linux-oem: 4.13.0-1031.35 -proposed tracker

Bug #1776337 reported by Khaled El Mously
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Kernel SRU Workflow
Fix Released
Medium
Unassigned
Automated-testing
Fix Released
Medium
Canonical Kernel Team
Certification-testing
Fix Released
Medium
Taihsiang Ho
Prepare-package
Fix Released
Medium
AceLan Kao
Prepare-package-meta
Fix Released
Medium
AceLan Kao
Prepare-package-signed
Fix Released
Medium
AceLan Kao
Promote-to-proposed
Fix Released
Medium
Łukasz Zemczak
Promote-to-security
Fix Released
Medium
Łukasz Zemczak
Promote-to-updates
Fix Released
Medium
Łukasz Zemczak
Regression-testing
Invalid
Medium
Po-Hsu Lin
Security-signoff
Fix Released
Medium
Canonical Security Team
Upload-to-ppa
Invalid
Medium
Canonical Kernel Team
Verification-testing
Fix Released
Medium
Canonical Kernel Team
linux-oem (Ubuntu)
Invalid
Undecided
Unassigned
Xenial
Fix Released
Undecided
Unassigned

Bug Description

This bug is for tracking the <version to be filled> upload package. This bug will contain status and testing results related to that upload.

For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testing-requested: true
kernel-stable-master-bug: 1776333
phase: Released
proposed-announcement-sent: true
proposed-testing-requested: true

tags: added: kernel-release-tracking-bug
tags: added: kernel-release-tracking-bug-live
tags: added: xenial
Changed in linux-oem (Ubuntu):
status: New → Invalid
Changed in kernel-sru-workflow:
status: New → In Progress
importance: Undecided → Medium
tags: added: kernel-sru-cycle-2018.06.11-1
tags: added: kernel-sru-backport-of-1776333
Andy Whitcroft (apw)
Changed in linux-oem (Ubuntu Xenial):
status: New → Confirmed
Brad Figg (brad-figg)
description: updated
description: updated
AceLan Kao (acelankao)
summary: - linux-oem: <version to be filled> -proposed tracker
+ linux-oem: 4.13.0-1031.34 -proposed tracker
Brad Figg (brad-figg)
description: updated
description: updated
AceLan Kao (acelankao)
summary: - linux-oem: 4.13.0-1031.34 -proposed tracker
+ linux-oem: 4.13.0-1031.35 -proposed tracker
Brad Figg (brad-figg)
tags: added: block-proposed-xenial
tags: added: block-proposed
description: updated
Brad Figg (brad-figg)
description: updated
description: updated
Revision history for this message
Taihsiang Ho (tai271828) wrote :

Hardware Certification have begun testing this -proposed kernel.

Revision history for this message
Taihsiang Ho (tai271828) wrote :

Hardware Certification have completed testing this -proposed kernel. No regressions were observed, results are available here: http://people.canonical.com/~hwcert/sru-testing/oem/4.13.0-1031.35/oem-4.13-proposed-published.html

tags: added: certification-testing-passed
Brad Figg (brad-figg)
tags: removed: block-proposed-xenial
tags: removed: block-proposed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package linux-oem - 4.13.0-1031.35

---------------
linux-oem (4.13.0-1031.35) xenial; urgency=medium

  * linux-oem: 4.13.0-1031.35 -proposed tracker (LP: #1776337)

  * Miscellaneous Ubuntu changes
    - Rebase to 4.13.0-46.51
    - SAUCE: i2c:amd move out pointer in union i2c_event_base

  [ Ubuntu: 4.13.0-46.51 ]

  * linux: 4.13.0-46.51 -proposed tracker (LP: #1776333)
  * register on binfmt_misc may overflow and crash the system (LP: #1775856)
    - fs/binfmt_misc.c: do not allow offset overflow
  * CVE-2018-11508
    - compat: fix 4-byte infoleak via uninitialized struct field
  * rfi-flush: Switch to new linear fallback flush (LP: #1744173)
    - SAUCE: rfi-flush: Factor out init_fallback_flush()
    - SAUCE: rfi-flush: Move rfi_flush_fallback_area to end of paca
    - powerpc/64s: Improve RFI L1-D cache flush fallback
    - powerpc/rfi-flush: Make it possible to call setup_rfi_flush() again
    - powerpc/rfi-flush: Differentiate enabled and patched flush types
    - powerpc/rfi-flush: Call setup_rfi_flush() after LPM migration
  * Fix enabling bridge MMIO windows (LP: #1771344)
    - powerpc/eeh: Fix enabling bridge MMIO windows
  * CVE-2018-1130
    - dccp: check sk for closed state in dccp_sendmsg()
  * CVE-2018-7757
    - scsi: libsas: fix memory leak in sas_smp_get_phy_events()
  * cpum_sf: ensure sample freq is non-zero (LP: #1772593)
    - s390/cpum_sf: ensure sample frequency of perf event attributes is non-zero
  * wlp3s0: failed to remove key (1, ff:ff:ff:ff:ff:ff) from hardware (-22)
    (LP: #1720930)
    - iwlwifi: mvm: fix "failed to remove key" message
  * CVE-2018-6927
    - futex: Prevent overflow by strengthen input validation
  * After update to 4.13-43 Intel Graphics are Laggy (LP: #1773520)
    - SAUCE: Revert "drm/i915/edp: Allow alternate fixed mode for eDP if
      available."
  * ELANPAD ELAN0612 does not work, patch available (LP: #1773509)
    - SAUCE: Input: elan_i2c - add ELAN0612 to the ACPI table
  * kernel backtrace when receiving large UDP packages (LP: #1772031)
    - iov_iter: fix page_copy_sane for compound pages
  * FS-Cache: Assertion failed: FS-Cache: 6 == 5 is false (LP: #1774336)
    - SAUCE: CacheFiles: fix a read_waiter/read_copier race
  * CVE-2018-5803
    - sctp: verify size of a new chunk in _sctp_make_chunk()
  * enable mic-mute hotkey and led on Lenovo M820z and M920z (LP: #1774306)
    - ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs
  * CVE-2018-7755
    - SAUCE: floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
  * CVE-2018-5750
    - ACPI: sbshc: remove raw pointer from printk() message

 -- Chia-Lin Kao (AceLan) <email address hidden> Wed, 20 Jun 2018 14:04:03 +0800

Changed in linux-oem (Ubuntu Xenial):
status: Confirmed → Fix Released
Revision history for this message
Brad Figg (brad-figg) wrote : Package Released!

The package has been published and the bug is being set to Fix Released

Changed in kernel-sru-workflow:
status: In Progress → Fix Released
description: updated
description: updated
tags: removed: kernel-release-tracking-bug-live
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.