linux-azure-edge: 4.14.0-1003.3 -proposed tracker

Bug #1741962 reported by Marcelo Cerri
28
This bug affects 3 people
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Invalid
Medium
Canonical Kernel Team
Certification-testing
Invalid
Medium
Canonical Hardware Certification
Prepare-package
Fix Released
Medium
Marcelo Cerri
Prepare-package-meta
Fix Released
Medium
Marcelo Cerri
Promote-to-proposed
Fix Released
Medium
Steve Langasek
Promote-to-security
Fix Released
Medium
Steve Langasek
Promote-to-updates
Fix Released
Medium
Steve Langasek
Regression-testing
Invalid
Medium
Canonical Kernel Team
Security-signoff
Fix Released
Medium
Canonical Security Team
Upload-to-ppa
Invalid
Medium
Canonical Kernel Team
Verification-testing
Invalid
Medium
Canonical Kernel Team
linux-azure-edge (Ubuntu)
Invalid
Undecided
Unassigned
Xenial
Fix Released
Undecided
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1741955
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

Marcelo Cerri (mhcerri)
tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: xenial
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
Changed in linux-azure-edge (Ubuntu):
status: New → Invalid
tags: added: kernel-sru-cycle-2017.11.20-6
tags: added: kernel-sru-backport-of-1741955
Revision history for this message
Launchpad Janitor (janitor) wrote :

Status changed to 'Confirmed' because the bug affects multiple users.

Changed in linux-azure-edge (Ubuntu Xenial):
status: New → Confirmed
Brad Figg (brad-figg)
description: updated
description: updated
Marcelo Cerri (mhcerri)
summary: - linux-azure-edge: <version to be filled> -proposed tracker
+ linux-azure-edge: 4.14.0-1003.3 -proposed tracker
Brad Figg (brad-figg)
description: updated
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Revision history for this message
Launchpad Janitor (janitor) wrote :
Download full text (84.8 KiB)

This bug was fixed in the package linux-azure-edge - 4.14.0-1003.3

---------------
linux-azure-edge (4.14.0-1003.3) xenial; urgency=low

  * linux-azure-edge: 4.14.0-1003.3 -proposed tracker (LP: #1741962)

  * ubuntu/xr-usb-serial didn't get built in zesty and artful (LP: #1733281)
    - ubuntu: Only build ubuntu/xr-usb-serial when USB is enabled

  * CVE-2017-5754
    - [Config] azure-edge: CONFIG_PAGE_TABLE_ISOLATION=y

  [ Ubuntu: 4.14.0-16.19 ]

  * linux: 4.14.0-16.19 -proposed tracker (LP: #1741920)
  * Miscellaneous upstream changes
    - x86/mm: Set MODULES_END to 0xffffffffff000000
    - x86/mm: Map cpu_entry_area at the same place on 4/5 level
    - x86/kaslr: Fix the vaddr_end mess
    - x86/events/intel/ds: Use the proper cache flush method for mapping ds
      buffers
    - x86/tlb: Drop the _GPL from the cpu_tlbstate export
    - x86/alternatives: Add missing '\n' at end of ALTERNATIVE inline asm
    - x86/pti: Rename BUG_CPU_INSECURE to BUG_CPU_MELTDOWN

  [ Ubuntu: 4.14.0-15.18 ]

  * linux: 4.14.0-15.18 -proposed tracker (LP: #1741501)
  * [0cf3:e010] QCA6174A XR failed to pair with bt 4.0 device (LP: #1741166)
    - SAUCE: Bluetooth: btusb: Add support for 0cf3:e010
  * [Zesty/Artful] On ARM64 PCIE physical function passthrough guest fails to
    boot (LP: #1732804)
    - vfio/pci: Virtualize Maximum Read Request Size
  * elantech touchpad of Lenovo L480/580 failed to detect hw_version
    (LP: #1733605)
    - SAUCE: Input: elantech - add new icbody type 15
  * External HDMI monitor failed to show screen on Lenovo X1 series
    (LP: #1738523)
    - SAUCE: drm/i915: Disable writing of TMDS_OE on Lenovo ThinkPad X1 series
  * Bionic update to v4.14.12 stable release (LP: #1741496)
    - exec: Weaken dumpability for secureexec
    - capabilities: fix buffer overread on very short xattr
    - x86/cpu, x86/pti: Do not enable PTI on AMD processors
    - x86/pti: Make sure the user/kernel PTEs match
    - x86/dumpstack: Fix partial register dumps
    - x86/dumpstack: Print registers for first stack frame
    - x86/pti: Switch to kernel CR3 at early in entry_SYSCALL_compat()
    - x86/process: Define cpu_tss_rw in same section as declaration
    - Revert "xfrm: Fix stack-out-of-bounds read in xfrm_state_find."
    - rtc: m41t80: m41t80_sqw_set_rate should return 0 on success
    - rtc: m41t80: fix m41t80_sqw_round_rate return value
    - rtc: m41t80: avoid i2c read in m41t80_sqw_recalc_rate
    - rtc: m41t80: avoid i2c read in m41t80_sqw_is_prepared
    - rtc: m41t80: remove unneeded checks from m41t80_sqw_set_rate
    - Linux 4.14.12

  [ Ubuntu: 4.14.0-14.17 ]

  * linux: 4.14.0-14.17 -proposed tracker (LP: #1741139)
  * Miscellaneous Ubuntu changes
    - [Debian] autoreconstruct - add resoration of execute permissions
  * hisi_sas: driver robustness fixes (LP: #1739807)
    - scsi: hisi_sas: fix internal abort slot timeout bug
    - scsi: hisi_sas: us start_phy in PHY_FUNC_LINK_RESET
    - scsi: hisi_sas: fix NULL check in SMP abort task path
    - scsi: hisi_sas: complete all tasklets prior to host reset
  * Falkor erratum 1041 needs workaround (LP: #1738497)
    - arm64: Define cputype macros for Falkor CPU
    - arm64: Add ...

Changed in linux-azure-edge (Ubuntu Xenial):
status: Confirmed → Fix Released
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Duplicates of this bug

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.