linux: 2.6.31-23.75 -proposed tracker

Bug #737663 reported by Brad Figg
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Invalid
Medium
Unassigned
Karmic
Fix Released
Undecided
Unassigned
linux-ec2 (Ubuntu)
Invalid
Undecided
Unassigned
Karmic
Fix Released
Undecided
Unassigned

Bug Description

This bug is for tracking the 2.6.31-23.75 upload package. This bug will contain status and testing results releated to that upload.

Brad Figg (brad-figg)
tags: added: kernel-release-tracking-bug
Changed in linux (Ubuntu):
status: New → In Progress
importance: Undecided → Medium
Revision history for this message
Martin Pitt (pitti) wrote : Please test proposed package

Accepted linux into karmic-proposed, the package will build now and be available in a few hours. Please test and give feedback here. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to enable and use -proposed. Thank you in advance!

Changed in linux (Ubuntu):
status: In Progress → Invalid
Changed in linux (Ubuntu Karmic):
status: New → Fix Committed
Martin Pitt (pitti)
Changed in linux-ec2 (Ubuntu):
status: New → Invalid
Changed in linux-ec2 (Ubuntu Karmic):
status: New → Invalid
Revision history for this message
Pedro Villavicencio (pedro) wrote :

We ran the QA Regression suite on the kernel proposed for Karmic and did not found any regressions with it, full results are available at: https://wiki.ubuntu.com/QATeam/KernelSRU-karmic-2.6.31-23.75 ; Please note that the failures there any scripts related and not regressions, marking this as verification done, thanks all.

tags: added: verification-done
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux - 2.6.31-23.75

---------------
linux (2.6.31-23.75) karmic-proposed; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
    - LP: #737663

  [ Upstream Kernel Changes ]

  * do_exit(): make sure that we run with get_fs() == USER_DS,
    CVE-2010-4258
    - LP: #723945
    - CVE-2010-4258
  * xfs: always use iget in bulkstat
    - LP: #692848
  * x25: Prevent crashing when parsing bad X.25 facilities CVE-2010-4164
    - LP: #731199
    - CVE-2010-4164
  * Revised [CVE-2010-4345 Karmic] install_special_mapping skips
    security_file_mmap check. CVE-2010-4346
    - LP: #731971
    - CVE-2010-4346
  * econet: Fix crash in aun_incoming(). CVE-2010-4342
    - LP: #736394
    - CVE-2010-4342
 -- Brad Figg <email address hidden> Fri, 18 Mar 2011 09:43:00 -0700

Changed in linux (Ubuntu Karmic):
status: Fix Committed → Fix Released
Revision history for this message
nutznboltz (nutznboltz-deactivatedaccount) wrote :

Heh, support ended in April but this gets pushed out in May.

Didn't even have the virtio-net NAPI patch in it.

Would have clobbered my few remaining Karmic systems that depend on that patch. Except my OpsCode Chef management didn't push the update.

I updated my PPA with virtio-net NAPI patch for 9.10 today.

https://launchpad.net/~nutznboltz/+archive/karmic-virtio-napi

Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-ec2 - 2.6.31-308.29

---------------
linux-ec2 (2.6.31-308.29) karmic-proposed; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
    - LP: #737761

  [ Brad Figg ]

  * Rebased to 2.6.31-23.75

  [ Ubuntu: 2.6.31-23.75 ]

  * Release Tracking Bug
    - LP: #737663
  * do_exit(): make sure that we run with get_fs() == USER_DS,
    CVE-2010-4258
    - LP: #723945
    - CVE-2010-4258
  * xfs: always use iget in bulkstat
    - LP: #692848
  * x25: Prevent crashing when parsing bad X.25 facilities CVE-2010-4164
    - LP: #731199
    - CVE-2010-4164
  * Revised [CVE-2010-4345 Karmic] install_special_mapping skips
    security_file_mmap check. CVE-2010-4346
    - LP: #731971
    - CVE-2010-4346
  * econet: Fix crash in aun_incoming(). CVE-2010-4342
    - LP: #736394
    - CVE-2010-4342
 -- Brad Figg <email address hidden> Fri, 18 Mar 2011 11:55:37 -0700

Changed in linux-ec2 (Ubuntu Karmic):
status: Invalid → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.