linux: 3.13.0-132.181 -proposed tracker

Bug #1716634 reported by Stefan Bader on 2017-09-12
26
This bug affects 2 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Medium
Unassigned
Automated-testing
Medium
Canonical Kernel Team
Certification-testing
Medium
Taihsiang Ho
Prepare-package
Medium
Juerg Haefliger
Prepare-package-meta
Medium
Juerg Haefliger
Prepare-package-signed
Medium
Juerg Haefliger
Promote-to-proposed
Medium
Łukasz Zemczak
Promote-to-security
Medium
Łukasz Zemczak
Promote-to-updates
Medium
Łukasz Zemczak
Regression-testing
Medium
Po-Hsu Lin
Security-signoff
Medium
Steve Beattie
Upload-to-ppa-dnu
Medium
Unassigned
Verification-testing
Medium
Po-Hsu Lin
linux (Ubuntu)
Undecided
Unassigned
Trusty
Medium
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

backports: 1716635
derivatives:
-- swm properties --
boot-testing-requested: true
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

Stefan Bader (smb) on 2017-09-12
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: trusty
Changed in linux (Ubuntu Trusty):
status: New → Confirmed
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux (Ubuntu):
status: New → Invalid
Changed in linux (Ubuntu Trusty):
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2017.08.28-3
tags: added: kernel-sru-master-kernel
description: updated
Juerg Haefliger (juergh) on 2017-09-13
summary: - linux: <version to be filled> -proposed tracker
+ linux: 3.13.0-132.181 -proposed tracker
Brad Figg (brad-figg) on 2017-09-13
description: updated
description: updated
Brad Figg (brad-figg) on 2017-09-13
tags: added: block-proposed-trusty
tags: added: block-proposed
description: updated
Po-Hsu Lin (cypressyew) wrote :

Child bugs are marked as verified.

Brad Figg (brad-figg) on 2017-09-14
description: updated
description: updated
Po-Hsu Lin (cypressyew) wrote :

Stefan:
Certification and regression test results should be valid with the previously
uploaded kernels. We will sync results from current to new tracking bugs.

Leveraging the result from 3.13.0-131.180

tags: added: regression-testing-passed
Taihsiang Ho (taihsiangho) wrote :

Hardware Certification have begun testing this -proposed kernel.

Taihsiang Ho (taihsiangho) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/trusty/3.13.0-132.181/trusty-proposed-published.html

tags: added: certification-testing-passed
Brad Figg (brad-figg) on 2017-09-17
tags: removed: block-proposed-trusty
tags: removed: block-proposed
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 3.13.0-132.181

---------------
linux (3.13.0-132.181) trusty; urgency=low

  * linux: 3.13.0-132.181 -proposed tracker (LP: #1716634)

  * CVE-2017-1000251
    - Bluetooth: Properly check L2CAP config option output buffer length

linux (3.13.0-131.180) trusty; urgency=low

  * linux: 3.13.0-131.180 -proposed tracker (LP: #1715439)

  * CVE-2016-7097
    - posix_acl: Clear SGID bit when setting file permissions

  * CVE-2016-9083
    - vfio/pci: Fix integer overflows, bitmask check

  * CVE-2016-9084
    - vfio/pci: Fix integer overflows, bitmask check

  * CVE-2016-9604
    - KEYS: Disallow keyrings beginning with '.' to be joined as session keyrings

  * CVE-2016-9191
    - sysctl: Drop reference added by grab_header in proc_sys_readdir

  * CVE-2016-9178
    - fix minor infoleak in get_user_ex()

  * CVE-2016-8650
    - mpi: Fix NULL ptr dereference in mpi_powm() [ver #3]

  * CVE-2016-10044
    - vfs: Commit to never having exectuables on proc and sysfs.
    - aio: mark AIO pseudo-fs noexec

linux (3.13.0-130.179) trusty; urgency=low

  * linux: 3.13.0-130.179 -proposed tracker (LP: #1713456)

  * CVE-2016-10200
    - l2tp: fix racy SOCK_ZAPPED flag check in l2tp_ip{, 6}_bind()

  * CVE-2016-9754
    - ring-buffer: Prevent overflow of size in ring_buffer_resize()

  * CVE-2017-5970
    - ipv4: keep skb->dst around in presence of IP options

  * CVE-2017-6346
    - packet: fix races in fanout_add()

  * CVE-2017-6214
    - tcp: avoid infinite loop in tcp_splice_read()

  * CVE-2017-6951
    - KEYS: Change the name of the dead type to ".dead" to prevent user access

  * CVE-2017-7472
    - KEYS: fix keyctl_set_reqkey_keyring() to not leak thread keyrings

  * CVE-2017-7187
    - scsi: sg: check length passed to SG_NEXT_CMD_LEN

  * CVE-2017-7541
    - brcmfmac: fix possible buffer overflow in brcmf_cfg80211_mgmt_tx()

  * sort ABI files with C.UTF-8 locale (LP: #1712345)
    - [Packaging] sort ABI files with C.UTF-8 locale

  * Please only recommend or suggest initramfs-tools | linux-initramfs-tool for
    kernels able to boot without initramfs (LP: #1700972)
    - [Debian] Don't depend on initramfs-tools

 -- Juerg Haefliger <email address hidden> Wed, 13 Sep 2017 13:34:29 +0200

Changed in linux (Ubuntu Trusty):
status: Confirmed → Fix Released

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Duplicates of this bug

Other bug subscribers