[Bug 2100256] Re: plucky/linux-azure: 6.14.0-1002.2 -proposed tracker

Launchpad Bug Tracker 2100256 at bugs.launchpad.net
Tue Mar 11 19:15:50 UTC 2025


This bug was fixed in the package linux-azure - 6.14.0-1002.2

---------------
linux-azure (6.14.0-1002.2) plucky; urgency=medium

  * plucky/linux-azure: 6.14.0-1002.2 -proposed tracker (LP: #2100256)

  * Miscellaneous Ubuntu changes
    - document dropped azure SAUCE patches during Ubuntu-6.14.0-5.5 rebase
    - [packaging] split flavour-control.stub
    - [Packaging] bump to 6.14
    - [Config] updateconfigs following Ubuntu-6.14.0-5.5 rebase
    - [Packaging] debian.aws/dkms-versions -- update zfs version

  [ Ubuntu: 6.14.0-5.5 ]

  * plucky/linux: 6.14.0-5.5 -proposed tracker (LP: #2100254)
  * Miscellaneous Ubuntu changes
    - [Packaging] Sync riscv64.mk with linux-riscv tree
    - [Packaging] clean up the distclean rule
    - [Config] updateconfigs following v6.14-rc4 rebase

  [ Ubuntu: 6.14.0-4.4 ]

  * plucky/linux: 6.14.0-4.4 -proposed tracker (LP: #2098875)
  * Packaging resync (LP: #1786013)
    - [Packaging] debian.master/dkms-versions -- update from kernel-versions
      (main/d2025.02.11)
  * update apparmor and LSM stacking patch set (LP: #2028253)
    - SAUCE: apparmor4.0.0 [1/53]: Stacking: Audit: Create audit_stamp structure
    - SAUCE: apparmor4.0.0 [2/53]: Stacking: Audit: Allow multiple records in an
      audit_buffer
    - SAUCE: apparmor4.0.0 [3/53]: Stacking: LSM: security_lsmblob_to_secctx
      module selection
    - SAUCE: apparmor4.0.0 [4/53]: Stacking: Audit: Add record for multiple task
      security contexts
    - SAUCE: apparmor4.0.0 [5/53]: Stacking: Audit: multiple subject lsm values
      for netlabel
    - SAUCE: apparmor4.0.0 [6/53]: Stacking: Audit: Add record for multiple object
      contexts
    - SAUCE: apparmor4.0.0 [7/53]: Stacking: LSM: Single calls in secid hooks
    - SAUCE: apparmor4.0.0 [8/53]: Stacking: LSM: Exclusive secmark usage
    - SAUCE: apparmor4.0.0 [9/53]: Stacking: Audit: Call only the first of the
      audit rule hooks
    - SAUCE: apparmor4.0.0 [10/53]: Stacking: AppArmor: Remove the exclusive flag
    - SAUCE: apparmor4.0.0 [11/53]: 6.15 apparmor-next: apparmor: Use str_yes_no()
      helper function
    - SAUCE: apparmor4.0.0 [12/53]: 6.15 apparmor-next: apparmor: Improve debug
      print infrastructure
    - SAUCE: apparmor4.0.0 [13/53]: 6.15 apparmor-next: apparmor: cleanup:
      attachment perm lookup to use lookup_perms()
    - SAUCE: apparmor4.0.0 [14/53]: 6.15 apparmor-next: apparmor: remove redundant
      unconfined check.
    - SAUCE: apparmor4.0.0 [15/53]: 6.15 apparmor-next: apparmor: switch signal
      mediation to use RULE_MEDIATES
    - SAUCE: apparmor4.0.0 [16/53]: 6.15 apparmor-next: apparmor: ensure labels
      with more than one entry have correct flags
    - SAUCE: apparmor4.0.0 [17/53]: 6.15 apparmor-next: apparmor: remove explicit
      restriction that unconfined cannot use change_hat
    - SAUCE: apparmor4.0.0 [18/53]: 6.15 apparmor-next: apparmor: cleanup:
      refactor file_perm() to doc semantics of some checks
    - SAUCE: apparmor4.0.0 [19/53]: 6.15 apparmor-next: apparmor: carry mediation
      check on label
    - SAUCE: apparmor4.0.0 [20/53]: 6.15 apparmor-next: apparmor: add additional
      flags to extended permission.
    - SAUCE: apparmor4.0.0 [21/53]: 6.15 apparmor-next: apparmor: add support for
      profiles to define the kill signal
    - SAUCE: apparmor4.0.0 [22/53]: 6.15 apparmor-next: apparmor: fix
      x_table_lookup when stacking is not the first entry
    - SAUCE: apparmor4.0.0 [23/53]: 6.15 apparmor-next: apparmor: add ability to
      mediate caps with policy state machine
    - SAUCE: apparmor4.0.0 [24/53]: 6.15 apparmor-next: apparmor: remove af_select
      macro
    - SAUCE: apparmor4.0.0 [25/53]: 6.15 apparmor-next: apparmor: lift kernel
      socket check out of critical section
    - SAUCE: apparmor4.0.0 [26/53]: 6.15 apparmor-next: apparmor: in preparation
      for finer networking rules rework match_prot
    - SAUCE: apparmor4.0.0 [27/53]: 6.15 apparmor-next: apparmor: add fine grained
      af_unix mediation
    - SAUCE: apparmor4.0.0 [28/53]: 6.15 apparmor-next: apparmor: gate make fine
      grained unix mediation behind v9 abi
    - SAUCE: apparmor4.0.0 [29/53]: 6.15 apparmor-next: apparmor: fix dbus
      permission queries to v9 ABI
    - SAUCE: apparmor4.0.0 [30/53]: 6.15 apparmor-next: apparmor: Fix checking
      address of an array in accum_label_info()
    - SAUCE: apparmor4.0.0 [31/53]: 6.15 apparmor-next: apparmor: Modify
      mismatched function name
    - SAUCE: apparmor4.0.0 [32/53]: 6.15 apparmor-next: apparmor: Modify
      mismatched function name
    - SAUCE: apparmor4.0.0 [33/53]: 6.15 apparmor-next: apparmor: fix typos and
      spelling errors
    - SAUCE: apparmor4.0.0 [34/53]: 6.15 apparmor-next: apparmor: use the
      condition in AA_BUG_FMT even with debug disabled
    - SAUCE: apparmor4.0.0 [35/53]: 6.15 apparmor-next: apparmor: Remove unused
      variable 'sock' in __file_sock_perm()
    - SAUCE: apparmor4.0.0 [36/53]: Revert "6.15 apparmor-next: apparmor: fix dbus
      permission queries to v9 ABI"
    - SAUCE: apparmor4.0.0 [37/53]: Revert "6.15 apparmor-next: apparmor: gate
      make fine grained unix mediation behind v9 abi"
    - SAUCE: apparmor4.0.0 [38/53]: patch to provide compatibility with v2.x net
      rules
    - SAUCE: apparmor4.0.0 [39/53]: apparmor: make debug_values_table static
    - SAUCE: apparmor4.0.0 [40/53]: apparmor: Document that label must be last
      member in struct aa_profile
    - SAUCE: apparmor4.0.0 [41/53]: apparmor: transition from a list of rules to a
      vector of rules
    - SAUCE: apparmor4.0.0 [42/53]: setup slab cache for audit data
    - SAUCE: apparmor4.0.0 [43/53]: add the ability for profiles to have a
      learning cache
    - SAUCE: apparmor4.0.0 [44/53]: add unprivileged user ns mediation
    - SAUCE: apparmor4.0.0 [45/53]: Add sysctls for additional controls of unpriv
      userns restrictions
    - SAUCE: apparmor4.0.0 [47/53]: apparmor: open userns related sysctl so lxc
      can check if restriction are in place
    - SAUCE: apparmor4.0.0 [48/53]: apparmor: allow profile to be transitioned
      when a userns is created
    - SAUCE: apparmor4.0.0 [49/53]: Add fine grained mediation of posix mqueues
    - SAUCE: apparmor4.0.0 [51/53]: apparmor: add fine grained ipv4/ipv6 mediation
    - SAUCE: apparmor4.0.0 [52/53]: add io_uring mediation
    - SAUCE: apparmor4.0.0 [53/53]: enable userspace upcall for mediation
    - [Config] disable CONFIG_SECURITY_APPARMOR_RESTRICT_USERNS
  * update apparmor and LSM stacking patch set (LP: #2028253) // [FFe]
    apparmor-4.0.0-alpha2 for unprivileged user namespace restrictions in mantic
    (LP: #2032602)
    - SAUCE: apparmor4.0.0 [46/53]: userns - make it so special unconfined
      profiles can mediate user namespaces
  * Miscellaneous Ubuntu changes
    - [Packaging] disable signing for ppc64el
    - [Packaging] disable signing for s390x
    - [packaging] rename to linux
    - [Config] update RUSTC version
    - [packaging] remove $(wildcard $(DEBIAN)/control.d/*) dependency
    - [packaging] avoid piping control-create for error detection
    - [packaging] split flavour-control.stub
    - [packaging] generate debian/control with correct signed/unsigned
    - [packaging] remove DESC and =HUMAN= substitution
    - [Packaging] remove unnecessary dependency on control.stub
    - [Packaging] add .gitignore and clean more files
    - SAUCE: apparmor4.0.0 [50/53]: apparmor: audit mqueue-via-path access as
      getattr instead of unlink
    - [Packaging] debian.master/dkms-versions -- remove ipu6-drivers,
      ipu7-drivers, backport-iwlwifi-dkms and mofed-modules-24.10 FTBFS

  [ Ubuntu: 6.14.0-3.3 ]

  * plucky/linux-unstable: 6.14.0-3.3 -proposed tracker (LP: #2098836)
  * RISC-V kernel config is out of sync with other archs (LP: #1981437)
    - [Config] riscv64: Sync config with other architectures
  * Miscellaneous Ubuntu changes
    - SAUCE: platform/x86: int3472: fixup s/polarity/gpio_flags/
    - [Config] riscv64: Disable CONFIG_ARCH_RENESAS
    - [Config] riscv64: Disable Andes vendor extensions
    - [Config] riscv64: Set CONFIG_MMC_SPI=m like other architectures
    - [Config] riscv64: Enable Svpbmt support
    - [Config] riscv64: Disable kernel compression
    - [packaging] enable ppc64el signing
    - [Config] updateconfigs

  [ Ubuntu: 6.14.0-2.2 ]

  * plucky/linux-unstable: 6.14.0-2.2 -proposed tracker (LP: #2097828)
  * Miscellaneous Ubuntu changes
    - [Config] updateconfigs following v6.14-rc2 rebase
  * Miscellaneous upstream changes
    - Revert "UBUNTU: [Packaging] Build all packages for linux-unstable"

  [ Ubuntu: 6.14.0-1.1 ]

  * [25.04 FEAT] In-kernel crypto support MSA 11 HMAC (LP: #2096812)
    - [Config] Change CONFIG_CRYPTO_HMAC_S390 to m for s390x
  * Miscellaneous Ubuntu changes
    - Update dropped.txt (MODVERSION patches for Rust)
    - [Config] updateconfigs following v6.14-rc1 rebase
    - SAUCE: binder: turn into module - list_lru_add()/list_lru_del()
    - SAUCE: binder: turn into module - lock_vma_under_rcu()
    - [Config] temporarily disable DRM_HISI_HIBMC, FTBFS
    - dkms: remove zfs, FTBFS
    - [Config] armhf: disable TEGRA210_ADMA, FTBFS

  [ Ubuntu: 6.13.0-2.2 ]

  * plucky/linux-unstable: 6.13.0-2.2 -proposed tracker (LP: #2096822)
  * Failed to probe for OVTI02C1: chip id mismatch: 560243!=0 (LP: #2090932)
    - SAUCE: ACPI: scan: Update HID for new platform
  * Miscellaneous Ubuntu changes
    - [Packaging]: Fix linux-bpf-dev build error for non-main kernels
    - [Packaging] perf: enable debuginfod support
    - [Config] toolchain version update

  [ Ubuntu: 6.13.0-1.1 ]

  * plucky/linux-unstable: 6.13.0-1.1 -proposed tracker (LP: #2096776)
  * Miscellaneous Ubuntu changes
    - [Packaging] Rename to linux-unstable, bump version
    - [Config] updateconfigs following v6.13 rebase
    - [Config] toolchain version update

  [ Ubuntu: 6.13.0-0.0 ]

  * Dummy entry.

 -- Paolo Pisati <paolo.pisati at canonical.com>  Thu, 27 Feb 2025 17:13:53
+0100

** Changed in: linux-azure (Ubuntu Plucky)
       Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Package Archive Administrators, which is a bug assignee.
https://bugs.launchpad.net/bugs/2100256

Title:
  plucky/linux-azure: 6.14.0-1002.2 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/canonical-signing-jobs/task00/+bug/2100256/+subscriptions




More information about the ubuntu-archive mailing list