This bug was fixed in the package linux-azure - 4.18.0-1011.11 --------------- linux-azure (4.18.0-1011.11) cosmic; urgency=medium
* linux-azure: 4.18.0-1011.11 -proposed tracker (LP: #1816081) * 4.15.0-1037 does not see all PCI devices on GPU VMs (LP: #1816106) - Revert "PCI: hv: Make sure the bus domain is really unique" linux-azure (4.18.0-1009.9) cosmic; urgency=medium * Allow I/O schedulers to be loaded with modprobe in linux-azure (LP: #1813211) - [Config] linux-azure: Enable all IO schedulers as modules * [Hyper-V] srcu: Lock srcu_data structure in srcu_gp_start() (LP: #1802021) - srcu: Lock srcu_data structure in srcu_gp_start() * CONFIG_SECURITY_SELINUX_DISABLE should be disabled on 4.15/4.18 Azure (LP: #1813866) - [Config]: disable CONFIG_SECURITY_SELINUX_DISABLE [ Ubuntu: 4.18.0-15.16 ] * Ubuntu boot failure. 4.18.0-14 boot stalls. (does not boot) (LP: #1814555) - Revert "drm/i915/ringbuffer: Delay after EMIT_INVALIDATE for gen4/gen5" * Userspace break as a result of missing patch backport (LP: #1813873) - tty: Don't hold ldisc lock in tty_reopen() if ldisc present -- Stefan Bader <stefan.ba...@canonical.com> Fri, 15 Feb 2019 17:16:24 +0100 ** Changed in: linux-azure (Ubuntu Cosmic) Status: Fix Committed => Fix Released ** Changed in: linux-azure (Ubuntu Bionic) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5715 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5753 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5754 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14625 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14633 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15471 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-16882 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18653 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18710 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18955 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19407 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5391 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6559 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7755 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-9363 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu. https://bugs.launchpad.net/bugs/1813866 Title: CONFIG_SECURITY_SELINUX_DISABLE should be disabled on 4.15/4.18 Azure Status in ubuntu-kernel-tests: In Progress Status in linux-azure package in Ubuntu: In Progress Status in linux-azure source package in Bionic: Fix Released Status in linux-azure source package in Cosmic: Fix Released Bug description: The test_081_config_security_selinux_disable test failed on the Trusty Azure kernel: FAIL: test_081_config_security_selinux_disable (__main__.KernelSecurityConfigTest) Ensure CONFIG_SECURITY_SELINUX_DISABLE is disabled (LP: #1680315) ---------------------------------------------------------------------- Traceback (most recent call last): File "./test-kernel-security.py", line 2152, in test_081_config_security_selinux_disable self.assertKernelConfig('SECURITY_SELINUX_DISABLE', expected) File "./test-kernel-security.py", line 209, in assertKernelConfig self.assertKernelConfigUnset(name) File "./test-kernel-security.py", line 200, in assertKernelConfigUnset '%s option was expected to be unset in the kernel config' % name) AssertionError: SECURITY_SELINUX_DISABLE option was expected to be unset in the kernel config To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1813866/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp