linux: 4.2.0-28.33 -proposed tracker

Bug #1540634 reported by Brad Figg
This bug report is a duplicate of:  Bug #1543167: linux: 4.2.0-29.34 -proposed tracker. Edit Remove
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
In Progress
Medium
Unassigned
Automated-testing
Incomplete
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Brad Figg
Prepare-package-meta
Fix Released
Medium
Brad Figg
Prepare-package-signed
Fix Released
Medium
Brad Figg
Promote-to-proposed
Fix Released
Medium
Chris J Arges
Promote-to-security
New
Medium
Ubuntu Stable Release Updates Team
Promote-to-updates
New
Medium
Ubuntu Stable Release Updates Team
Regression-testing
Confirmed
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Steve Beattie
Verification-testing
In Progress
Medium
Canonical Kernel Team
linux (Ubuntu)
New
Medium
Unassigned
Wily
Fix Released
Medium
Unassigned

Bug Description

This bug is for tracking the 4.2.0-28.33 upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Monday, 01. February 2016 21:39 UTC
kernel-stable-Prepare-package-end:Tuesday, 02. February 2016 11:04 UTC
kernel-stable-Promote-to-proposed-start:Tuesday, 02. February 2016 11:04 UTC
kernel-stable-Promote-to-proposed-end:Thursday, 04. February 2016 22:03 UTC
kernel-stable-phase:Verification & Testing
kernel-stable-phase-changed:Friday, 05. February 2016 00:03 UTC
kernel-stable-Verification-testing-start:Friday, 05. February 2016 00:03 UTC
kernel-stable-Certification-testing-start:Friday, 05. February 2016 00:04 UTC
kernel-stable-Security-signoff-start:Friday, 05. February 2016 00:04 UTC
proposed-announcement-sent:True
kernel-stable-Regression-testing-start:Friday, 05. February 2016 00:04 UTC
kernel-stable-Security-signoff-end:Friday, 05. February 2016 11:00 UTC

CVE References

Brad Figg (brad-figg)
tags: added: kernel-release-tracking-bug
tags: added: block-proposed
tags: added: block-proposed-wily
tags: added: wily
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux (Ubuntu):
importance: Undecided → Medium
Changed in linux (Ubuntu Wily):
importance: Undecided → Medium
Revision history for this message
Brad Figg (brad-figg) wrote : Packages available

All builds are complete, packages in this bug can be copied to -proposed.

Backport packages from packages here can be worked on, the following tracking bugs were opened for them:
linux-lts-wily (14.04.1) - bug 1540864

It was not possible to create or handle the tracking bugs for the following packages (their tracking bugs based on this update must be handled manually):
linux-raspi2

description: updated
Revision history for this message
Chris J Arges (arges) wrote : Promoted to Proposed

 linux | 4.2.0-28.33 | wily-proposed | source
 linux-meta | 4.2.0.28.30 | wily-proposed | source
 linux-signed | 4.2.0-28.33 | wily-proposed | source

Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : Automated-Testing regression

Here's the relevant information:

 wily linux 4.2.0-28.33 REGR summary<REGN: 2 MISS: 53 FAIL: 12 GOOD: 85>

Please verify test results in http://people.canonical.com/~kernel/status/adt-matrix/overall.txt

description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : dwalin (amd64) - tests ran: 2, failed: 0
Revision history for this message
Steve Beattie (sbeattie) wrote :

Needs USN for CVE-2013-4312 at least.

Brad Figg (brad-figg)
description: updated
Revision history for this message
Brad Figg (brad-figg) wrote : dagmar (i386) - tests ran: 167, failed: 1
Adam Conrad (adconrad)
tags: removed: block-proposed
Revision history for this message
Luis Henriques (henrix) wrote :

I am invalidating this task as the wily kernel is being respun.

Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (43.7 KiB)

This bug was fixed in the package linux - 4.2.0-30.35

---------------
linux (4.2.0-30.35) wily; urgency=low

  [ Seth Forshee ]

  * SAUCE: cred: Add clone_cred() interface
    - LP: #1531747, #1534961, #1535150
    - CVE-2016-1575 CVE-2016-1576
  * SAUCE: overlayfs: Use mounter's credentials instead of selectively
    raising caps
    - LP: #1531747, #1534961, #1535150
    - CVE-2016-1575 CVE-2016-1576
  * SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.*
    xattrs
    - LP: #1531747, #1534961, #1535150
    - CVE-2016-1575 CVE-2016-1576
  * SAUCE: overlayfs: Be more careful about copying up sxid files
    - LP: #1534961, #1535150
    - CVE-2016-1575 CVE-2016-1576
  * SAUCE: overlayfs: Propogate nosuid from lower and upper mounts
    - LP: #1534961, #1535150
    - CVE-2016-1575 CVE-2016-1576

linux (4.2.0-29.34) wily; urgency=low

  [ Luis Henriques ]

  * Release Tracking Bug
    - LP: #1543167

  [ Brad Figg ]

  * Revert "SAUCE: apparmor: fix sleep from invalid context"
    - LP: #1542049

  [ Upstream Kernel Changes ]

  * Revert "af_unix: Revert 'lock_interruptible' in stream receive code"
    - LP: #1540731

linux (4.2.0-28.33) wily; urgency=low

  [ Brad Figg ]

  * Release Tracking Bug
    - LP: #1540634

  [ Brad Figg ]

  * CONFIG: CONFIG_DEBUG_UART_BCM63XX is not set

  [ J. R. Okajima ]

  * SAUCE: ubuntu: aufs: tiny, extract a new func xino_fwrite_wkq()
    - LP: #1533043
  * SAUCE: ubuntu: aufs: for 4.3, XINO handles EINTR from the dying process
    - LP: #1533043

  [ John Johansen ]

  * SAUCE: (no-up): apparmor: fix for failed mediation of socket that is
    being shutdown
    - LP: #1446906
  * SAUCE: apparmor: fix sleep from invalid context
    - LP: #1539349

  [ Tim Gardner ]

  * [Config] Add pvpanic to virtual flavour
    - LP: #1537923

  [ Upstream Kernel Changes ]

  * Revert "ACPI / LPSS: allow to use specific PM domain during ->probe()"
    - LP: #1540532
  * tools: Add a "make all" rule
    - LP: #1536370
  * vf610_adc: Fix internal temperature calculation
    - LP: #1536370
  * iio: lpc32xx_adc: fix warnings caused by enabling unprepared clock
    - LP: #1536370
  * iio:ad5064: Make sure ad5064_i2c_write() returns 0 on success
    - LP: #1536370
  * iio: ad5064: Fix ad5629/ad5669 shift
    - LP: #1536370
  * iio:ad7793: Fix ad7785 product ID
    - LP: #1536370
  * iio: adc: vf610_adc: Fix division by zero error
    - LP: #1536370
  * mmc: mmc: Improve reliability of mmc_select_hs200()
    - LP: #1536370
  * mmc: mmc: Fix HS setting in mmc_select_hs400()
    - LP: #1536370
  * mmc: mmc: Move mmc_switch_status()
    - LP: #1536370
  * mmc: mmc: Improve reliability of mmc_select_hs400()
    - LP: #1536370
  * crypto: qat - don't use userspace pointer
    - LP: #1536370
  * iio: si7020: Swap data byte order
    - LP: #1536370
  * iio: adc: xilinx: Fix VREFN scale
    - LP: #1536370
  * ipmi: Start the timer and thread on internal msgs
    - LP: #1536370
  * drm/i915: quirk backlight present on Macbook 4, 1
    - LP: #1536370
  * drm/i915: get runtime PM reference around GEM set_caching IOCTL
    - LP: #1536370
  * drm/radeon: Disable uncacheable CPU mappings of GTT with RV6xx
    - LP: #1536370
  *...

Changed in linux (Ubuntu Wily):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.