[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
- phase: Promote to Security
- phase-changed: Tuesday, 07. July 2020 05:18 UTC
+ phase: Complete
+ phase-changed: Tuesday, 07. July 2020 06:37 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-security: Ongoing -- packages not yet published
+ reason: {}
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1882765
  variant: debs
  versions:
main: 4.4.0-1139.147
meta: 4.4.0.1139.131

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882766

Title:
  xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-snapdragon source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Complete
  phase-changed: Tuesday, 07. July 2020 06:37 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1882765
  variant: debs
  versions:
main: 4.4.0-1139.147
meta: 4.4.0.1139.131

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882766/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885514] Re: xenial/linux: 4.4.0-186.216 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/verification-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
+ bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
- phase: Promote to Proposed
- phase-changed: Tuesday, 07. July 2020 05:07 UTC
+ phase: Testing
+ phase-changed: Tuesday, 07. July 2020 06:37 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
trusty/linux-aws: bug 1885512
trusty/linux-lts-xenial: bug 1885513
xenial/linux-aws: bug 1885503
xenial/linux-cascade: bug 1885505
xenial/linux-fips: bug 1885511
xenial/linux-kvm: bug 1885506
xenial/linux-raspi2: bug 1885508
xenial/linux-snapdragon: bug 1885510
xenial/linux/caracalla-kernel: bug 1885499
xenial/linux/pc-kernel: bug 1885500
xenial/linux/stlouis-kernel: bug 1885501
  variant: debs
  versions:
main: 4.4.0-186.216
meta: 4.4.0.186.192
signed: 4.4.0-186.216

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885514

Title:
  xenial/linux: 4.4.0-186.216 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  In Progress
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Testing
  phase-changed: Tuesday, 07. July 2020 06:37 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
trusty/linux-aws: bug 1885512
trusty/linux-lts-xenial: bug 1885513
xenial/linux-aws: bug 1885503
xenial/linux-cascade: bug 1885505
xenial/linux-fips: bug 1885511
xenial/linux-kvm: bug 1885506
xenial/linux-raspi2: bug 1885508
xenial/linux-snapdragon: bug 1885510
xenial/linux/caracalla-kernel: bug 1885499
xenial/linux/pc-kernel: bug 1885500
xenial/linux/stlouis-kernel: bug 1885501
  variant: debs
  versions:
main: 4.4.0-186.216
meta: 4.4.0.186.192
signed: 4.4.0-186.216

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885514/+subscriptions


[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Promote to Security
- phase-changed: Tuesday, 07. July 2020 05:18 UTC
+ phase: Complete
+ phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-security: Ongoing -- packages not yet published
+ reason: {}
  variant: debs
  versions:
main: 4.4.0-1076.83
meta: 4.4.0.1076.74

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882762

Title:
  xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-kvm source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Complete
  phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  variant: debs
  versions:
main: 4.4.0-1076.83
meta: 4.4.0.1076.74

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882762/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
- phase: Promote to Security
- phase-changed: Tuesday, 07. July 2020 05:18 UTC
+ phase: Complete
+ phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-security: Ongoing -- packages not yet published
+ reason: {}
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1882763
  variant: debs
  versions:
main: 4.4.0-1135.144
meta: 4.4.0.1135.135

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882764

Title:
  xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-raspi2 source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Complete
  phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1882763
  variant: debs
  versions:
main: 4.4.0-1135.144
meta: 4.4.0.1135.135

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882764/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882770] Re: xenial/linux: 4.4.0-185.215 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
- phase: Promote to Security
- phase-changed: Tuesday, 07. July 2020 05:16 UTC
+ phase: Complete
+ phase-changed: Tuesday, 07. July 2020 06:22 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-security: Ongoing -- packages not yet published
+ reason: {}
  trackers:
trusty/linux-aws: bug 1882768
trusty/linux-lts-xenial: bug 1882769
xenial/linux-aws: bug 1882759
xenial/linux-cascade: bug 1882761
xenial/linux-fips: bug 1882767
xenial/linux-kvm: bug 1882762
xenial/linux-raspi2: bug 1882764
xenial/linux-snapdragon: bug 1882766
xenial/linux/caracalla-kernel: bug 1882755
xenial/linux/pc-kernel: bug 1882756
xenial/linux/stlouis-kernel: bug 1882757
  variant: debs
  versions:
main: 4.4.0-185.215
meta: 4.4.0.185.191
signed: 4.4.0-185.215

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882770

Title:
  xenial/linux: 4.4.0-185.215 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Complete
  phase-changed: Tuesday, 07. July 2020 06:22 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
trusty/linux-aws: bug 1882768
trusty/linux-lts-xenial: bug 1882769
xenial/linux-aws: bug 1882759
xenial/linux-cascade: bug 1882761
xenial/linux-fips: bug 1882767
xenial/linux-kvm: bug 1882762
xenial/linux-raspi2: bug 1882764
xenial/linux-snapdragon: bug 1882766
xenial/linux/caracalla-kernel: bug 1882755
xenial/linux/pc-kernel: bug 1882756
xenial/linux/stlouis-kernel: bug 1882757
  variant: debs
  versions:
main: 4.4.0-185.215
meta: 4.4.0.185.191
signed: 4.4.0-185.215

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882770/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Promote to Security
- phase-changed: Tuesday, 07. July 2020 05:18 UTC
+ phase: Complete
+ phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-security: Ongoing -- packages not yet published
+ reason: {}
  trackers:
xenial/linux-aws/aws-kernel: bug 1882758
  variant: debs
  versions:
main: 4.4.0-1110.121
meta: 4.4.0.1110.114

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882759

Title:
  xenial/linux-aws: 4.4.0-1110.121 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Fix Released
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-aws source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Complete
  phase-changed: Tuesday, 07. July 2020 06:23 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
xenial/linux-aws/aws-kernel: bug 1882758
  variant: debs
  versions:
main: 4.4.0-1110.121
meta: 4.4.0.1110.114

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882759/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885812] Re: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1885813
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
- phase: Packaging
- phase-changed: Monday, 06. July 2020 20:52 UTC
+ phase: Building in ppa
+ phase-changed: Tuesday, 07. July 2020 05:39 UTC
  reason:
-   prepare-package: Pending -- tag not published and package not
- uploaded
-   prepare-package-meta: Pending -- tag not published and package not
- uploaded
+   build-packages-ppa: Pending -- building in ppa main:building
+ meta:queued
  variant: debs
+ versions:
+   main: 4.15.0-1031.31
+   meta: 4.15.0.1031.31

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885812

Title:
  xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1885813
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
  phase: Building in ppa
  phase-changed: Tuesday, 07. July 2020 05:39 UTC
  reason:
build-packages-ppa: Pending -- building in ppa main:building
  meta:queued
  variant: debs
  versions:
main: 4.15.0-1031.31
meta: 4.15.0.1031.31

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885812/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1886491] Re: Applying package profile on Xenial doesn't work

2020-07-06 Thread Simon Poirier
It looks like python-apt (1.1.0~beta1ubuntu0.16.04.7) created a regression and 
elects to ignore
Acquire::AllowInsecureRepositories in favor of APT::Get::AllowUnauthenticated.

The simpler approach would likely be to backport the [trusted=true] fix
we've got working with later releases, instead of trying anything
related to the global apt config.

** Also affects: landscape-client (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: landscape-client (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: landscape-client (Ubuntu Xenial)
   Status: New => Confirmed

** No longer affects: landscape-client

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1886491

Title:
  Applying package profile on Xenial doesn't work

Status in landscape-client package in Ubuntu:
  New
Status in landscape-client source package in Xenial:
  Confirmed

Bug description:
  [Impact]

   * Users trying to apply changes to package profiles through landscape
  will get an error in the activity. This will result in incomplete apt
  source list on those clients.

  [Test Case]
   * install landscape-server-quickstart and landscape-api
   * Create a package profile "minimum packages" and add basic packages (byobu, 
vim, ubuntu-cloud-keyring). Enable for all computers
   * create a xenial container or machine and install/configure landscape-client

  Note that the apply package profile gets stuck and doesn't progress.
  On the container that was created, running apt update shows:

  sudo apt update
  Get:1 file:/var/lib/landscape/client/package/binaries ./ InRelease
  Ign:1 file:/var/lib/landscape/client/package/binaries ./ InRelease
  Get:2 file:/var/lib/landscape/client/package/binaries ./ Release
  Err:2 file:/var/lib/landscape/client/package/binaries ./ Release
    File not found - /var/lib/landscape/client/package/binaries/./Release (2: 
No such file or directory)
  Get:3 http://mirror/ubuntu xenial InRelease [247 kB]
  Hit:4 http://mirror/ubuntu xenial-updates InRelease
  Hit:5 http://mirror/ubuntu xenial-backports InRelease
  Hit:6 http://mirror/ubuntu xenial-security InRelease
  Reading package lists... Done
  E: The repository 'file:/var/lib/landscape/client/package/binaries ./ 
Release' does not have a Release file.
  N: Updating from such a repository can't be done securely, and is therefore 
disabled by default.
  N: See apt-secure(8) manpage for repository creation and user configuration 
details.

  apt-cache policy landscape-client
  landscape-client:
    Installed: 16.03-0ubuntu2.16.04.7
    Candidate: 16.03-0ubuntu2.16.04.7
    Version table:
   *** 16.03-0ubuntu2.16.04.7 500
  500 http://mirror/ubuntu xenial-updates/main amd64 Packages
  100 /var/lib/dpkg/status
   16.03-0ubuntu2 500
  500 http://mirror/ubuntu xenial/main amd64 Packages

  This can be easily worked around by:
   * Remove the file /etc/apt/sources.list.d/_landscape-internal-facade.list
   * add-apt-repository ppa:landscape/19.01
   * apt install landscape-client

  apt-cache policy landscape-client
  landscape-client:
    Installed: 18.03~1070~git.8e52e1d~ubuntu16.04.1
    Candidate: 18.03~1070~git.8e52e1d~ubuntu16.04.1
    Version table:
   *** 18.03~1070~git.8e52e1d~ubuntu16.04.1 500
  500 http://ppa.launchpad.net/landscape/19.01/ubuntu xenial/main amd64 
Packages
  100 /var/lib/dpkg/status
   16.03-0ubuntu2.16.04.7 500
  500 http://mirror.glacier.dev/ubuntu xenial-updates/main amd64 
Packages
   16.03-0ubuntu2 500
  500 http://mirror.glacier.dev/ubuntu xenial/main amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/landscape-client/+bug/1886491/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885055] Re: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885057
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 17:22 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 22:28 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  trackers:
xenial/linux-azure/azure-kernel: bug 1885054
  variant: debs
  versions:
main: 4.15.0-1091.101~16.04.1
meta: 4.15.0.1091.86
signed: 4.15.0-1091.101~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885055

Title:
  xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow stakeholder-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-azure source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885057
  packages:
main: linux-azure
meta: linux-meta-azure
signed: linux-signed-azure
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 22:28 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  trackers:
xenial/linux-azure/azure-kernel: bug 1885054
  variant: debs
  versions:
main: 4.15.0-1091.101~16.04.1
meta: 4.15.0.1091.86
signed: 4.15.0-1091.101~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885055/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885506] Re: xenial/linux-kvm: 4.4.0-1077.84 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1885514
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Packaging
- phase-changed: Wednesday, 01. July 2020 23:12 UTC
+ phase: Building in ppa
+ phase-changed: Monday, 06. July 2020 22:26 UTC
  reason:
-   prepare-package: Stalled -- package not uploaded
-   prepare-package-meta: Stalled -- package not uploaded
+   build-packages-ppa: Pending -- building in ppa main:queued
  variant: debs
  versions:
main: 4.4.0-1077.84
meta: 4.4.0.1077.75

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885506

Title:
  xenial/linux-kvm: 4.4.0-1077.84 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-kvm source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1885514
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Building in ppa
  phase-changed: Monday, 06. July 2020 22:26 UTC
  reason:
build-packages-ppa: Pending -- building in ppa main:queued
  variant: debs
  versions:
main: 4.4.0-1077.84
meta: 4.4.0.1077.75

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885506/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885812] Re: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-security
   Status: New => Invalid

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Invalid

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1885813
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
- phase: Ready for Packaging
- phase-changed: Monday, 06. July 2020 16:50 UTC
+ phase: Packaging
+ phase-changed: Monday, 06. July 2020 20:52 UTC
  reason:
-   prepare-package: Pending -- version not specified
+   prepare-package: Pending -- tag not published and package not
+ uploaded
+   prepare-package-meta: Pending -- tag not published and package not
+ uploaded
  variant: debs

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885812

Title:
  xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  In Progress
Status in Kernel SRU Workflow prepare-package-meta series:
  In Progress
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1885813
  packages:
main: linux-deeplens
meta: linux-meta-deeplens
  phase: Packaging
  phase-changed: Monday, 06. July 2020 20:52 UTC
  reason:
prepare-package: Pending -- tag not published and package not
  uploaded
prepare-package-meta: Pending -- tag not published and package not
  uploaded
  variant: debs

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885812/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1493303] Re: [OSSA 2016-004] Swift proxy memory leak on unfinished read (CVE-2016-0738)

2020-07-06 Thread Eduardo Barretto
This bug was fixed in the package swift - 1.13.1-0ubuntu1.5

---
swift (1.13.1-0ubuntu1.5) trusty-security; urgency=medium

  [ Jamie Strandboge ]
  * SECURITY UPDATE: disallow unsafe tempurl operations to point to
unauthorized data
- debian/patches/CVE-2015-5223.patch: disallow creation of DLO object
  manifests if non-safe tempurl request includes X-Object-Manifest header
- CVE-2015-5223
- LP: #1453948

  [ Marc Deslauriers ]
  * SECURITY UPDATE: DoS via incorrectly closed client connections
- debian/patches/CVE-2016-0737.patch: get better at closing WSGI
  iterables in swift/common/middleware/dlo.py,
  swift/common/middleware/slo.py, swift/common/request_helpers.py,
  swift/common/swob.py, swift/common/utils.py,
  test/unit/common/middleware/helpers.py,
  test/unit/common/middleware/test_dlo.py,
  test/unit/common/middleware/test_slo.py.
- CVE-2016-0737
  * SECURITY UPDATE: DoS via incorrectly closed server connections
- debian/patches/CVE-2016-0738.patch: fix memory/socket leak in proxy
  on truncated SLO/DLO GET in swift/common/request_helpers.py,
  test/unit/common/middleware/test_slo.py.
- CVE-2016-0738
  * Thanks to Red Hat for the patch backports!
  * debian/patches/fix-ubuntu-tests.patch: disable another test that no
longer works on buildds.

 -- Marc Deslauriers   Tue, 12 Sep 2017
07:36:43 -0400

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5223

** Changed in: swift (Ubuntu Trusty)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1493303

Title:
  [OSSA 2016-004] Swift proxy memory leak on unfinished read
  (CVE-2016-0738)

Status in Ubuntu Cloud Archive:
  Invalid
Status in Ubuntu Cloud Archive icehouse series:
  Triaged
Status in Ubuntu Cloud Archive kilo series:
  Triaged
Status in Ubuntu Cloud Archive liberty series:
  Triaged
Status in Ubuntu Cloud Archive mitaka series:
  Fix Released
Status in OpenStack Security Advisory:
  Fix Released
Status in OpenStack Object Storage (swift):
  Fix Released
Status in swift package in Ubuntu:
  Fix Released
Status in swift source package in Trusty:
  Fix Released
Status in swift source package in Wily:
  Won't Fix
Status in swift source package in Xenial:
  Fix Released
Status in swift source package in Yakkety:
  Fix Released

Bug description:
  It looks like the Swift proxy will leak memory if the connection is
  closed and the full response is not read. This opens for a potential
  DoS attacks.

  Reproduce:

  $ swift -A http://localhost:/auth/v1.0 -U .. -K .. upload --use-slo 
--segment-size 1048576  
  $ curl -H'X-Auth-Token: AUTH_...' 
"http://localhost:/v1/AUTH_..//" -m 0.001 > /dev/null

  Repeat the curl command a couple of times and you will have more
  information in netstat and sockstat. The important part is the -m
  which sets the max time curl spends at downloading. After that point,
  it'll close the connection.

  $ sudo netstat -ant -p | grep :6000
  $ cat /proc/net/sockstat

  tcp0  0 127.0.0.1:6000  0.0.0.0:*   LISTEN
  1358/python
  tcp0  43221 127.0.0.1:6000  127.0.0.1:48350 FIN_WAIT1 
  -
  tcp0  43221 127.0.0.1:6000  127.0.0.1:48882 FIN_WAIT1 
  -
  tcp   939820  0 127.0.0.1:48350 127.0.0.1:6000  
ESTABLISHED 17897/python
  tcp   939820  0 127.0.0.1:48882 127.0.0.1:6000  
ESTABLISHED 17890/python
  tcp   983041  0 127.0.0.1:48191 127.0.0.1:6000  
CLOSE_WAIT  17897/python
  tcp   983041  0 127.0.0.1:48948 127.0.0.1:6000  
CLOSE_WAIT  17892/python

  Restarting the proxy frees up the lingering memory.

  This problem did not exist in 2.2.0.

  ProblemType: Bug
  DistroRelease: Ubuntu 14.04
  Package: swift 2.2.2-0ubuntu1~cloud0 [origin: Canonical]
  ProcVersionSignature: Ubuntu 3.16.0-48.64~14.04.1-generic 3.16.7-ckt15
  Uname: Linux 3.16.0-48-generic x86_64
  ApportVersion: 2.14.1-0ubuntu3.12
  Architecture: amd64
  CrashDB:
   {
  "impl": "launchpad",
  "project": "cloud-archive",
  "bug_pattern_url": 
"http://people.canonical.com/~ubuntu-archive/bugpatterns/bugpatterns.xml";,
   }
  Date: Tue Sep  8 09:55:05 2015
  InstallationDate: Installed on 2015-06-22 (77 days ago)
  InstallationMedia: Ubuntu-Server 14.04.2 LTS "Trusty Tahr" - Release amd64 
(20150218.1)
  PackageArchitecture: all
  SourcePackage: swift
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/cloud-archive/+bug/1493303/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to

[Group.of.nepali.translators] [Bug 1882738] Re: xenial/linux-azure: 4.15.0-1090.100~16.04.1 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1885055 ***
https://bugs.launchpad.net/bugs/1885055

This bug was fixed in the package linux-azure - 4.15.0-1091.101~16.04.1

---
linux-azure (4.15.0-1091.101~16.04.1) xenial; urgency=medium

  * xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker (LP:
#1885055)

  [ Ubuntu: 4.15.0-1091.101 ]

  * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP: #1885057)
  *  linux-azure: Update SGX version to version LD_1.33 (LP: #1881338)
- SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- update dkms package versions
  * Build and ship a signed wireguard.ko (LP: #1861284)
- [Packaging] wireguard -- add support for building signed .ko
  * CVE-2019-16089
- SAUCE: nbd_genl_status: null check for nla_nest_start
  * CVE-2019-19642
- kernel/relay.c: handle alloc_percpu returning NULL in relay_open
  * CVE-2019-12380
- efi/x86/Add missing error handling to old_memmap 1:1 mapping code
  * CVE-2019-19039 // CVE-2019-19377
- btrfs: sink flush_fn to extent_write_cache_pages
- btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up
- btrfs: Don't submit any btree write bio if the fs has errors
  * CVE-2019-19036
- btrfs: volumes: Use more straightforward way to calculate map length
- btrfs: tree-checker: Try to detect missing INODE_ITEM
- Btrfs: tree-checker: detect file extent items with overlapping ranges
- Btrfs: make tree checker detect checksum items with overlapping ranges
- btrfs: harden agaist duplicate fsid on scanned devices
- Btrfs: fix missing data checksums after replaying a log tree
- btrfs: reloc: fix reloc root leak and NULL pointer dereference
- btrfs: Validate child tree block's level and first key
- btrfs: Detect unbalanced tree with empty leaf before crashing btree
  operations
  * CVE-2019-19318
- btrfs: tree-checker: Replace root parameter with fs_info
- btrfs: tree-checker: Check level for leaves and nodes
- btrfs: tree-checker: get fs_info from eb in generic_err
- btrfs: tree-checker: get fs_info from eb in file_extent_err
- btrfs: tree-checker: get fs_info from eb in check_csum_item
- btrfs: tree-checker: get fs_info from eb in dir_item_err
- btrfs: tree-checker: get fs_info from eb in check_dir_item
- btrfs: tree-checker: get fs_info from eb in block_group_err
- btrfs: tree-checker: get fs_info from eb in check_block_group_item
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item
- btrfs: tree-checker: get fs_info from eb in check_leaf_item
- btrfs: tree-checker: get fs_info from eb in check_leaf
- btrfs: tree-checker: get fs_info from eb in chunk_err
- btrfs: tree-checker: get fs_info from eb in dev_item_err
- btrfs: tree-checker: get fs_info from eb in check_dev_item
- btrfs: tree-checker: get fs_info from eb in check_inode_item
- btrfs: tree-checker: Add ROOT_ITEM check
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check
- btrfs: tree-checker: Add simple keyed refs check
- btrfs: tree-checker: Add EXTENT_DATA_REF check
- btrfs: tree-checker: Fix wrong check on max devid
- Btrfs: fix selftests failure due to uninitialized i_mode in test inodes
  * CVE-2019-19813 // CVE-2019-19816
- btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it
- btrfs: tree-checker: Make chunk item checker messages more readable
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead
  of EIO
- btrfs: tree-checker: Check chunk item at tree block read time
- btrfs: tree-checker: Verify dev item
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile
- btrfs: tree-checker: Verify inode item
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Build Nvidia drivers in conjunction with kernel (LP: #1764792)
- [Packaging] disable nvidia dkms builds for mainline
  * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801)
- i2c: dev: Fix the race between the release of i2c_dev and cdev
- ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- evm: Check also if *tfm is an error pointer in init_desc()
- ima: Fix return value of ima_write_policy()
- fix multiplication overflow in copy_fdtable()
- iommu/amd: Fix over-read of ACPI UID from IVRS table
- i2c: mux: demux-pinctrl: Fix an error handling path in
  'i2c_demux_pinctrl_probe()'
- ubi: Fix seq_file usage in detailed_erase_block_info debugfs file
- gcc-common.h: Update for GCC 10
- HID: multitouch: add eGalaxTouch P80H84 support
- scsi: qla2xxx: Fix

[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 5.3.0-1032.33

---
linux-azure (5.3.0-1032.33) eoan; urgency=medium

  * eoan/linux-azure: 5.3.0-1032.33 -proposed tracker (LP: #1885051)

  *  linux-azure: Update SGX version to version LD_1.33 (LP: #1881338)
- SAUCE: linux-azure: Update SGX to version LD_1.33
- SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C

  [ Ubuntu: 5.3.0-62.56 ]

  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * Eoan update: upstream stable patchset 2020-06-05 (LP: #1882303)
- i2c: dev: Fix the race between the release of i2c_dev and cdev
- KVM: SVM: Fix potential memory leak in svm_cpu_init()
- ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- evm: Check also if *tfm is an error pointer in init_desc()
- ima: Fix return value of ima_write_policy()
- mtd: spinand: Propagate ECC information to the MTD structure
- fix multiplication overflow in copy_fdtable()
- ubifs: remove broken lazytime support
- iommu/amd: Fix over-read of ACPI UID from IVRS table
- i2c: mux: demux-pinctrl: Fix an error handling path in
  'i2c_demux_pinctrl_probe()'
- ubi: Fix seq_file usage in detailed_erase_block_info debugfs file
- gcc-common.h: Update for GCC 10
- HID: multitouch: add eGalaxTouch P80H84 support
- HID: alps: Add AUI1657 device ID
- HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV
- scsi: qla2xxx: Delete all sessions before unregister local nvme port
- configfs: fix config_item refcnt leak in configfs_rmdir()
- vhost/vsock: fix packet delivery order to monitoring devices
- aquantia: Fix the media type of AQC100 ethernet controller in the driver
- component: Silence bind error on -EPROBE_DEFER
- scsi: ibmvscsi: Fix WARN_ON during event pool release
- HID: i2c-hid: reset Synaptics SYNA2393 on resume
- x86/apic: Move TSC deadline timer debug printk
- gtp: set NLM_F_MULTI flag in gtp_genl_dump_pdp()
- HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A 
keyboard-dock
- ceph: fix double unlock in handle_cap_export()
- stmmac: fix pointer check after utilization in stmmac_interrupt
- USB: core: Fix misleading driver bug report
- platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA
- ARM: futex: Address build warning
- padata: Replace delayed timer with immediate workqueue in padata_reorder
- padata: initialize pd->cpu with effective cpumask
- padata: purge get_cpu and reorder_via_wq from padata_do_serial
- ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio
  option
- ALSA: pcm: fix incorrect hw_base increase
- ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme
- ALSA: hda/realtek - Add more fixup entries for Clevo machines
- drm/etnaviv: fix perfmon domain interation
- apparmor: fix potential label refcnt leak in aa_change_profile
- apparmor: Fix aa_label refcnt leak in policy_update
- dmaengine: tegra210-adma: Fix an error handling path in 
'tegra_adma_probe()'
- dmaengine: owl: Use correct lock in owl_dma_get_pchan()
- drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of 
inheritance.
- powerpc: Remove STRICT_KERNEL_RWX incompatibility with RELOCATABLE
- powerpc/64s: Disable STRICT_KERNEL_RWX
- media: fdp1: Fix R-Car M3-N naming in debug message
- Revert "net/ibmvnic: Fix EOI when running in XIVE mode"
- Revert "gfs2: Don't demote a glock until its revokes are written"
- staging: iio: ad2s1210: Fix SPI reading
- staging: greybus: Fix uninitialized scalar variable
- iio: sca3000: Remove an erroneous 'get_device()'
- iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'
- misc: rtsx: Add short delay after exit from ASPM
- mei: release me_cl object reference
- ipack: tpci200: fix error return code in tpci200_register()
- rapidio: fix an error in get_user_pages_fast() error handling
- rxrpc: Fix a memory leak in rxkad_verify_response()
- x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks
- iio: adc: stm32-adc: Use dma_request_chan() instead
  dma_request_slave_channel()
- iio: adc: stm32-adc: fix device used to request dma
- iio: adc: stm32-dfsdm: Use dma_request_chan() instead
  dma_request_slave_channel()
- iio: adc: stm32-dfsdm: fix device used to request dma
- rxrpc: Trace discarded ACKs
- rxrpc: Fix ack discard
- ubifs: fix wrong use of crypto_shash_descsize()
- i2c: fix missing pm_runtime_put_sync in i2c_device_probe
- evm: Fix a small race in init_desc()
- afs: Don't unlock fetched data pages until the op completes success

[Group.of.nepali.translators] [Bug 1885055] Re: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure - 4.15.0-1091.101~16.04.1

---
linux-azure (4.15.0-1091.101~16.04.1) xenial; urgency=medium

  * xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker (LP:
#1885055)

  [ Ubuntu: 4.15.0-1091.101 ]

  * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP: #1885057)
  *  linux-azure: Update SGX version to version LD_1.33 (LP: #1881338)
- SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C
  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- update dkms package versions
  * Build and ship a signed wireguard.ko (LP: #1861284)
- [Packaging] wireguard -- add support for building signed .ko
  * CVE-2019-16089
- SAUCE: nbd_genl_status: null check for nla_nest_start
  * CVE-2019-19642
- kernel/relay.c: handle alloc_percpu returning NULL in relay_open
  * CVE-2019-12380
- efi/x86/Add missing error handling to old_memmap 1:1 mapping code
  * CVE-2019-19039 // CVE-2019-19377
- btrfs: sink flush_fn to extent_write_cache_pages
- btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up
- btrfs: Don't submit any btree write bio if the fs has errors
  * CVE-2019-19036
- btrfs: volumes: Use more straightforward way to calculate map length
- btrfs: tree-checker: Try to detect missing INODE_ITEM
- Btrfs: tree-checker: detect file extent items with overlapping ranges
- Btrfs: make tree checker detect checksum items with overlapping ranges
- btrfs: harden agaist duplicate fsid on scanned devices
- Btrfs: fix missing data checksums after replaying a log tree
- btrfs: reloc: fix reloc root leak and NULL pointer dereference
- btrfs: Validate child tree block's level and first key
- btrfs: Detect unbalanced tree with empty leaf before crashing btree
  operations
  * CVE-2019-19318
- btrfs: tree-checker: Replace root parameter with fs_info
- btrfs: tree-checker: Check level for leaves and nodes
- btrfs: tree-checker: get fs_info from eb in generic_err
- btrfs: tree-checker: get fs_info from eb in file_extent_err
- btrfs: tree-checker: get fs_info from eb in check_csum_item
- btrfs: tree-checker: get fs_info from eb in dir_item_err
- btrfs: tree-checker: get fs_info from eb in check_dir_item
- btrfs: tree-checker: get fs_info from eb in block_group_err
- btrfs: tree-checker: get fs_info from eb in check_block_group_item
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item
- btrfs: tree-checker: get fs_info from eb in check_leaf_item
- btrfs: tree-checker: get fs_info from eb in check_leaf
- btrfs: tree-checker: get fs_info from eb in chunk_err
- btrfs: tree-checker: get fs_info from eb in dev_item_err
- btrfs: tree-checker: get fs_info from eb in check_dev_item
- btrfs: tree-checker: get fs_info from eb in check_inode_item
- btrfs: tree-checker: Add ROOT_ITEM check
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check
- btrfs: tree-checker: Add simple keyed refs check
- btrfs: tree-checker: Add EXTENT_DATA_REF check
- btrfs: tree-checker: Fix wrong check on max devid
- Btrfs: fix selftests failure due to uninitialized i_mode in test inodes
  * CVE-2019-19813 // CVE-2019-19816
- btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it
- btrfs: tree-checker: Make chunk item checker messages more readable
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead
  of EIO
- btrfs: tree-checker: Check chunk item at tree block read time
- btrfs: tree-checker: Verify dev item
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile
- btrfs: tree-checker: Verify inode item
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Build Nvidia drivers in conjunction with kernel (LP: #1764792)
- [Packaging] disable nvidia dkms builds for mainline
  * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801)
- i2c: dev: Fix the race between the release of i2c_dev and cdev
- ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- evm: Check also if *tfm is an error pointer in init_desc()
- ima: Fix return value of ima_write_policy()
- fix multiplication overflow in copy_fdtable()
- iommu/amd: Fix over-read of ACPI UID from IVRS table
- i2c: mux: demux-pinctrl: Fix an error handling path in
  'i2c_demux_pinctrl_probe()'
- ubi: Fix seq_file usage in detailed_erase_block_info debugfs file
- gcc-common.h: Update for GCC 10
- HID: multitouch: add eGalaxTouch P80H84 support
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV
- configfs: fix config_item refcnt leak i

[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-azure-4.15 - 4.15.0-1091.101

---
linux-azure-4.15 (4.15.0-1091.101) bionic; urgency=medium

  * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP:
#1885057)

  *  linux-azure: Update SGX version to version LD_1.33 (LP: #1881338)
- SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C

  [ Ubuntu: 4.15.0-109.110 ]

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
- update dkms package versions
  * Build and ship a signed wireguard.ko (LP: #1861284)
- [Packaging] wireguard -- add support for building signed .ko
  * CVE-2019-16089
- SAUCE: nbd_genl_status: null check for nla_nest_start
  * CVE-2019-19642
- kernel/relay.c: handle alloc_percpu returning NULL in relay_open
  * CVE-2019-12380
- efi/x86/Add missing error handling to old_memmap 1:1 mapping code
  * CVE-2019-19039 // CVE-2019-19377
- btrfs: sink flush_fn to extent_write_cache_pages
- btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up
- btrfs: Don't submit any btree write bio if the fs has errors
  * CVE-2019-19036
- btrfs: volumes: Use more straightforward way to calculate map length
- btrfs: tree-checker: Try to detect missing INODE_ITEM
- Btrfs: tree-checker: detect file extent items with overlapping ranges
- Btrfs: make tree checker detect checksum items with overlapping ranges
- btrfs: harden agaist duplicate fsid on scanned devices
- Btrfs: fix missing data checksums after replaying a log tree
- btrfs: reloc: fix reloc root leak and NULL pointer dereference
- btrfs: Validate child tree block's level and first key
- btrfs: Detect unbalanced tree with empty leaf before crashing btree
  operations
  * CVE-2019-19318
- btrfs: tree-checker: Replace root parameter with fs_info
- btrfs: tree-checker: Check level for leaves and nodes
- btrfs: tree-checker: get fs_info from eb in generic_err
- btrfs: tree-checker: get fs_info from eb in file_extent_err
- btrfs: tree-checker: get fs_info from eb in check_csum_item
- btrfs: tree-checker: get fs_info from eb in dir_item_err
- btrfs: tree-checker: get fs_info from eb in check_dir_item
- btrfs: tree-checker: get fs_info from eb in block_group_err
- btrfs: tree-checker: get fs_info from eb in check_block_group_item
- btrfs: tree-checker: get fs_info from eb in check_extent_data_item
- btrfs: tree-checker: get fs_info from eb in check_leaf_item
- btrfs: tree-checker: get fs_info from eb in check_leaf
- btrfs: tree-checker: get fs_info from eb in chunk_err
- btrfs: tree-checker: get fs_info from eb in dev_item_err
- btrfs: tree-checker: get fs_info from eb in check_dev_item
- btrfs: tree-checker: get fs_info from eb in check_inode_item
- btrfs: tree-checker: Add ROOT_ITEM check
- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check
- btrfs: tree-checker: Add simple keyed refs check
- btrfs: tree-checker: Add EXTENT_DATA_REF check
- btrfs: tree-checker: Fix wrong check on max devid
- Btrfs: fix selftests failure due to uninitialized i_mode in test inodes
  * CVE-2019-19813 // CVE-2019-19816
- btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info
- btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it
- btrfs: tree-checker: Make chunk item checker messages more readable
- btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead
  of EIO
- btrfs: tree-checker: Check chunk item at tree block read time
- btrfs: tree-checker: Verify dev item
- btrfs: tree-checker: Enhance chunk checker to validate chunk profile
- btrfs: tree-checker: Verify inode item
- btrfs: inode: Verify inode mode to avoid NULL pointer dereference
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Build Nvidia drivers in conjunction with kernel (LP: #1764792)
- [Packaging] disable nvidia dkms builds for mainline
  * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801)
- i2c: dev: Fix the race between the release of i2c_dev and cdev
- ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()
- evm: Check also if *tfm is an error pointer in init_desc()
- ima: Fix return value of ima_write_policy()
- fix multiplication overflow in copy_fdtable()
- iommu/amd: Fix over-read of ACPI UID from IVRS table
- i2c: mux: demux-pinctrl: Fix an error handling path in
  'i2c_demux_pinctrl_probe()'
- ubi: Fix seq_file usage in detailed_erase_block_info debugfs file
- gcc-common.h: Update for GCC 10
- HID: multitouch: add eGalaxTouch P80H84 support
- scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV
- configfs: fix config_item refcnt leak in configfs_rmdir()
- vhost/vsock: fix packet delivery order to monitoring devices
 

[Group.of.nepali.translators] [Bug 1885813] Re: xenial/linux-hwe: 4.15.0-110.111~16.04.1 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/prepare-package
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-meta
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/prepare-package-signed
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  kernel-stable-master-bug: 1885814
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
- phase: Packaging
- phase-changed: Monday, 06. July 2020 15:32 UTC
+ phase: Building in ppa
+ phase-changed: Monday, 06. July 2020 16:49 UTC
  reason:
-   prepare-package: Pending -- tag not published and package not
- uploaded
-   prepare-package-meta: Pending -- tag not published and package not
- uploaded
-   prepare-package-signed: Pending -- tag not published and package not
- uploaded
+   build-packages-ppa: Ongoing -- building in ppa main:building
  trackers:
xenial/linux-deeplens: bug 1885812
  variant: debs
+ versions:
+   main: 4.15.0-110.111~16.04.1
+   meta: 4.15.0.110.113
+   signed: 4.15.0-110.111~16.04.1

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885813

Title:
  xenial/linux-hwe: 4.15.0-110.111~16.04.1 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  New
Status in Kernel SRU Workflow certification-testing series:
  New
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  New
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  New
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux-hwe source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  kernel-stable-master-bug: 1885814
  packages:
main: linux-hwe
meta: linux-meta-hwe
signed: linux-signed-hwe
  phase: Building in ppa
  phase-changed: Monday, 06. July 2020 16:49 UTC
  reason:
build-packages-ppa: Ongoing -- building in ppa main:building
  trackers:
xenial/linux-deeplens: bug 1885812
  variant: debs
  versions:
main: 4.15.0-110.111~16.04.1
meta: 4.15.0.110.113
signed: 4.15.0-110.111~16.04.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885813/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1878214] Re: [Xenial] dahdi-dkms fails to build after kernel version 4.4.218

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package dahdi-linux - 1:2.10.2~dfsg-1ubuntu4

---
dahdi-linux (1:2.10.2~dfsg-1ubuntu4) xenial; urgency=medium

  * Linux 4.4.218 FTBS fix (LP: #1878214)
- d/p/kernel-compat-4.4.218.patch

 -- Stefan Bader   Tue, 12 May 2020 15:55:16
+0200

** Changed in: dahdi-linux (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1878214

Title:
  [Xenial] dahdi-dkms fails to build after kernel version 4.4.218

Status in dahdi-linux package in Ubuntu:
  Invalid
Status in dahdi-linux source package in Xenial:
  Fix Released

Bug description:
  In upstream stable 4.4.218, the following patch brings back
  kref_read() which was re-implemented in dahdi-linux code for kernel
  versions before 4.11:

  commit 408f17931f5451702ad638e1d8511e780f6b56e7
  Author: Peter Zijlstra 
  Date:   Mon Nov 14 17:29:48 2016 +0100

  locking/atomic, kref: Add kref_read()

  This needs adjustment now in Xenial for kernels including 4.4.218 and
  later.

  [SRU Justification]

  == Impact ==

  Dahdi-dkms fails to build for kernels which include upstream stable
  version 4.4.218 or later.

  
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
  /autopkgtest-xenial/xenial/amd64/d/dahdi-
  linux/20200511_051631_1b525@/log.gz

  == Fix ==

  Disable the internal re-implementation of kref_read() for kernels
  including upstream stable 4.4.218.

  == Testcase ==

  Running dkms build for various kernel versions (tested with
  Ubuntu-4.4.0-178 and Ubuntu-4.4.0-179). With -178 building currently
  succeeds, with -179 it fails.

  == Risk of Regression ==

  Low, internal implementation which was backported from kernel 4.11
  gets replaced by the kernel function.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/1878214/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.19.10.1

---
sosreport (3.9.1-1ubuntu0.19.10.1) eoan; urgency=medium

  * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320)
This maintenance release includes:
- New plugins: sos_extras, ovirt_engine_backup, console,
  validation_framework.
- lxd plugin collections have been overhauled.
- Fixed handling of the namespace pattern for the networking
  plugin.
- A basic path is now defined in Policy for all subclasses.

Plugin API Enhancements:
- Enablement checks have been extended to include architecture
  constraints.
- SoSPredicate has been extended to include architecture constraints,
  as well as negative constraints for all elements.
- Plugins will now capture service status information for all services
  defined in the services class attr.

Further release information and tarballs are available at:
- https://github.com/sosreport/sos/releases/tag/3.9.1

  * Former patches now fixed upstream:
- d/p/0001-unittest-py3-fix.patch
- d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch

  * Other specific modifications:
- d/p/0001-lshw-command.patch
- d/p/0002-lds-substitute-oidc-conf.patch
- d/p/0003-kvm-change-trigger-to-dev-kvm.patch

 -- Eric Desrochers   Tue, 16 Jun 2020 12:18:58 +

** Changed in: sosreport (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

** Changed in: sosreport (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1883320

Title:
  [kvm] change check_enabled to /dev/kvm

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  The KVM plugin get triggered in a container
  (e.g lxd) because of "/sys/module/kvm"
  inheritance from the kernel host.

  Not only it's a waste of sosreport time,
  but running it inside a container may
  unintentionally reveal details from its
  host. Which is a undesired behaviour.

  Switching to /dev/kvm, is more appropriate
  and follow current standard as used by tool
  such as cpu-checker (kvm-ok) for instance.

  And taking benefit of this change to get rid
  of the check_enabled() overwrite in favour of
  using "files=" trigger.

  [Test Case]

  * Run sosreport inside a LXD container
  * The container will contain KVM information from its host (Iff its host as 
KVM installed)

  [Regression Potential]

  We only change the way the plugin gets triggered to use a most
  conventional way.

  If /dev/kvm exist, then exercise the kvm plugin.

  No regression expected, but worse case scenario, it will only be
  isolated and impact the KVM plugin to collect data properly as
  expected.

  It won't cause any harm to others plugins nor sosreport core
  functionalities itself.

  The commit went through some upstream Travis testing which used a
  shell script called "simple.sh" to verify sosreport collection.

  BTW, this same exact script is part of the sosreport autopkgtest, and
  will be run as part of the SRU to push this change.

  [Other Information]

  * Upstream bug:
  https://github.com/sosreport/sos/issues/2062

  * Upstream commit:
  
https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.19.10.1

---
sosreport (3.9.1-1ubuntu0.19.10.1) eoan; urgency=medium

  * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320)
This maintenance release includes:
- New plugins: sos_extras, ovirt_engine_backup, console,
  validation_framework.
- lxd plugin collections have been overhauled.
- Fixed handling of the namespace pattern for the networking
  plugin.
- A basic path is now defined in Policy for all subclasses.

Plugin API Enhancements:
- Enablement checks have been extended to include architecture
  constraints.
- SoSPredicate has been extended to include architecture constraints,
  as well as negative constraints for all elements.
- Plugins will now capture service status information for all services
  defined in the services class attr.

Further release information and tarballs are available at:
- https://github.com/sosreport/sos/releases/tag/3.9.1

  * Former patches now fixed upstream:
- d/p/0001-unittest-py3-fix.patch
- d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch

  * Other specific modifications:
- d/p/0001-lshw-command.patch
- d/p/0002-lds-substitute-oidc-conf.patch
- d/p/0003-kvm-change-trigger-to-dev-kvm.patch

 -- Eric Desrochers   Tue, 16 Jun 2020 12:18:58 +

** Changed in: sosreport (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

** Changed in: sosreport (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884293

Title:
  Update to maintenance release v3.9.1

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.9.1 is now released.

  It would be great to find sosreport v3.9.1 in supported stable
  releases, and active development release considering the fact that the
  releases (especially LTSes) are going to be supported for a couple of
  years.

  Sosreport is widely used by Canonical support team (and mission
  critical) to troubleshoot UA (Ubuntu Advantage) customer, partners,
  community users,  and so on.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * Perform some dog fooding test routines (--all-logs, --upload,
  looking sosreport archive content, ... and so on)

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has 300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9.1

  [Original Description]

  3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
  Release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.20.04.1

---
sosreport (3.9.1-1ubuntu0.20.04.1) focal; urgency=medium

  * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320)
This maintenance release includes:
- New plugins: sos_extras, ovirt_engine_backup, console,
  validation_framework.
- lxd plugin collections have been overhauled.
- Fixed handling of the namespace pattern for the networking
  plugin.
- A basic path is now defined in Policy for all subclasses.

Plugin API Enhancements:
- Enablement checks have been extended to include architecture
  constraints.
- SoSPredicate has been extended to include architecture constraints,
  as well as negative constraints for all elements.
- Plugins will now capture service status information for all services
  defined in the services class attr.

Further release information and tarballs are available at:
- https://github.com/sosreport/sos/releases/tag/3.9.1

  * Former patches now fixed upstream:
- d/p/0001-unittest-py3-fix.patch
- d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch

  * Other specific modifications:
- d/p/0001-lshw-command.patch
- d/p/0002-lds-substitute-oidc-conf.patch
- d/p/0003-kvm-change-trigger-to-dev-kvm.patch

 -- Eric Desrochers   Tue, 16 Jun 2020 12:18:58 +

** Changed in: sosreport (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1883320

Title:
  [kvm] change check_enabled to /dev/kvm

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  New
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released
Status in sosreport source package in Groovy:
  Fix Released

Bug description:
  [Impact]

  The KVM plugin get triggered in a container
  (e.g lxd) because of "/sys/module/kvm"
  inheritance from the kernel host.

  Not only it's a waste of sosreport time,
  but running it inside a container may
  unintentionally reveal details from its
  host. Which is a undesired behaviour.

  Switching to /dev/kvm, is more appropriate
  and follow current standard as used by tool
  such as cpu-checker (kvm-ok) for instance.

  And taking benefit of this change to get rid
  of the check_enabled() overwrite in favour of
  using "files=" trigger.

  [Test Case]

  * Run sosreport inside a LXD container
  * The container will contain KVM information from its host (Iff its host as 
KVM installed)

  [Regression Potential]

  We only change the way the plugin gets triggered to use a most
  conventional way.

  If /dev/kvm exist, then exercise the kvm plugin.

  No regression expected, but worse case scenario, it will only be
  isolated and impact the KVM plugin to collect data properly as
  expected.

  It won't cause any harm to others plugins nor sosreport core
  functionalities itself.

  The commit went through some upstream Travis testing which used a
  shell script called "simple.sh" to verify sosreport collection.

  BTW, this same exact script is part of the sosreport autopkgtest, and
  will be run as part of the SRU to push this change.

  [Other Information]

  * Upstream bug:
  https://github.com/sosreport/sos/issues/2062

  * Upstream commit:
  
https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.20.04.1

---
sosreport (3.9.1-1ubuntu0.20.04.1) focal; urgency=medium

  * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320)
This maintenance release includes:
- New plugins: sos_extras, ovirt_engine_backup, console,
  validation_framework.
- lxd plugin collections have been overhauled.
- Fixed handling of the namespace pattern for the networking
  plugin.
- A basic path is now defined in Policy for all subclasses.

Plugin API Enhancements:
- Enablement checks have been extended to include architecture
  constraints.
- SoSPredicate has been extended to include architecture constraints,
  as well as negative constraints for all elements.
- Plugins will now capture service status information for all services
  defined in the services class attr.

Further release information and tarballs are available at:
- https://github.com/sosreport/sos/releases/tag/3.9.1

  * Former patches now fixed upstream:
- d/p/0001-unittest-py3-fix.patch
- d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch

  * Other specific modifications:
- d/p/0001-lshw-command.patch
- d/p/0002-lds-substitute-oidc-conf.patch
- d/p/0003-kvm-change-trigger-to-dev-kvm.patch

 -- Eric Desrochers   Tue, 16 Jun 2020 12:18:58 +

** Changed in: sosreport (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884293

Title:
  Update to maintenance release v3.9.1

Status in sosreport package in Ubuntu:
  Fix Released
Status in sosreport source package in Xenial:
  Won't Fix
Status in sosreport source package in Bionic:
  Fix Released
Status in sosreport source package in Eoan:
  Fix Released
Status in sosreport source package in Focal:
  Fix Released

Bug description:
  [Impact]

  sosreport 3.9.1 is now released.

  It would be great to find sosreport v3.9.1 in supported stable
  releases, and active development release considering the fact that the
  releases (especially LTSes) are going to be supported for a couple of
  years.

  Sosreport is widely used by Canonical support team (and mission
  critical) to troubleshoot UA (Ubuntu Advantage) customer, partners,
  community users,  and so on.

  Just like we did for :
  - v3.5 (LP: #1734983)
  - v3.6 (LP: #1775195)
  - v3.9 (LP: #1862830)

  [Test Case]

  * Install sosreport
  * Run sosreport in different customer scenarios:
  server, desktop, cloud, hypervisor, instance (container, vm), physical 
server, ...
  * Extract archive and look at the content, look for 0 size file (and use 
common sense if legit or not)
  * Look under "sos_reports" for full report.
  * Look under "sos_logs" for warnings/errors.
    $ grep -v "INFO:" sos_logs/sos.log
  * Run "simple.sh": A quick port of the travis tests to bash. Generating 
various type of sosreports collection (which is part of the autopkgtest 
(d/test/simple.sh) now.

  * Perform some dog fooding test routines (--all-logs, --upload,
  looking sosreport archive content, ... and so on)

  * https://wiki.ubuntu.com/SosreportUpdates

  [Regression Potential]

  Sosreport, as of today, has 300 plugins that are all configured
  differently and configured to run under certain conditions. We can't
  test all possible scenarios. All we can do is identify the most
  common, important and Ubuntu/Canonical related one and test them (e.g.
  Openstack*, juju, MAAS, kernel, ...). With that being said, it is
  definitely possible that certain plugins may not work as expected, but
  the risk will be very low (e.g. not collecting the desired
  information) and isolated to this specific plugin. It shouldn't affect
  the other plugins nor core functionalities of sosreport.

  [Other Information]

  * Release note:
  https://github.com/sosreport/sos/releases/tag/3.9.1

  [Original Description]

  3.9.1 is now found in Debian unstable and Groovy (Current Active Devel
  Release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885511] Re: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: In Progress => Fix Committed

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
- phase: Promote to Proposed
- phase-changed: Monday, 06. July 2020 13:41 UTC
+ phase: Testing
+ phase-changed: Monday, 06. July 2020 13:52 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-signing-to-proposed: Ongoing -- review in progress
+   regression-testing: Ongoing -- testing in progress
+   verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1043.48
meta: 4.4.0.1043.45
signed: 4.4.0-1043.48

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885511

Title:
  xenial/linux-fips: 4.4.0-1043.48 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Testing
  phase-changed: Monday, 06. July 2020 13:52 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
regression-testing: Ongoing -- testing in progress
verification-testing: Ongoing -- testing in progress
  variant: debs
  versions:
main: 4.4.0-1043.48
meta: 4.4.0.1043.45
signed: 4.4.0-1043.48

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885511/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885510] Re: xenial/linux-snapdragon: 4.4.0-1140.148 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
- phase: Promote to Proposed
- phase-changed: Monday, 06. July 2020 11:18 UTC
+ phase: Testing
+ phase-changed: Monday, 06. July 2020 13:02 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1885509
  variant: debs
  versions:
main: 4.4.0-1140.148
meta: 4.4.0.1140.132

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885510

Title:
  xenial/linux-snapdragon: 4.4.0-1140.148 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-snapdragon source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Testing
  phase-changed: Monday, 06. July 2020 13:02 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1885509
  variant: debs
  versions:
main: 4.4.0-1140.148
meta: 4.4.0.1140.132

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885510/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885503] Re: xenial/linux-aws: 4.4.0-1111.123 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/regression-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Changed in: kernel-sru-workflow/regression-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Promote to Proposed
- phase-changed: Monday, 06. July 2020 11:18 UTC
+ phase: Testing
+ phase-changed: Monday, 06. July 2020 13:01 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   regression-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-aws/aws-kernel: bug 1885502
  variant: debs
  versions:
main: 4.4.0-.123
meta: 4.4.0..116

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885503

Title:
  xenial/linux-aws: 4.4.0-.123 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  In Progress
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-aws source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
    https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Testing
  phase-changed: Monday, 06. July 2020 13:01 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
regression-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-aws/aws-kernel: bug 1885502
  variant: debs
  versions:
main: 4.4.0-.123
meta: 4.4.0..116

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885503/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885511] Re: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-signing-to-proposed
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
- phase: Building in Signing
- phase-changed: Monday, 06. July 2020 11:48 UTC
+ phase: Ready for Promote to Proposed
+ phase-changed: Monday, 06. July 2020 13:02 UTC
  reason:
-   build-packages-signing: Pending -- building in Signing signed:queued
-   promote-to-proposed: Stalled -- packages copying to Signing
+   promote-signing-to-proposed: Pending -- ready for review
  variant: debs
  versions:
main: 4.4.0-1043.48
meta: 4.4.0.1043.45
signed: 4.4.0-1043.48

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885511

Title:
  xenial/linux-fips: 4.4.0-1043.48 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Confirmed
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  New
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  New
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Ready for Promote to Proposed
  phase-changed: Monday, 06. July 2020 13:02 UTC
  reason:
promote-signing-to-proposed: Pending -- ready for review
  variant: debs
  versions:
main: 4.4.0-1043.48
meta: 4.4.0.1043.45
signed: 4.4.0-1043.48

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885511/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1885508] Re: xenial/linux-raspi2: 4.4.0-1136.145 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/automated-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/certification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/promote-to-proposed
   Status: Fix Committed => Fix Released

** Changed in: kernel-sru-workflow/security-signoff
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/verification-testing
   Status: New => Confirmed

** Changed in: kernel-sru-workflow/automated-testing
   Status: Confirmed => In Progress

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
- phase: Promote to Proposed
- phase-changed: Monday, 06. July 2020 11:08 UTC
+ phase: Testing
+ phase-changed: Monday, 06. July 2020 12:36 UTC
+ proposed-announcement-sent: true
+ proposed-testing-requested: true
  reason:
-   promote-to-proposed: Ongoing -- packages waiting in -proposed for
- mirror sync
+   automated-testing: Ongoing -- testing in progress
+   certification-testing: Ongoing -- testing in progress
+   security-signoff: Pending -- waiting for signoff
+   verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1885507
  variant: debs
  versions:
main: 4.4.0-1136.145
meta: 4.4.0.1136.136

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1885508

Title:
  xenial/linux-raspi2: 4.4.0-1136.145 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  In Progress
Status in Kernel SRU Workflow certification-testing series:
  Confirmed
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  New
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Confirmed
Status in Kernel SRU Workflow verification-testing series:
  Confirmed
Status in linux-raspi2 source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1885514
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Testing
  phase-changed: Monday, 06. July 2020 12:36 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
automated-testing: Ongoing -- testing in progress
certification-testing: Ongoing -- testing in progress
security-signoff: Pending -- waiting for signoff
verification-testing: Ongoing -- testing in progress
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1885507
  variant: debs
  versions:
main: 4.4.0-1136.145
meta: 4.4.0.1136.136

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885508/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882761] Re: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
All tasks have been completed and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882761

Title:
  xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-cascade
meta: linux-meta-cascade
signed: linux-signed-cascade
  phase: Complete
  phase-changed: Monday, 06. July 2020 08:28 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
xenial/linux-cascade/cascade-kernel: bug 1882760
  variant: debs
  versions:
main: 4.4.0-1020.22
meta: 4.4.0.1020.23
signed: 4.4.0-1020.22

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882761/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882767] Re: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
All tasks have been completed and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882767

Title:
  xenial/linux-fips: 4.4.0-1042.47 -proposed tracker

Status in Kernel SRU Workflow:
  Fix Released
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Complete
  phase-changed: Monday, 06. July 2020 08:29 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  variant: debs
  versions:
main: 4.4.0-1042.47
meta: 4.4.0.1042.44
signed: 4.4.0-1042.47

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882767/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package snapd - 2.45.1+18.04

---
snapd (2.45.1+18.04) bionic; urgency=medium

  * New upstream release, LP: #1875071
- data/selinux: allow checking /var/cache/app-info
- cmd/snap-confine: add support for libc6-lse
- interfaces: miscellanious policy updates xlv
- snap-bootstrap: remove sealed key file on reinstall
- interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/
- gadget: make ext4 filesystems with or without metadata checksum
- interfaces/fwupd: allow bind mount to /boot on core
- tests: cherry-pick test fixes from master
- snap/squashfs: also symlink snap Install with uc20 seed snap dir
  layout
- interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed
  devices
- snap,many: mv Open to snapfile pkg to support add'l options to
  Container methods
- interfaces/builtin/desktop: do not mount fonts cache on distros
  with quirks
- devicestate, sysconfig: revert support for cloud.cfg.d/ in the
  gadget
- data/completion, packaging: cherry-pick zsh completion
- state: log task errors in the journal too
- devicestate: do not report "ErrNoState" for seeded up
- interfaces/desktop: silence more /var/lib/snapd/desktop/icons
  denials
- packaging/fedora: disable FIPS compliant crypto for static
  binaries
- packaging: stop depending on python-docutils

 -- Michael Vogt   Fri, 05 Jun 2020 15:13:49
+0200

** Changed in: snapd (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1875071

Title:
  [SRU] 2.45

Status in snapd package in Ubuntu:
  Fix Released
Status in snapd source package in Xenial:
  Fix Released
Status in snapd source package in Bionic:
  Fix Released
Status in snapd source package in Eoan:
  Fix Released
Status in snapd source package in Focal:
  Fix Released

Bug description:
  This is a new version of snapd.

  The changelog is available here
  https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog,
  the raw git changelog is available here:
  https://github.com/snapcore/snapd/commits/2.45 (note that the debian
  changelog is auto-generated from the merges of the git commits so
  there is usually no need to look at the raw git commits).

  The travis logs for 2.45 can be found here: https://travis-
  ci.org/snapcore/snapd/branches

  The snappy team released a new release that we want SRU into xenial.
  The new process described in https://wiki.ubuntu.com/SnapdUpdates was
  used and we have done integration-tests on the snappy images,
  autopkgtests on classic and unit tests.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1856159] Re: [SRU] 2.43

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package snapd - 2.45.1+19.10

---
snapd (2.45.1+19.10) eoan; urgency=medium

  * New upstream release, LP: #1875071
- data/selinux: allow checking /var/cache/app-info
- cmd/snap-confine: add support for libc6-lse
- interfaces: miscellanious policy updates xlv
- snap-bootstrap: remove sealed key file on reinstall
- interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/
- gadget: make ext4 filesystems with or without metadata checksum
- interfaces/fwupd: allow bind mount to /boot on core
- tests: cherry-pick test fixes from master
- snap/squashfs: also symlink snap Install with uc20 seed snap dir
  layout
- interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed
  devices
- snap,many: mv Open to snapfile pkg to support add'l options to
  Container methods
- interfaces/builtin/desktop: do not mount fonts cache on distros
  with quirks
- devicestate, sysconfig: revert support for cloud.cfg.d/ in the
  gadget
- data/completion, packaging: cherry-pick zsh completion
- state: log task errors in the journal too
- devicestate: do not report "ErrNoState" for seeded up
- interfaces/desktop: silence more /var/lib/snapd/desktop/icons
  denials
- packaging/fedora: disable FIPS compliant crypto for static
  binaries
- packaging: stop depending on python-docutils

 -- Michael Vogt   Fri, 05 Jun 2020 15:13:49
+0200

** Changed in: snapd (Ubuntu Eoan)
   Status: Confirmed => Fix Released

** Changed in: snapd (Ubuntu Bionic)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1856159

Title:
  [SRU] 2.43

Status in snapd package in Ubuntu:
  Fix Released
Status in snapd source package in Trusty:
  Confirmed
Status in snapd source package in Xenial:
  Fix Released
Status in snapd source package in Bionic:
  Fix Released
Status in snapd source package in Eoan:
  Fix Released

Bug description:
  This is a new version of snapd.

  The changelog is available here
  https://github.com/snapcore/snapd/blob/2.43/packaging/ubuntu-16.04/changelog,
  the raw git changelog is available here:
  https://github.com/snapcore/snapd/commits/2.43 (note that the debian
  changelog is auto-generated from the merges of the git commits so
  there is usually no need to look at the raw git commits).

  The travis logs for 2.43 can be found here: https://travis-
  ci.org/snapcore/snapd/branches

  The snappy team released a new release that we want SRU into xenial.
  The new process described in https://wiki.ubuntu.com/SnapdUpdates was
  used and we have done integration-tests on the snappy images,
  autopkgtests on classic and unit tests.

  This time we also include trusty to ensure that on trusty users can
  get a more recent version that auto-installs the snapd snap so that
  they get the benefit of re-exec there.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1856159/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1856159] Re: [SRU] 2.43

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package snapd - 2.45.1+18.04

---
snapd (2.45.1+18.04) bionic; urgency=medium

  * New upstream release, LP: #1875071
- data/selinux: allow checking /var/cache/app-info
- cmd/snap-confine: add support for libc6-lse
- interfaces: miscellanious policy updates xlv
- snap-bootstrap: remove sealed key file on reinstall
- interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/
- gadget: make ext4 filesystems with or without metadata checksum
- interfaces/fwupd: allow bind mount to /boot on core
- tests: cherry-pick test fixes from master
- snap/squashfs: also symlink snap Install with uc20 seed snap dir
  layout
- interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed
  devices
- snap,many: mv Open to snapfile pkg to support add'l options to
  Container methods
- interfaces/builtin/desktop: do not mount fonts cache on distros
  with quirks
- devicestate, sysconfig: revert support for cloud.cfg.d/ in the
  gadget
- data/completion, packaging: cherry-pick zsh completion
- state: log task errors in the journal too
- devicestate: do not report "ErrNoState" for seeded up
- interfaces/desktop: silence more /var/lib/snapd/desktop/icons
  denials
- packaging/fedora: disable FIPS compliant crypto for static
  binaries
- packaging: stop depending on python-docutils

 -- Michael Vogt   Fri, 05 Jun 2020 15:13:49
+0200

** Changed in: snapd (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1856159

Title:
  [SRU] 2.43

Status in snapd package in Ubuntu:
  Fix Released
Status in snapd source package in Trusty:
  Confirmed
Status in snapd source package in Xenial:
  Fix Released
Status in snapd source package in Bionic:
  Fix Released
Status in snapd source package in Eoan:
  Fix Released

Bug description:
  This is a new version of snapd.

  The changelog is available here
  https://github.com/snapcore/snapd/blob/2.43/packaging/ubuntu-16.04/changelog,
  the raw git changelog is available here:
  https://github.com/snapcore/snapd/commits/2.43 (note that the debian
  changelog is auto-generated from the merges of the git commits so
  there is usually no need to look at the raw git commits).

  The travis logs for 2.43 can be found here: https://travis-
  ci.org/snapcore/snapd/branches

  The snappy team released a new release that we want SRU into xenial.
  The new process described in https://wiki.ubuntu.com/SnapdUpdates was
  used and we have done integration-tests on the snappy images,
  autopkgtests on classic and unit tests.

  This time we also include trusty to ensure that on trusty users can
  get a more recent version that auto-installs the snapd snap so that
  they get the benefit of re-exec there.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1856159/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package snapd - 2.45.1+20.04

---
snapd (2.45.1+20.04) focal; urgency=medium

  * New upstream release, LP: #1875071
- data/selinux: allow checking /var/cache/app-info
- cmd/snap-confine: add support for libc6-lse
- interfaces: miscellanious policy updates xlv
- snap-bootstrap: remove sealed key file on reinstall
- interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/
- gadget: make ext4 filesystems with or without metadata checksum
- interfaces/fwupd: allow bind mount to /boot on core
- tests: cherry-pick test fixes from master
- snap/squashfs: also symlink snap Install with uc20 seed snap dir
  layout
- interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed
  devices
- snap,many: mv Open to snapfile pkg to support add'l options to
  Container methods
- interfaces/builtin/desktop: do not mount fonts cache on distros
  with quirks
- devicestate, sysconfig: revert support for cloud.cfg.d/ in the
  gadget
- data/completion, packaging: cherry-pick zsh completion
- state: log task errors in the journal too
- devicestate: do not report "ErrNoState" for seeded up
- interfaces/desktop: silence more /var/lib/snapd/desktop/icons
  denials
- packaging/fedora: disable FIPS compliant crypto for static
  binaries
- packaging: stop depending on python-docutils

 -- Michael Vogt   Fri, 05 Jun 2020 15:13:49
+0200

** Changed in: snapd (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1875071

Title:
  [SRU] 2.45

Status in snapd package in Ubuntu:
  Fix Released
Status in snapd source package in Xenial:
  Fix Released
Status in snapd source package in Bionic:
  Fix Released
Status in snapd source package in Eoan:
  Fix Released
Status in snapd source package in Focal:
  Fix Released

Bug description:
  This is a new version of snapd.

  The changelog is available here
  https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog,
  the raw git changelog is available here:
  https://github.com/snapcore/snapd/commits/2.45 (note that the debian
  changelog is auto-generated from the merges of the git commits so
  there is usually no need to look at the raw git commits).

  The travis logs for 2.45 can be found here: https://travis-
  ci.org/snapcore/snapd/branches

  The snappy team released a new release that we want SRU into xenial.
  The new process described in https://wiki.ubuntu.com/SnapdUpdates was
  used and we have done integration-tests on the snappy images,
  autopkgtests on classic and unit tests.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package snapd - 2.45.1+19.10

---
snapd (2.45.1+19.10) eoan; urgency=medium

  * New upstream release, LP: #1875071
- data/selinux: allow checking /var/cache/app-info
- cmd/snap-confine: add support for libc6-lse
- interfaces: miscellanious policy updates xlv
- snap-bootstrap: remove sealed key file on reinstall
- interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/
- gadget: make ext4 filesystems with or without metadata checksum
- interfaces/fwupd: allow bind mount to /boot on core
- tests: cherry-pick test fixes from master
- snap/squashfs: also symlink snap Install with uc20 seed snap dir
  layout
- interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed
  devices
- snap,many: mv Open to snapfile pkg to support add'l options to
  Container methods
- interfaces/builtin/desktop: do not mount fonts cache on distros
  with quirks
- devicestate, sysconfig: revert support for cloud.cfg.d/ in the
  gadget
- data/completion, packaging: cherry-pick zsh completion
- state: log task errors in the journal too
- devicestate: do not report "ErrNoState" for seeded up
- interfaces/desktop: silence more /var/lib/snapd/desktop/icons
  denials
- packaging/fedora: disable FIPS compliant crypto for static
  binaries
- packaging: stop depending on python-docutils

 -- Michael Vogt   Fri, 05 Jun 2020 15:13:49
+0200

** Changed in: snapd (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

** Changed in: snapd (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1875071

Title:
  [SRU] 2.45

Status in snapd package in Ubuntu:
  Fix Released
Status in snapd source package in Xenial:
  Fix Released
Status in snapd source package in Bionic:
  Fix Released
Status in snapd source package in Eoan:
  Fix Released
Status in snapd source package in Focal:
  Fix Released

Bug description:
  This is a new version of snapd.

  The changelog is available here
  https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog,
  the raw git changelog is available here:
  https://github.com/snapcore/snapd/commits/2.45 (note that the debian
  changelog is auto-generated from the merges of the git commits so
  there is usually no need to look at the raw git commits).

  The travis logs for 2.45 can be found here: https://travis-
  ci.org/snapcore/snapd/branches

  The snappy team released a new release that we want SRU into xenial.
  The new process described in https://wiki.ubuntu.com/SnapdUpdates was
  used and we have done integration-tests on the snappy images,
  autopkgtests on classic and unit tests.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882767] Re: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:54 UTC
+ phase: Complete
+ phase-changed: Monday, 06. July 2020 08:29 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-updates: Ongoing -- packages not yet published
+ reason: {}
  variant: debs
  versions:
main: 4.4.0-1042.47
meta: 4.4.0.1042.44
signed: 4.4.0-1042.47

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882767

Title:
  xenial/linux-fips: 4.4.0-1042.47 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-fips
meta: linux-meta-fips
signed: linux-signed-fips
  phase: Complete
  phase-changed: Monday, 06. July 2020 08:29 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  variant: debs
  versions:
main: 4.4.0-1042.47
meta: 4.4.0.1042.44
signed: 4.4.0-1042.47

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882767/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882761] Re: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-cascade
meta: linux-meta-cascade
signed: linux-signed-cascade
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:53 UTC
+ phase: Complete
+ phase-changed: Monday, 06. July 2020 08:28 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
- reason:
-   promote-to-updates: Ongoing -- packages not yet published
+ reason: {}
  trackers:
xenial/linux-cascade/cascade-kernel: bug 1882760
  variant: debs
  versions:
main: 4.4.0-1020.22
meta: 4.4.0.1020.23
signed: 4.4.0-1020.22

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882761

Title:
  xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Invalid
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-signing-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  Invalid
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Invalid
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-cascade
meta: linux-meta-cascade
signed: linux-signed-cascade
  phase: Complete
  phase-changed: Monday, 06. July 2020 08:28 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason: {}
  trackers:
xenial/linux-cascade/cascade-kernel: bug 1882760
  variant: debs
  versions:
main: 4.4.0-1020.22
meta: 4.4.0.1020.23
signed: 4.4.0-1020.22

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882761/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu1.2~16.04.1

---
linux-base (4.5ubuntu1.2~16.04.1) xenial; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:43:40 -0300

** Changed in: linux-base (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu1.2

---
linux-base (4.5ubuntu1.2) bionic; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:39:07 -0300

** Changed in: linux-base (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu1.2

---
linux-base (4.5ubuntu1.2) bionic; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:39:07 -0300

** Changed in: linux-base (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu2.2

---
linux-base (4.5ubuntu2.2) eoan; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:34:46 -0300

** Changed in: linux-base (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu3.1

---
linux-base (4.5ubuntu3.1) focal; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:23:24 -0300

** Changed in: linux-base (Ubuntu Focal)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:54 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 08:06 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1882765
  variant: debs
  versions:
main: 4.4.0-1139.147
meta: 4.4.0.1139.131

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882766

Title:
  xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-snapdragon source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-snapdragon
meta: linux-meta-snapdragon
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 08:06 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  trackers:
xenial/linux-snapdragon/dragonboard-kernel: bug 1882765
  variant: debs
  versions:
main: 4.4.0-1139.147
meta: 4.4.0.1139.131

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882766/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-base - 4.5ubuntu2.2

---
linux-base (4.5ubuntu2.2) eoan; urgency=medium

  * Update SGX udev rules for version LD_1.33 (LP: #1881338).

 -- Marcelo Henrique Cerri   Thu, 25 Jun
2020 14:34:46 -0300

** Changed in: linux-base (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

** Changed in: linux-base (Ubuntu Eoan)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1881338

Title:
   linux-azure: Update SGX version to version LD_1.33

Status in linux-azure package in Ubuntu:
  In Progress
Status in linux-azure-4.15 package in Ubuntu:
  New
Status in linux-base package in Ubuntu:
  Fix Released
Status in linux-azure source package in Xenial:
  Invalid
Status in linux-azure-4.15 source package in Xenial:
  Invalid
Status in linux-base source package in Xenial:
  Fix Released
Status in linux-azure source package in Bionic:
  Fix Committed
Status in linux-azure-4.15 source package in Bionic:
  Fix Committed
Status in linux-base source package in Bionic:
  Fix Released
Status in linux-azure source package in Eoan:
  Fix Committed
Status in linux-azure-4.15 source package in Eoan:
  Invalid
Status in linux-base source package in Eoan:
  Fix Released
Status in linux-azure source package in Focal:
  Fix Committed
Status in linux-azure-4.15 source package in Focal:
  Invalid
Status in linux-base source package in Focal:
  Fix Released

Bug description:
  [Impact]

  We have included the DCAP version of SGX into the linux-azure kernels
  in order to provide a signed version of this driver that can be used
  with secure boot in Azure instances.

  Since a new version of this driver was released, we should update the
  embedded driver:

  
https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux

  [Test Case]

  - Install the new kernel on an ACC azure instance.
  - Ensure the module loads properly.
  - Check if ECL (provided on the azure images) is working properly.

  [Regression Potential]

  The changes are extensive, but both Canonical and Microsoft perform
  validation tests on SGX. Besides that, the change is restricted to
  linux-azure running on specific instances.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:54 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 08:05 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1882763
  variant: debs
  versions:
main: 4.4.0-1135.144
meta: 4.4.0.1135.135

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882764

Title:
  xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Invalid
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-raspi2 source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-raspi2
meta: linux-meta-raspi2
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 08:05 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  trackers:
xenial/linux-raspi2/pi2-kernel: bug 1882763
  variant: debs
  versions:
main: 4.4.0-1135.144
meta: 4.4.0.1135.135

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882764/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882770] Re: xenial/linux: 4.4.0-185.215 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:51 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 08:14 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  trackers:
trusty/linux-aws: bug 1882768
trusty/linux-lts-xenial: bug 1882769
xenial/linux-aws: bug 1882759
xenial/linux-cascade: bug 1882761
xenial/linux-fips: bug 1882767
xenial/linux-kvm: bug 1882762
xenial/linux-raspi2: bug 1882764
xenial/linux-snapdragon: bug 1882766
xenial/linux/caracalla-kernel: bug 1882755
xenial/linux/pc-kernel: bug 1882756
xenial/linux/stlouis-kernel: bug 1882757
  variant: debs
  versions:
main: 4.4.0-185.215
meta: 4.4.0.185.191
signed: 4.4.0-185.215

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882770

Title:
  xenial/linux: 4.4.0-185.215 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Fix Released
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-signed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux source package in Xenial:
  New

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  bugs-spammed: true
  packages:
main: linux
meta: linux-meta
signed: linux-signed
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 08:14 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  trackers:
trusty/linux-aws: bug 1882768
trusty/linux-lts-xenial: bug 1882769
xenial/linux-aws: bug 1882759
xenial/linux-cascade: bug 1882761
xenial/linux-fips: bug 1882767
xenial/linux-kvm: bug 1882762
xenial/linux-raspi2: bug 1882764
xenial/linux-snapdragon: bug 1882766
xenial/linux/caracalla-kernel: bug 1882755
xenial/linux/pc-kernel: bug 1882756
xenial/linux/stlouis-kernel: bug 1882757
  variant: debs
  versions:
main: 4.4.0-185.215
meta: 4.4.0.185.191
signed: 4.4.0-185.215

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882770/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1879752] Re: test_bpf of ubuntu_kernel_selftests.net ADT test failure with linux 4.4.0-180.210

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-185.215

---
linux (4.4.0-185.215) xenial; urgency=medium

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported

  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: disallow data races on gcc-10 as well
- scsi: iscsi: Fix a potential deadlock in the timeout handler
- Linux 4

[Group.of.nepali.translators] [Bug 1881356] Re: Xenial update: 4.4.224 upstream stable release

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-185.215

---
linux (4.4.0-185.215) xenial; urgency=medium

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported

  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: disallow data races on gcc-10 as well
- scsi: iscsi: Fix a potential deadlock in the timeout handler
- Linux 4

[Group.of.nepali.translators] [Bug 1880213] Re: ext2 build failure on 4.4.0-180.210

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-185.215

---
linux (4.4.0-185.215) xenial; urgency=medium

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts

  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported

  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: disallow data races on gcc-10 as well
- scsi: iscsi: Fix a potential deadlock in the timeout handler
- Linux 4

[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1139.147

---
linux-snapdragon (4.4.0-1139.147) xenial; urgency=medium

  * xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker (LP:
#1882766)

  [ Ubuntu: 4.4.0-185.215 ]

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
-

[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-kvm - 4.4.0-1076.83

---
linux-kvm (4.4.0-1076.83) xenial; urgency=medium

  * xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker (LP: #1882762)

  [ Ubuntu: 4.4.0-185.215 ]

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: disallow data

[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-aws
meta: linux-meta-aws
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:52 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 08:04 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  trackers:
xenial/linux-aws/aws-kernel: bug 1882758
  variant: debs
  versions:
main: 4.4.0-1110.121
meta: 4.4.0.1110.114

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882759

Title:
  xenial/linux-aws: 4.4.0-1110.121 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-aws source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-aws
meta: linux-meta-aws
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 08:04 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  trackers:
xenial/linux-aws/aws-kernel: bug 1882758
  variant: debs
  versions:
main: 4.4.0-1110.121
meta: 4.4.0.1110.114

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882759/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1135.144

---
linux-raspi2 (4.4.0-1135.144) xenial; urgency=medium

  * xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker (LP: #1882764)

  [ Ubuntu: 4.4.0-185.215 ]

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: d

[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker

2020-07-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-aws - 4.4.0-1110.121

---
linux-aws (4.4.0-1110.121) xenial; urgency=medium

  * xenial/linux-aws: 4.4.0-1110.121 -proposed tracker (LP: #1882759)

  [ Ubuntu: 4.4.0-185.215 ]

  * Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
  * CVE-2020-0543
- UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off 
when
  not supported
  * Xenial update: 4.4.224 upstream stable release (LP: #1881356)
- USB: serial: qcserial: Add DW5816e support
- Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS"
- dp83640: reverse arguments to list_add_tail
- net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()
- sch_sfq: validate silly quantum values
- sch_choke: avoid potential panic in choke_reset()
- enic: do not overwrite error code
- ipv6: fix cleanup ordering for ip6_mr failure
- binfmt_elf: move brk out of mmap when doing direct loader exec
- x86/apm: Don't access __preempt_count with zeroed fs
- Revert "IB/ipoib: Update broadcast object if PKey value was changed in 
index
  0"
- USB: uas: add quirk for LaCie 2Big Quadra
- USB: serial: garmin_gps: add sanity checking for data length
- batman-adv: fix batadv_nc_random_weight_tq
- scripts/decodecode: fix trapping instruction formatting
- phy: micrel: Ensure interrupts are reenabled on resume
- binfmt_elf: Do not move brk for INTERP-less ET_EXEC
- ext4: add cond_resched() to ext4_protect_reserved_inode
- blktrace: Fix potential deadlock between delete & sysfs ops
- blktrace: fix unlocked access to init/start-stop/teardown
- blktrace: fix trace mutex deadlock
- ptp: do not explicitly set drvdata in ptp_clock_register()
- ptp: use is_visible method to hide unused attributes
- ptp: create "pins" together with the rest of attributes
- chardev: add helper function to register char devs with a struct device
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register
- ptp: fix the race between the release of ptp_clock and cdev
- ptp: free ptp device pin descriptors properly
- net: handle no dst on skb in icmp6_send
- net/sonic: Fix a resource leak in an error handling path in
  'jazz_sonic_probe()'
- net: moxa: Fix a potential double 'free_irq()'
- drop_monitor: work around gcc-10 stringop-overflow warning
- scsi: sg: add sg_remove_request in sg_write
- cifs: Check for timeout on Negotiate stage
- cifs: Fix a race condition with cifs_echo_request
- dmaengine: pch_dma.c: Avoid data race between probe and irq handler
- dmaengine: mmp_tdma: Reset channel error on release
- drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()
- ipc/util.c: sysvipc_find_ipc() incorrectly updates position index
- net: openvswitch: fix csum updates for MPLS actions
- gre: do not keep the GRE header around in collect medata mode
- mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone()
- scsi: qla2xxx: Avoid double completion of abort command
- i40e: avoid NVM acquire deadlock during NVM update
- net/mlx5: Fix driver load error flow when firmware is stuck
- netfilter: conntrack: avoid gcc-10 zero-length-bounds warning
- IB/mlx4: Test return value of calls to ib_get_cached_pkey
- pnp: Use list_for_each_entry() instead of open coding
- gcc-10 warnings: fix low-hanging fruit
- kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig
- Stop the ad-hoc games with -Wno-maybe-initialized
- gcc-10: disable 'zero-length-bounds' warning for now
- gcc-10: disable 'array-bounds' warning for now
- gcc-10: disable 'stringop-overflow' warning for now
- gcc-10: disable 'restrict' warning for now
- blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter
- blk-mq: Allow blocking queue tag iter callbacks
- x86/paravirt: Remove the unused irq_enable_sysexit pv op
- gcc-10: avoid shadowing standard library 'free()' in crypto
- net: fix a potential recursive NETDEV_FEAT_CHANGE
- net: ipv4: really enforce backoff for redirects
- ALSA: hda/realtek - Limit int mic boost for Thinkpad T530
- ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
- ALSA: rawmidi: Initialize allocated buffers
- ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries
- x86: Fix early boot crash on gcc-10, third try
- exec: Move would_dump into flush_old_exec
- usb: gadget: net2272: Fix a memory leak in an error handling path in
  'net2272_plat_probe()'
- usb: gadget: audio: Fix a missing error return value in audio_bind()
- usb: gadget: legacy: fix error return code in gncm_bind()
- usb: gadget: legacy: fix error return code in cdc_bind()
- ARM: dts: r8a7740: Add missing extal2 to CPG node
- KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce
- Makefile: disallow d

[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker

2020-07-06 Thread Ubuntu Kernel Bot
** Changed in: kernel-sru-workflow/promote-to-updates
   Status: In Progress => Fix Released

** Description changed:

  This bug will contain status and test results related to a kernel source
  (or snap) as stated in the title.
  
  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  
  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-kvm
meta: linux-meta-kvm
- phase: Promote to Updates
- phase-changed: Monday, 06. July 2020 07:53 UTC
+ phase: Holding before Promote to Security
+ phase-changed: Monday, 06. July 2020 08:05 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
-   promote-to-updates: Ongoing -- packages not yet published
  variant: debs
  versions:
main: 4.4.0-1076.83
meta: 4.4.0.1076.74

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1882762

Title:
  xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker

Status in Kernel SRU Workflow:
  In Progress
Status in Kernel SRU Workflow automated-testing series:
  Fix Released
Status in Kernel SRU Workflow certification-testing series:
  Invalid
Status in Kernel SRU Workflow prepare-package series:
  Fix Released
Status in Kernel SRU Workflow prepare-package-meta series:
  Fix Released
Status in Kernel SRU Workflow promote-to-proposed series:
  Fix Released
Status in Kernel SRU Workflow promote-to-security series:
  New
Status in Kernel SRU Workflow promote-to-updates series:
  Fix Released
Status in Kernel SRU Workflow regression-testing series:
  Fix Released
Status in Kernel SRU Workflow security-signoff series:
  Fix Released
Status in Kernel SRU Workflow verification-testing series:
  Fix Released
Status in linux-kvm source package in Xenial:
  Fix Released

Bug description:
  This bug will contain status and test results related to a kernel
  source (or snap) as stated in the title.

  For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow

  -- swm properties --
  boot-testing-requested: true
  kernel-stable-master-bug: 1882770
  packages:
main: linux-kvm
meta: linux-meta-kvm
  phase: Holding before Promote to Security
  phase-changed: Monday, 06. July 2020 08:05 UTC
  proposed-announcement-sent: true
  proposed-testing-requested: true
  reason:
promote-to-security: Holding -- not ready for security (replication
  dwell)
  variant: debs
  versions:
main: 4.4.0-1076.83
meta: 4.4.0.1076.74

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882762/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp


[Group.of.nepali.translators] [Bug 1884159] Re: Update lockdown patches

2020-07-06 Thread AceLan Kao
** Also affects: linux-oem-osp1 (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-oem-osp1 (Ubuntu Xenial)

** No longer affects: linux-oem-osp1 (Ubuntu Eoan)

** No longer affects: linux-oem-osp1 (Ubuntu Focal)

** Changed in: linux-oem-osp1 (Ubuntu)
   Status: New => Invalid

** Changed in: linux-oem-osp1 (Ubuntu Bionic)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1884159

Title:
  Update lockdown patches

Status in linux package in Ubuntu:
  Fix Committed
Status in linux-oem-osp1 package in Ubuntu:
  Invalid
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Bionic:
  Fix Committed
Status in linux-oem-osp1 source package in Bionic:
  Fix Committed
Status in linux source package in Eoan:
  Fix Committed
Status in linux source package in Focal:
  Fix Committed

Bug description:
  Impact: The lockdown patches have evolved over time, and part of this
  was restricting more areas of the kernel. Not all of these additions
  were backported, and some can lead to lockdown bypasses, see [1] and
  [2].

  Fix: Backport newer lockdown restrictions to older releases.

  Test Case: Test cases for most of the backports can be found at [3],
  and [4] is another test case. Some which need e.g. specific hardware
  to test have not been tested.

  Regression Potential: Most of these are small, simple fixes with low
  potential for regression. Users may also lose access to some
  functionality previously accissible under secure boot. Some changes
  are more substantial, especially the hw_param and debugfs changes for
  xenial, but they are based on well-tested upstream code. The xmon
  backports also carry a more moderate risk of regression.

  [1] https://lists.ubuntu.com/archives/kernel-team/2020-June/111050.html
  [2] https://lore.kernel.org/lkml/20200615104332.901519-1-ja...@zx2c4.com/
  [3] https://git.launchpad.net/~sforshee/+git/lockdown-tests
  [4] 
https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1884159/+subscriptions

___
Mailing list: https://launchpad.net/~group.of.nepali.translators
Post to : group.of.nepali.translators@lists.launchpad.net
Unsubscribe : https://launchpad.net/~group.of.nepali.translators
More help   : https://help.launchpad.net/ListHelp