medium
Ben Romer
Promote-to-proposed
Medium
Andy Whitcroft
Promote-to-security
Medium
Andy Whitcroft
Promote-to-updates
Medium
Andy Whitcroft
Regression-testing
Medium
Canonical Kernel Team
Security-signoff
Medium
Steve Beattie
Verification-testing
Medium
Canonical Kernel Team
linux-lts-vivid (Ubuntu)
Undecided
Unassigned
Trusty
Medium
Unassigned

Bug Description

This bug is for tracking the 3.19.0-65.73~14.04.1 upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
derivative-trackers-created: true
kernel-stable-master-bug: 1596631
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

Brad Figg (brad-figg) on 2016-06-27
tags: added: kernel-release-tracking-bug
tags: added: block-proposed-trusty
tags: added: trusty
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-lts-vivid (Ubuntu):
status: New → Invalid
Changed in linux-lts-vivid (Ubuntu Trusty):
importance: Undecided → Medium
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-28
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-29
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-30
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-30
description: updated
description: updated
Brad Figg (brad-figg) on 2016-06-30
description: updated
description: updated

Here's the relevant information:

 trusty linux-lts-vivid 3.19.0-65.73~14.04.1 REGR summary<REGN: 1 FAIL: 69 GOOD: 68>

Please verify test results in http://people.canonical.com/~kernel/status/adt-matrix/overall.txt

Yung Shen (kaxing) wrote :

Hardware Certification have begun testing this -proposed kernel.

Yung Shen (kaxing) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/trusty/3.19.0-65.73~14.04.1/trusty-3.19-proposed-frozen.html

tags: added: certification-testing-passed
Steve Beattie (sbeattie) wrote :

USN Needed

Brad Figg (brad-figg) on 2016-07-14
tags: added: regression-testing-passed
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-lts-vivid - 3.19.0-65.73~14.04.1

---------------
linux-lts-vivid (3.19.0-65.73~14.04.1) trusty; urgency=low

  [ Ben Romer ]

  * Release Tracking Bug
    - LP: #1596643

  [ Josh Boyer ]

  * SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module
    loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI
    - LP: #1566221
  * SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot
    - LP: #1571691
  * SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode
    - LP: #1571691

  [ Matthew Garrett ]

  * SAUCE: UEFI: Add secure_modules() call
    - LP: #1566221
  * SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled
    - LP: #1566221
  * SAUCE: UEFI: x86: Lock down IO port access when module security is
    enabled
    - LP: #1566221
  * SAUCE: UEFI: ACPI: Limit access to custom_method
    - LP: #1566221
  * SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading
    is restricted
    - LP: #1566221
  * SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is
    restricted
    - LP: #1566221
  * SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module
    loading restrictions
    - LP: #1566221
  * SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted
    - LP: #1566221
  * SAUCE: UEFI: Add option to automatically enforce module signatures when
    in Secure Boot mode
    - LP: #1566221

  [ Stefan Bader ]

  * [Config] Add pm80xx scsi driver to d-i
    - LP: #1595628

  [ Tim Gardner ]

  * [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y
  * SAUCE: UEFI: Display MOKSBState when disabled
    - LP: #1571691
  * SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl
    - LP: #1593075

  [ Upstream Kernel Changes ]

  * HID: core: prevent out-of-bound readings
    - LP: #1579190
  * mm: migrate dirty page without clear_page_dirty_for_io etc
    - LP: #1581865
    - CVE-2016-3070

 -- Benjamin M Romer <email address hidden> Mon, 27 Jun 2016 12:37:48 -0400

Changed in linux-lts-vivid (Ubuntu Trusty):
status: New → Fix Released

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers