[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-snapdragon meta: linux-meta-snapdragon - phase: Promote to Security - phase-changed: Tuesday, 07. July 2020 05:18 UTC + phase: Complete + phase-changed: Tuesday, 07. July 2020 06:37 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published + reason: {} trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1882765 variant: debs versions: main: 4.4.0-1139.147 meta: 4.4.0.1139.131 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882766 Title: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-snapdragon source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-snapdragon meta: linux-meta-snapdragon phase: Complete phase-changed: Tuesday, 07. July 2020 06:37 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1882765 variant: debs versions: main: 4.4.0-1139.147 meta: 4.4.0.1139.131 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882766/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885514] Re: xenial/linux: 4.4.0-186.216 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/certification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/verification-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true + bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed - phase: Promote to Proposed - phase-changed: Tuesday, 07. July 2020 05:07 UTC + phase: Testing + phase-changed: Tuesday, 07. July 2020 06:37 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + certification-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: trusty/linux-aws: bug 1885512 trusty/linux-lts-xenial: bug 1885513 xenial/linux-aws: bug 1885503 xenial/linux-cascade: bug 1885505 xenial/linux-fips: bug 1885511 xenial/linux-kvm: bug 1885506 xenial/linux-raspi2: bug 1885508 xenial/linux-snapdragon: bug 1885510 xenial/linux/caracalla-kernel: bug 1885499 xenial/linux/pc-kernel: bug 1885500 xenial/linux/stlouis-kernel: bug 1885501 variant: debs versions: main: 4.4.0-186.216 meta: 4.4.0.186.192 signed: 4.4.0-186.216 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885514 Title: xenial/linux: 4.4.0-186.216 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: In Progress Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed phase: Testing phase-changed: Tuesday, 07. July 2020 06:37 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress certification-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: trusty/linux-aws: bug 1885512 trusty/linux-lts-xenial: bug 1885513 xenial/linux-aws: bug 1885503 xenial/linux-cascade: bug 1885505 xenial/linux-fips: bug 1885511 xenial/linux-kvm: bug 1885506 xenial/linux-raspi2: bug 1885508 xenial/linux-snapdragon: bug 1885510 xenial/linux/caracalla-kernel: bug 1885499 xenial/linux/pc-kernel: bug 1885500 xenial/linux/stlouis-kernel: bug 1885501 variant: debs versions: main: 4.4.0-186.216 meta: 4.4.0.186.192 signed: 4.4.0-186.216 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885514/+subscriptions
[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-kvm meta: linux-meta-kvm - phase: Promote to Security - phase-changed: Tuesday, 07. July 2020 05:18 UTC + phase: Complete + phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published + reason: {} variant: debs versions: main: 4.4.0-1076.83 meta: 4.4.0.1076.74 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882762 Title: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-kvm source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-kvm meta: linux-meta-kvm phase: Complete phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} variant: debs versions: main: 4.4.0-1076.83 meta: 4.4.0.1076.74 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882762/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Promote to Security - phase-changed: Tuesday, 07. July 2020 05:18 UTC + phase: Complete + phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published + reason: {} trackers: xenial/linux-raspi2/pi2-kernel: bug 1882763 variant: debs versions: main: 4.4.0-1135.144 meta: 4.4.0.1135.135 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882764 Title: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-raspi2 source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Complete phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: xenial/linux-raspi2/pi2-kernel: bug 1882763 variant: debs versions: main: 4.4.0-1135.144 meta: 4.4.0.1135.135 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882764/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882770] Re: xenial/linux: 4.4.0-185.215 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed - phase: Promote to Security - phase-changed: Tuesday, 07. July 2020 05:16 UTC + phase: Complete + phase-changed: Tuesday, 07. July 2020 06:22 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published + reason: {} trackers: trusty/linux-aws: bug 1882768 trusty/linux-lts-xenial: bug 1882769 xenial/linux-aws: bug 1882759 xenial/linux-cascade: bug 1882761 xenial/linux-fips: bug 1882767 xenial/linux-kvm: bug 1882762 xenial/linux-raspi2: bug 1882764 xenial/linux-snapdragon: bug 1882766 xenial/linux/caracalla-kernel: bug 1882755 xenial/linux/pc-kernel: bug 1882756 xenial/linux/stlouis-kernel: bug 1882757 variant: debs versions: main: 4.4.0-185.215 meta: 4.4.0.185.191 signed: 4.4.0-185.215 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882770 Title: xenial/linux: 4.4.0-185.215 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed phase: Complete phase-changed: Tuesday, 07. July 2020 06:22 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: trusty/linux-aws: bug 1882768 trusty/linux-lts-xenial: bug 1882769 xenial/linux-aws: bug 1882759 xenial/linux-cascade: bug 1882761 xenial/linux-fips: bug 1882767 xenial/linux-kvm: bug 1882762 xenial/linux-raspi2: bug 1882764 xenial/linux-snapdragon: bug 1882766 xenial/linux/caracalla-kernel: bug 1882755 xenial/linux/pc-kernel: bug 1882756 xenial/linux/stlouis-kernel: bug 1882757 variant: debs versions: main: 4.4.0-185.215 meta: 4.4.0.185.191 signed: 4.4.0-185.215 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882770/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-aws meta: linux-meta-aws - phase: Promote to Security - phase-changed: Tuesday, 07. July 2020 05:18 UTC + phase: Complete + phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-security: Ongoing -- packages not yet published + reason: {} trackers: xenial/linux-aws/aws-kernel: bug 1882758 variant: debs versions: main: 4.4.0-1110.121 meta: 4.4.0.1110.114 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882759 Title: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Fix Released Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-aws source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-aws meta: linux-meta-aws phase: Complete phase-changed: Tuesday, 07. July 2020 06:23 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: xenial/linux-aws/aws-kernel: bug 1882758 variant: debs versions: main: 4.4.0-1110.121 meta: 4.4.0.1110.114 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882759/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885812] Re: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885813 packages: main: linux-deeplens meta: linux-meta-deeplens - phase: Packaging - phase-changed: Monday, 06. July 2020 20:52 UTC + phase: Building in ppa + phase-changed: Tuesday, 07. July 2020 05:39 UTC reason: - prepare-package: Pending -- tag not published and package not - uploaded - prepare-package-meta: Pending -- tag not published and package not - uploaded + build-packages-ppa: Pending -- building in ppa main:building + meta:queued variant: debs + versions: + main: 4.15.0-1031.31 + meta: 4.15.0.1031.31 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885812 Title: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885813 packages: main: linux-deeplens meta: linux-meta-deeplens phase: Building in ppa phase-changed: Tuesday, 07. July 2020 05:39 UTC reason: build-packages-ppa: Pending -- building in ppa main:building meta:queued variant: debs versions: main: 4.15.0-1031.31 meta: 4.15.0.1031.31 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885812/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1886491] Re: Applying package profile on Xenial doesn't work
It looks like python-apt (1.1.0~beta1ubuntu0.16.04.7) created a regression and elects to ignore Acquire::AllowInsecureRepositories in favor of APT::Get::AllowUnauthenticated. The simpler approach would likely be to backport the [trusted=true] fix we've got working with later releases, instead of trying anything related to the global apt config. ** Also affects: landscape-client (Ubuntu) Importance: Undecided Status: New ** Also affects: landscape-client (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: landscape-client (Ubuntu Xenial) Status: New => Confirmed ** No longer affects: landscape-client -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1886491 Title: Applying package profile on Xenial doesn't work Status in landscape-client package in Ubuntu: New Status in landscape-client source package in Xenial: Confirmed Bug description: [Impact] * Users trying to apply changes to package profiles through landscape will get an error in the activity. This will result in incomplete apt source list on those clients. [Test Case] * install landscape-server-quickstart and landscape-api * Create a package profile "minimum packages" and add basic packages (byobu, vim, ubuntu-cloud-keyring). Enable for all computers * create a xenial container or machine and install/configure landscape-client Note that the apply package profile gets stuck and doesn't progress. On the container that was created, running apt update shows: sudo apt update Get:1 file:/var/lib/landscape/client/package/binaries ./ InRelease Ign:1 file:/var/lib/landscape/client/package/binaries ./ InRelease Get:2 file:/var/lib/landscape/client/package/binaries ./ Release Err:2 file:/var/lib/landscape/client/package/binaries ./ Release File not found - /var/lib/landscape/client/package/binaries/./Release (2: No such file or directory) Get:3 http://mirror/ubuntu xenial InRelease [247 kB] Hit:4 http://mirror/ubuntu xenial-updates InRelease Hit:5 http://mirror/ubuntu xenial-backports InRelease Hit:6 http://mirror/ubuntu xenial-security InRelease Reading package lists... Done E: The repository 'file:/var/lib/landscape/client/package/binaries ./ Release' does not have a Release file. N: Updating from such a repository can't be done securely, and is therefore disabled by default. N: See apt-secure(8) manpage for repository creation and user configuration details. apt-cache policy landscape-client landscape-client: Installed: 16.03-0ubuntu2.16.04.7 Candidate: 16.03-0ubuntu2.16.04.7 Version table: *** 16.03-0ubuntu2.16.04.7 500 500 http://mirror/ubuntu xenial-updates/main amd64 Packages 100 /var/lib/dpkg/status 16.03-0ubuntu2 500 500 http://mirror/ubuntu xenial/main amd64 Packages This can be easily worked around by: * Remove the file /etc/apt/sources.list.d/_landscape-internal-facade.list * add-apt-repository ppa:landscape/19.01 * apt install landscape-client apt-cache policy landscape-client landscape-client: Installed: 18.03~1070~git.8e52e1d~ubuntu16.04.1 Candidate: 18.03~1070~git.8e52e1d~ubuntu16.04.1 Version table: *** 18.03~1070~git.8e52e1d~ubuntu16.04.1 500 500 http://ppa.launchpad.net/landscape/19.01/ubuntu xenial/main amd64 Packages 100 /var/lib/dpkg/status 16.03-0ubuntu2.16.04.7 500 500 http://mirror.glacier.dev/ubuntu xenial-updates/main amd64 Packages 16.03-0ubuntu2 500 500 http://mirror.glacier.dev/ubuntu xenial/main amd64 Packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/landscape-client/+bug/1886491/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885055] Re: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885057 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 17:22 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 22:28 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: xenial/linux-azure/azure-kernel: bug 1885054 variant: debs versions: main: 4.15.0-1091.101~16.04.1 meta: 4.15.0.1091.86 signed: 4.15.0-1091.101~16.04.1 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885055 Title: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow stakeholder-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-azure source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885057 packages: main: linux-azure meta: linux-meta-azure signed: linux-signed-azure phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 22:28 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) trackers: xenial/linux-azure/azure-kernel: bug 1885054 variant: debs versions: main: 4.15.0-1091.101~16.04.1 meta: 4.15.0.1091.86 signed: 4.15.0-1091.101~16.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885055/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885506] Re: xenial/linux-kvm: 4.4.0-1077.84 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885514 packages: main: linux-kvm meta: linux-meta-kvm - phase: Packaging - phase-changed: Wednesday, 01. July 2020 23:12 UTC + phase: Building in ppa + phase-changed: Monday, 06. July 2020 22:26 UTC reason: - prepare-package: Stalled -- package not uploaded - prepare-package-meta: Stalled -- package not uploaded + build-packages-ppa: Pending -- building in ppa main:queued variant: debs versions: main: 4.4.0-1077.84 meta: 4.4.0.1077.75 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885506 Title: xenial/linux-kvm: 4.4.0-1077.84 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-kvm source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885514 packages: main: linux-kvm meta: linux-meta-kvm phase: Building in ppa phase-changed: Monday, 06. July 2020 22:26 UTC reason: build-packages-ppa: Pending -- building in ppa main:queued variant: debs versions: main: 4.4.0-1077.84 meta: 4.4.0.1077.75 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885506/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885812] Re: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885813 packages: main: linux-deeplens meta: linux-meta-deeplens - phase: Ready for Packaging - phase-changed: Monday, 06. July 2020 16:50 UTC + phase: Packaging + phase-changed: Monday, 06. July 2020 20:52 UTC reason: - prepare-package: Pending -- version not specified + prepare-package: Pending -- tag not published and package not + uploaded + prepare-package-meta: Pending -- tag not published and package not + uploaded variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885812 Title: xenial/linux-deeplens: 4.15.0-1031.31 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885813 packages: main: linux-deeplens meta: linux-meta-deeplens phase: Packaging phase-changed: Monday, 06. July 2020 20:52 UTC reason: prepare-package: Pending -- tag not published and package not uploaded prepare-package-meta: Pending -- tag not published and package not uploaded variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885812/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1493303] Re: [OSSA 2016-004] Swift proxy memory leak on unfinished read (CVE-2016-0738)
This bug was fixed in the package swift - 1.13.1-0ubuntu1.5 --- swift (1.13.1-0ubuntu1.5) trusty-security; urgency=medium [ Jamie Strandboge ] * SECURITY UPDATE: disallow unsafe tempurl operations to point to unauthorized data - debian/patches/CVE-2015-5223.patch: disallow creation of DLO object manifests if non-safe tempurl request includes X-Object-Manifest header - CVE-2015-5223 - LP: #1453948 [ Marc Deslauriers ] * SECURITY UPDATE: DoS via incorrectly closed client connections - debian/patches/CVE-2016-0737.patch: get better at closing WSGI iterables in swift/common/middleware/dlo.py, swift/common/middleware/slo.py, swift/common/request_helpers.py, swift/common/swob.py, swift/common/utils.py, test/unit/common/middleware/helpers.py, test/unit/common/middleware/test_dlo.py, test/unit/common/middleware/test_slo.py. - CVE-2016-0737 * SECURITY UPDATE: DoS via incorrectly closed server connections - debian/patches/CVE-2016-0738.patch: fix memory/socket leak in proxy on truncated SLO/DLO GET in swift/common/request_helpers.py, test/unit/common/middleware/test_slo.py. - CVE-2016-0738 * Thanks to Red Hat for the patch backports! * debian/patches/fix-ubuntu-tests.patch: disable another test that no longer works on buildds. -- Marc Deslauriers Tue, 12 Sep 2017 07:36:43 -0400 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2015-5223 ** Changed in: swift (Ubuntu Trusty) Status: New => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1493303 Title: [OSSA 2016-004] Swift proxy memory leak on unfinished read (CVE-2016-0738) Status in Ubuntu Cloud Archive: Invalid Status in Ubuntu Cloud Archive icehouse series: Triaged Status in Ubuntu Cloud Archive kilo series: Triaged Status in Ubuntu Cloud Archive liberty series: Triaged Status in Ubuntu Cloud Archive mitaka series: Fix Released Status in OpenStack Security Advisory: Fix Released Status in OpenStack Object Storage (swift): Fix Released Status in swift package in Ubuntu: Fix Released Status in swift source package in Trusty: Fix Released Status in swift source package in Wily: Won't Fix Status in swift source package in Xenial: Fix Released Status in swift source package in Yakkety: Fix Released Bug description: It looks like the Swift proxy will leak memory if the connection is closed and the full response is not read. This opens for a potential DoS attacks. Reproduce: $ swift -A http://localhost:/auth/v1.0 -U .. -K .. upload --use-slo --segment-size 1048576 $ curl -H'X-Auth-Token: AUTH_...' "http://localhost:/v1/AUTH_..//" -m 0.001 > /dev/null Repeat the curl command a couple of times and you will have more information in netstat and sockstat. The important part is the -m which sets the max time curl spends at downloading. After that point, it'll close the connection. $ sudo netstat -ant -p | grep :6000 $ cat /proc/net/sockstat tcp0 0 127.0.0.1:6000 0.0.0.0:* LISTEN 1358/python tcp0 43221 127.0.0.1:6000 127.0.0.1:48350 FIN_WAIT1 - tcp0 43221 127.0.0.1:6000 127.0.0.1:48882 FIN_WAIT1 - tcp 939820 0 127.0.0.1:48350 127.0.0.1:6000 ESTABLISHED 17897/python tcp 939820 0 127.0.0.1:48882 127.0.0.1:6000 ESTABLISHED 17890/python tcp 983041 0 127.0.0.1:48191 127.0.0.1:6000 CLOSE_WAIT 17897/python tcp 983041 0 127.0.0.1:48948 127.0.0.1:6000 CLOSE_WAIT 17892/python Restarting the proxy frees up the lingering memory. This problem did not exist in 2.2.0. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: swift 2.2.2-0ubuntu1~cloud0 [origin: Canonical] ProcVersionSignature: Ubuntu 3.16.0-48.64~14.04.1-generic 3.16.7-ckt15 Uname: Linux 3.16.0-48-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.12 Architecture: amd64 CrashDB: { "impl": "launchpad", "project": "cloud-archive", "bug_pattern_url": "http://people.canonical.com/~ubuntu-archive/bugpatterns/bugpatterns.xml";, } Date: Tue Sep 8 09:55:05 2015 InstallationDate: Installed on 2015-06-22 (77 days ago) InstallationMedia: Ubuntu-Server 14.04.2 LTS "Trusty Tahr" - Release amd64 (20150218.1) PackageArchitecture: all SourcePackage: swift UpgradeStatus: No upgrade log present (probably fresh install) To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-archive/+bug/1493303/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to
[Group.of.nepali.translators] [Bug 1882738] Re: xenial/linux-azure: 4.15.0-1090.100~16.04.1 -proposed tracker
*** This bug is a duplicate of bug 1885055 *** https://bugs.launchpad.net/bugs/1885055 This bug was fixed in the package linux-azure - 4.15.0-1091.101~16.04.1 --- linux-azure (4.15.0-1091.101~16.04.1) xenial; urgency=medium * xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker (LP: #1885055) [ Ubuntu: 4.15.0-1091.101 ] * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP: #1885057) * linux-azure: Update SGX version to version LD_1.33 (LP: #1881338) - SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C * Packaging resync (LP: #1786013) - [Packaging] update helper scripts - update dkms package versions * Build and ship a signed wireguard.ko (LP: #1861284) - [Packaging] wireguard -- add support for building signed .ko * CVE-2019-16089 - SAUCE: nbd_genl_status: null check for nla_nest_start * CVE-2019-19642 - kernel/relay.c: handle alloc_percpu returning NULL in relay_open * CVE-2019-12380 - efi/x86/Add missing error handling to old_memmap 1:1 mapping code * CVE-2019-19039 // CVE-2019-19377 - btrfs: sink flush_fn to extent_write_cache_pages - btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up - btrfs: Don't submit any btree write bio if the fs has errors * CVE-2019-19036 - btrfs: volumes: Use more straightforward way to calculate map length - btrfs: tree-checker: Try to detect missing INODE_ITEM - Btrfs: tree-checker: detect file extent items with overlapping ranges - Btrfs: make tree checker detect checksum items with overlapping ranges - btrfs: harden agaist duplicate fsid on scanned devices - Btrfs: fix missing data checksums after replaying a log tree - btrfs: reloc: fix reloc root leak and NULL pointer dereference - btrfs: Validate child tree block's level and first key - btrfs: Detect unbalanced tree with empty leaf before crashing btree operations * CVE-2019-19318 - btrfs: tree-checker: Replace root parameter with fs_info - btrfs: tree-checker: Check level for leaves and nodes - btrfs: tree-checker: get fs_info from eb in generic_err - btrfs: tree-checker: get fs_info from eb in file_extent_err - btrfs: tree-checker: get fs_info from eb in check_csum_item - btrfs: tree-checker: get fs_info from eb in dir_item_err - btrfs: tree-checker: get fs_info from eb in check_dir_item - btrfs: tree-checker: get fs_info from eb in block_group_err - btrfs: tree-checker: get fs_info from eb in check_block_group_item - btrfs: tree-checker: get fs_info from eb in check_extent_data_item - btrfs: tree-checker: get fs_info from eb in check_leaf_item - btrfs: tree-checker: get fs_info from eb in check_leaf - btrfs: tree-checker: get fs_info from eb in chunk_err - btrfs: tree-checker: get fs_info from eb in dev_item_err - btrfs: tree-checker: get fs_info from eb in check_dev_item - btrfs: tree-checker: get fs_info from eb in check_inode_item - btrfs: tree-checker: Add ROOT_ITEM check - btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check - btrfs: tree-checker: Add simple keyed refs check - btrfs: tree-checker: Add EXTENT_DATA_REF check - btrfs: tree-checker: Fix wrong check on max devid - Btrfs: fix selftests failure due to uninitialized i_mode in test inodes * CVE-2019-19813 // CVE-2019-19816 - btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info - btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it - btrfs: tree-checker: Make chunk item checker messages more readable - btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO - btrfs: tree-checker: Check chunk item at tree block read time - btrfs: tree-checker: Verify dev item - btrfs: tree-checker: Enhance chunk checker to validate chunk profile - btrfs: tree-checker: Verify inode item - btrfs: inode: Verify inode mode to avoid NULL pointer dereference * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Build Nvidia drivers in conjunction with kernel (LP: #1764792) - [Packaging] disable nvidia dkms builds for mainline * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801) - i2c: dev: Fix the race between the release of i2c_dev and cdev - ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - evm: Check also if *tfm is an error pointer in init_desc() - ima: Fix return value of ima_write_policy() - fix multiplication overflow in copy_fdtable() - iommu/amd: Fix over-read of ACPI UID from IVRS table - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' - ubi: Fix seq_file usage in detailed_erase_block_info debugfs file - gcc-common.h: Update for GCC 10 - HID: multitouch: add eGalaxTouch P80H84 support - scsi: qla2xxx: Fix
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-azure - 5.3.0-1032.33 --- linux-azure (5.3.0-1032.33) eoan; urgency=medium * eoan/linux-azure: 5.3.0-1032.33 -proposed tracker (LP: #1885051) * linux-azure: Update SGX version to version LD_1.33 (LP: #1881338) - SAUCE: linux-azure: Update SGX to version LD_1.33 - SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C [ Ubuntu: 5.3.0-62.56 ] * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * Eoan update: upstream stable patchset 2020-06-05 (LP: #1882303) - i2c: dev: Fix the race between the release of i2c_dev and cdev - KVM: SVM: Fix potential memory leak in svm_cpu_init() - ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - evm: Check also if *tfm is an error pointer in init_desc() - ima: Fix return value of ima_write_policy() - mtd: spinand: Propagate ECC information to the MTD structure - fix multiplication overflow in copy_fdtable() - ubifs: remove broken lazytime support - iommu/amd: Fix over-read of ACPI UID from IVRS table - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' - ubi: Fix seq_file usage in detailed_erase_block_info debugfs file - gcc-common.h: Update for GCC 10 - HID: multitouch: add eGalaxTouch P80H84 support - HID: alps: Add AUI1657 device ID - HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV - scsi: qla2xxx: Delete all sessions before unregister local nvme port - configfs: fix config_item refcnt leak in configfs_rmdir() - vhost/vsock: fix packet delivery order to monitoring devices - aquantia: Fix the media type of AQC100 ethernet controller in the driver - component: Silence bind error on -EPROBE_DEFER - scsi: ibmvscsi: Fix WARN_ON during event pool release - HID: i2c-hid: reset Synaptics SYNA2393 on resume - x86/apic: Move TSC deadline timer debug printk - gtp: set NLM_F_MULTI flag in gtp_genl_dump_pdp() - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock - ceph: fix double unlock in handle_cap_export() - stmmac: fix pointer check after utilization in stmmac_interrupt - USB: core: Fix misleading driver bug report - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA - ARM: futex: Address build warning - padata: Replace delayed timer with immediate workqueue in padata_reorder - padata: initialize pd->cpu with effective cpumask - padata: purge get_cpu and reorder_via_wq from padata_do_serial - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option - ALSA: pcm: fix incorrect hw_base increase - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme - ALSA: hda/realtek - Add more fixup entries for Clevo machines - drm/etnaviv: fix perfmon domain interation - apparmor: fix potential label refcnt leak in aa_change_profile - apparmor: Fix aa_label refcnt leak in policy_update - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' - dmaengine: owl: Use correct lock in owl_dma_get_pchan() - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance. - powerpc: Remove STRICT_KERNEL_RWX incompatibility with RELOCATABLE - powerpc/64s: Disable STRICT_KERNEL_RWX - media: fdp1: Fix R-Car M3-N naming in debug message - Revert "net/ibmvnic: Fix EOI when running in XIVE mode" - Revert "gfs2: Don't demote a glock until its revokes are written" - staging: iio: ad2s1210: Fix SPI reading - staging: greybus: Fix uninitialized scalar variable - iio: sca3000: Remove an erroneous 'get_device()' - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' - misc: rtsx: Add short delay after exit from ASPM - mei: release me_cl object reference - ipack: tpci200: fix error return code in tpci200_register() - rapidio: fix an error in get_user_pages_fast() error handling - rxrpc: Fix a memory leak in rxkad_verify_response() - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks - iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() - iio: adc: stm32-adc: fix device used to request dma - iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() - iio: adc: stm32-dfsdm: fix device used to request dma - rxrpc: Trace discarded ACKs - rxrpc: Fix ack discard - ubifs: fix wrong use of crypto_shash_descsize() - i2c: fix missing pm_runtime_put_sync in i2c_device_probe - evm: Fix a small race in init_desc() - afs: Don't unlock fetched data pages until the op completes success
[Group.of.nepali.translators] [Bug 1885055] Re: xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker
This bug was fixed in the package linux-azure - 4.15.0-1091.101~16.04.1 --- linux-azure (4.15.0-1091.101~16.04.1) xenial; urgency=medium * xenial/linux-azure: 4.15.0-1091.101~16.04.1 -proposed tracker (LP: #1885055) [ Ubuntu: 4.15.0-1091.101 ] * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP: #1885057) * linux-azure: Update SGX version to version LD_1.33 (LP: #1881338) - SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C * Packaging resync (LP: #1786013) - [Packaging] update helper scripts - update dkms package versions * Build and ship a signed wireguard.ko (LP: #1861284) - [Packaging] wireguard -- add support for building signed .ko * CVE-2019-16089 - SAUCE: nbd_genl_status: null check for nla_nest_start * CVE-2019-19642 - kernel/relay.c: handle alloc_percpu returning NULL in relay_open * CVE-2019-12380 - efi/x86/Add missing error handling to old_memmap 1:1 mapping code * CVE-2019-19039 // CVE-2019-19377 - btrfs: sink flush_fn to extent_write_cache_pages - btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up - btrfs: Don't submit any btree write bio if the fs has errors * CVE-2019-19036 - btrfs: volumes: Use more straightforward way to calculate map length - btrfs: tree-checker: Try to detect missing INODE_ITEM - Btrfs: tree-checker: detect file extent items with overlapping ranges - Btrfs: make tree checker detect checksum items with overlapping ranges - btrfs: harden agaist duplicate fsid on scanned devices - Btrfs: fix missing data checksums after replaying a log tree - btrfs: reloc: fix reloc root leak and NULL pointer dereference - btrfs: Validate child tree block's level and first key - btrfs: Detect unbalanced tree with empty leaf before crashing btree operations * CVE-2019-19318 - btrfs: tree-checker: Replace root parameter with fs_info - btrfs: tree-checker: Check level for leaves and nodes - btrfs: tree-checker: get fs_info from eb in generic_err - btrfs: tree-checker: get fs_info from eb in file_extent_err - btrfs: tree-checker: get fs_info from eb in check_csum_item - btrfs: tree-checker: get fs_info from eb in dir_item_err - btrfs: tree-checker: get fs_info from eb in check_dir_item - btrfs: tree-checker: get fs_info from eb in block_group_err - btrfs: tree-checker: get fs_info from eb in check_block_group_item - btrfs: tree-checker: get fs_info from eb in check_extent_data_item - btrfs: tree-checker: get fs_info from eb in check_leaf_item - btrfs: tree-checker: get fs_info from eb in check_leaf - btrfs: tree-checker: get fs_info from eb in chunk_err - btrfs: tree-checker: get fs_info from eb in dev_item_err - btrfs: tree-checker: get fs_info from eb in check_dev_item - btrfs: tree-checker: get fs_info from eb in check_inode_item - btrfs: tree-checker: Add ROOT_ITEM check - btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check - btrfs: tree-checker: Add simple keyed refs check - btrfs: tree-checker: Add EXTENT_DATA_REF check - btrfs: tree-checker: Fix wrong check on max devid - Btrfs: fix selftests failure due to uninitialized i_mode in test inodes * CVE-2019-19813 // CVE-2019-19816 - btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info - btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it - btrfs: tree-checker: Make chunk item checker messages more readable - btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO - btrfs: tree-checker: Check chunk item at tree block read time - btrfs: tree-checker: Verify dev item - btrfs: tree-checker: Enhance chunk checker to validate chunk profile - btrfs: tree-checker: Verify inode item - btrfs: inode: Verify inode mode to avoid NULL pointer dereference * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Build Nvidia drivers in conjunction with kernel (LP: #1764792) - [Packaging] disable nvidia dkms builds for mainline * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801) - i2c: dev: Fix the race between the release of i2c_dev and cdev - ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - evm: Check also if *tfm is an error pointer in init_desc() - ima: Fix return value of ima_write_policy() - fix multiplication overflow in copy_fdtable() - iommu/amd: Fix over-read of ACPI UID from IVRS table - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' - ubi: Fix seq_file usage in detailed_erase_block_info debugfs file - gcc-common.h: Update for GCC 10 - HID: multitouch: add eGalaxTouch P80H84 support - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV - configfs: fix config_item refcnt leak i
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-azure-4.15 - 4.15.0-1091.101 --- linux-azure-4.15 (4.15.0-1091.101) bionic; urgency=medium * bionic/linux-azure-4.15: 4.15.0-1091.101 -proposed tracker (LP: #1885057) * linux-azure: Update SGX version to version LD_1.33 (LP: #1881338) - SAUCE: ubuntu/sgx: Add module alias for ACPI device INT0E0C [ Ubuntu: 4.15.0-109.110 ] * Packaging resync (LP: #1786013) - [Packaging] update helper scripts - update dkms package versions * Build and ship a signed wireguard.ko (LP: #1861284) - [Packaging] wireguard -- add support for building signed .ko * CVE-2019-16089 - SAUCE: nbd_genl_status: null check for nla_nest_start * CVE-2019-19642 - kernel/relay.c: handle alloc_percpu returning NULL in relay_open * CVE-2019-12380 - efi/x86/Add missing error handling to old_memmap 1:1 mapping code * CVE-2019-19039 // CVE-2019-19377 - btrfs: sink flush_fn to extent_write_cache_pages - btrfs: extent_io: Move the BUG_ON() in flush_write_bio() one level up - btrfs: Don't submit any btree write bio if the fs has errors * CVE-2019-19036 - btrfs: volumes: Use more straightforward way to calculate map length - btrfs: tree-checker: Try to detect missing INODE_ITEM - Btrfs: tree-checker: detect file extent items with overlapping ranges - Btrfs: make tree checker detect checksum items with overlapping ranges - btrfs: harden agaist duplicate fsid on scanned devices - Btrfs: fix missing data checksums after replaying a log tree - btrfs: reloc: fix reloc root leak and NULL pointer dereference - btrfs: Validate child tree block's level and first key - btrfs: Detect unbalanced tree with empty leaf before crashing btree operations * CVE-2019-19318 - btrfs: tree-checker: Replace root parameter with fs_info - btrfs: tree-checker: Check level for leaves and nodes - btrfs: tree-checker: get fs_info from eb in generic_err - btrfs: tree-checker: get fs_info from eb in file_extent_err - btrfs: tree-checker: get fs_info from eb in check_csum_item - btrfs: tree-checker: get fs_info from eb in dir_item_err - btrfs: tree-checker: get fs_info from eb in check_dir_item - btrfs: tree-checker: get fs_info from eb in block_group_err - btrfs: tree-checker: get fs_info from eb in check_block_group_item - btrfs: tree-checker: get fs_info from eb in check_extent_data_item - btrfs: tree-checker: get fs_info from eb in check_leaf_item - btrfs: tree-checker: get fs_info from eb in check_leaf - btrfs: tree-checker: get fs_info from eb in chunk_err - btrfs: tree-checker: get fs_info from eb in dev_item_err - btrfs: tree-checker: get fs_info from eb in check_dev_item - btrfs: tree-checker: get fs_info from eb in check_inode_item - btrfs: tree-checker: Add ROOT_ITEM check - btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check - btrfs: tree-checker: Add simple keyed refs check - btrfs: tree-checker: Add EXTENT_DATA_REF check - btrfs: tree-checker: Fix wrong check on max devid - Btrfs: fix selftests failure due to uninitialized i_mode in test inodes * CVE-2019-19813 // CVE-2019-19816 - btrfs: Refactor parameter of BTRFS_MAX_DEVS() from root to fs_info - btrfs: Move btrfs_check_chunk_valid() to tree-check.[ch] and export it - btrfs: tree-checker: Make chunk item checker messages more readable - btrfs: tree-checker: Make btrfs_check_chunk_valid() return EUCLEAN instead of EIO - btrfs: tree-checker: Check chunk item at tree block read time - btrfs: tree-checker: Verify dev item - btrfs: tree-checker: Enhance chunk checker to validate chunk profile - btrfs: tree-checker: Verify inode item - btrfs: inode: Verify inode mode to avoid NULL pointer dereference * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Build Nvidia drivers in conjunction with kernel (LP: #1764792) - [Packaging] disable nvidia dkms builds for mainline * Bionic update: upstream stable patchset 2020-06-02 (LP: #1881801) - i2c: dev: Fix the race between the release of i2c_dev and cdev - ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash() - evm: Check also if *tfm is an error pointer in init_desc() - ima: Fix return value of ima_write_policy() - fix multiplication overflow in copy_fdtable() - iommu/amd: Fix over-read of ACPI UID from IVRS table - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' - ubi: Fix seq_file usage in detailed_erase_block_info debugfs file - gcc-common.h: Update for GCC 10 - HID: multitouch: add eGalaxTouch P80H84 support - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV - configfs: fix config_item refcnt leak in configfs_rmdir() - vhost/vsock: fix packet delivery order to monitoring devices
[Group.of.nepali.translators] [Bug 1885813] Re: xenial/linux-hwe: 4.15.0-110.111~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-meta Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/prepare-package-signed Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/prepare-package-signed Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885814 packages: main: linux-hwe meta: linux-meta-hwe signed: linux-signed-hwe - phase: Packaging - phase-changed: Monday, 06. July 2020 15:32 UTC + phase: Building in ppa + phase-changed: Monday, 06. July 2020 16:49 UTC reason: - prepare-package: Pending -- tag not published and package not - uploaded - prepare-package-meta: Pending -- tag not published and package not - uploaded - prepare-package-signed: Pending -- tag not published and package not - uploaded + build-packages-ppa: Ongoing -- building in ppa main:building trackers: xenial/linux-deeplens: bug 1885812 variant: debs + versions: + main: 4.15.0-110.111~16.04.1 + meta: 4.15.0.110.113 + signed: 4.15.0-110.111~16.04.1 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885813 Title: xenial/linux-hwe: 4.15.0-110.111~16.04.1 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: New Status in Kernel SRU Workflow certification-testing series: New Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux-hwe source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1885814 packages: main: linux-hwe meta: linux-meta-hwe signed: linux-signed-hwe phase: Building in ppa phase-changed: Monday, 06. July 2020 16:49 UTC reason: build-packages-ppa: Ongoing -- building in ppa main:building trackers: xenial/linux-deeplens: bug 1885812 variant: debs versions: main: 4.15.0-110.111~16.04.1 meta: 4.15.0.110.113 signed: 4.15.0-110.111~16.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885813/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1878214] Re: [Xenial] dahdi-dkms fails to build after kernel version 4.4.218
This bug was fixed in the package dahdi-linux - 1:2.10.2~dfsg-1ubuntu4 --- dahdi-linux (1:2.10.2~dfsg-1ubuntu4) xenial; urgency=medium * Linux 4.4.218 FTBS fix (LP: #1878214) - d/p/kernel-compat-4.4.218.patch -- Stefan Bader Tue, 12 May 2020 15:55:16 +0200 ** Changed in: dahdi-linux (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1878214 Title: [Xenial] dahdi-dkms fails to build after kernel version 4.4.218 Status in dahdi-linux package in Ubuntu: Invalid Status in dahdi-linux source package in Xenial: Fix Released Bug description: In upstream stable 4.4.218, the following patch brings back kref_read() which was re-implemented in dahdi-linux code for kernel versions before 4.11: commit 408f17931f5451702ad638e1d8511e780f6b56e7 Author: Peter Zijlstra Date: Mon Nov 14 17:29:48 2016 +0100 locking/atomic, kref: Add kref_read() This needs adjustment now in Xenial for kernels including 4.4.218 and later. [SRU Justification] == Impact == Dahdi-dkms fails to build for kernels which include upstream stable version 4.4.218 or later. https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac /autopkgtest-xenial/xenial/amd64/d/dahdi- linux/20200511_051631_1b525@/log.gz == Fix == Disable the internal re-implementation of kref_read() for kernels including upstream stable 4.4.218. == Testcase == Running dkms build for various kernel versions (tested with Ubuntu-4.4.0-178 and Ubuntu-4.4.0-179). With -178 building currently succeeds, with -179 it fails. == Risk of Regression == Low, internal implementation which was backported from kernel 4.11 gets replaced by the kernel function. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dahdi-linux/+bug/1878214/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.19.10.1 --- sosreport (3.9.1-1ubuntu0.19.10.1) eoan; urgency=medium * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320) This maintenance release includes: - New plugins: sos_extras, ovirt_engine_backup, console, validation_framework. - lxd plugin collections have been overhauled. - Fixed handling of the namespace pattern for the networking plugin. - A basic path is now defined in Policy for all subclasses. Plugin API Enhancements: - Enablement checks have been extended to include architecture constraints. - SoSPredicate has been extended to include architecture constraints, as well as negative constraints for all elements. - Plugins will now capture service status information for all services defined in the services class attr. Further release information and tarballs are available at: - https://github.com/sosreport/sos/releases/tag/3.9.1 * Former patches now fixed upstream: - d/p/0001-unittest-py3-fix.patch - d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch * Other specific modifications: - d/p/0001-lshw-command.patch - d/p/0002-lds-substitute-oidc-conf.patch - d/p/0003-kvm-change-trigger-to-dev-kvm.patch -- Eric Desrochers Tue, 16 Jun 2020 12:18:58 + ** Changed in: sosreport (Ubuntu Eoan) Status: Fix Committed => Fix Released ** Changed in: sosreport (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1883320 Title: [kvm] change check_enabled to /dev/kvm Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: New Status in sosreport source package in Bionic: Fix Released Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Status in sosreport source package in Groovy: Fix Released Bug description: [Impact] The KVM plugin get triggered in a container (e.g lxd) because of "/sys/module/kvm" inheritance from the kernel host. Not only it's a waste of sosreport time, but running it inside a container may unintentionally reveal details from its host. Which is a undesired behaviour. Switching to /dev/kvm, is more appropriate and follow current standard as used by tool such as cpu-checker (kvm-ok) for instance. And taking benefit of this change to get rid of the check_enabled() overwrite in favour of using "files=" trigger. [Test Case] * Run sosreport inside a LXD container * The container will contain KVM information from its host (Iff its host as KVM installed) [Regression Potential] We only change the way the plugin gets triggered to use a most conventional way. If /dev/kvm exist, then exercise the kvm plugin. No regression expected, but worse case scenario, it will only be isolated and impact the KVM plugin to collect data properly as expected. It won't cause any harm to others plugins nor sosreport core functionalities itself. The commit went through some upstream Travis testing which used a shell script called "simple.sh" to verify sosreport collection. BTW, this same exact script is part of the sosreport autopkgtest, and will be run as part of the SRU to push this change. [Other Information] * Upstream bug: https://github.com/sosreport/sos/issues/2062 * Upstream commit: https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.19.10.1 --- sosreport (3.9.1-1ubuntu0.19.10.1) eoan; urgency=medium * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320) This maintenance release includes: - New plugins: sos_extras, ovirt_engine_backup, console, validation_framework. - lxd plugin collections have been overhauled. - Fixed handling of the namespace pattern for the networking plugin. - A basic path is now defined in Policy for all subclasses. Plugin API Enhancements: - Enablement checks have been extended to include architecture constraints. - SoSPredicate has been extended to include architecture constraints, as well as negative constraints for all elements. - Plugins will now capture service status information for all services defined in the services class attr. Further release information and tarballs are available at: - https://github.com/sosreport/sos/releases/tag/3.9.1 * Former patches now fixed upstream: - d/p/0001-unittest-py3-fix.patch - d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch * Other specific modifications: - d/p/0001-lshw-command.patch - d/p/0002-lds-substitute-oidc-conf.patch - d/p/0003-kvm-change-trigger-to-dev-kvm.patch -- Eric Desrochers Tue, 16 Jun 2020 12:18:58 + ** Changed in: sosreport (Ubuntu Eoan) Status: Fix Committed => Fix Released ** Changed in: sosreport (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1884293 Title: Update to maintenance release v3.9.1 Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: Won't Fix Status in sosreport source package in Bionic: Fix Released Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Bug description: [Impact] sosreport 3.9.1 is now released. It would be great to find sosreport v3.9.1 in supported stable releases, and active development release considering the fact that the releases (especially LTSes) are going to be supported for a couple of years. Sosreport is widely used by Canonical support team (and mission critical) to troubleshoot UA (Ubuntu Advantage) customer, partners, community users, and so on. Just like we did for : - v3.5 (LP: #1734983) - v3.6 (LP: #1775195) - v3.9 (LP: #1862830) [Test Case] * Install sosreport * Run sosreport in different customer scenarios: server, desktop, cloud, hypervisor, instance (container, vm), physical server, ... * Extract archive and look at the content, look for 0 size file (and use common sense if legit or not) * Look under "sos_reports" for full report. * Look under "sos_logs" for warnings/errors. $ grep -v "INFO:" sos_logs/sos.log * Run "simple.sh": A quick port of the travis tests to bash. Generating various type of sosreports collection (which is part of the autopkgtest (d/test/simple.sh) now. * Perform some dog fooding test routines (--all-logs, --upload, looking sosreport archive content, ... and so on) * https://wiki.ubuntu.com/SosreportUpdates [Regression Potential] Sosreport, as of today, has 300 plugins that are all configured differently and configured to run under certain conditions. We can't test all possible scenarios. All we can do is identify the most common, important and Ubuntu/Canonical related one and test them (e.g. Openstack*, juju, MAAS, kernel, ...). With that being said, it is definitely possible that certain plugins may not work as expected, but the risk will be very low (e.g. not collecting the desired information) and isolated to this specific plugin. It shouldn't affect the other plugins nor core functionalities of sosreport. [Other Information] * Release note: https://github.com/sosreport/sos/releases/tag/3.9.1 [Original Description] 3.9.1 is now found in Debian unstable and Groovy (Current Active Devel Release) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1883320] Re: [kvm] change check_enabled to /dev/kvm
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.20.04.1 --- sosreport (3.9.1-1ubuntu0.20.04.1) focal; urgency=medium * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320) This maintenance release includes: - New plugins: sos_extras, ovirt_engine_backup, console, validation_framework. - lxd plugin collections have been overhauled. - Fixed handling of the namespace pattern for the networking plugin. - A basic path is now defined in Policy for all subclasses. Plugin API Enhancements: - Enablement checks have been extended to include architecture constraints. - SoSPredicate has been extended to include architecture constraints, as well as negative constraints for all elements. - Plugins will now capture service status information for all services defined in the services class attr. Further release information and tarballs are available at: - https://github.com/sosreport/sos/releases/tag/3.9.1 * Former patches now fixed upstream: - d/p/0001-unittest-py3-fix.patch - d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch * Other specific modifications: - d/p/0001-lshw-command.patch - d/p/0002-lds-substitute-oidc-conf.patch - d/p/0003-kvm-change-trigger-to-dev-kvm.patch -- Eric Desrochers Tue, 16 Jun 2020 12:18:58 + ** Changed in: sosreport (Ubuntu Focal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1883320 Title: [kvm] change check_enabled to /dev/kvm Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: New Status in sosreport source package in Bionic: Fix Released Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Status in sosreport source package in Groovy: Fix Released Bug description: [Impact] The KVM plugin get triggered in a container (e.g lxd) because of "/sys/module/kvm" inheritance from the kernel host. Not only it's a waste of sosreport time, but running it inside a container may unintentionally reveal details from its host. Which is a undesired behaviour. Switching to /dev/kvm, is more appropriate and follow current standard as used by tool such as cpu-checker (kvm-ok) for instance. And taking benefit of this change to get rid of the check_enabled() overwrite in favour of using "files=" trigger. [Test Case] * Run sosreport inside a LXD container * The container will contain KVM information from its host (Iff its host as KVM installed) [Regression Potential] We only change the way the plugin gets triggered to use a most conventional way. If /dev/kvm exist, then exercise the kvm plugin. No regression expected, but worse case scenario, it will only be isolated and impact the KVM plugin to collect data properly as expected. It won't cause any harm to others plugins nor sosreport core functionalities itself. The commit went through some upstream Travis testing which used a shell script called "simple.sh" to verify sosreport collection. BTW, this same exact script is part of the sosreport autopkgtest, and will be run as part of the SRU to push this change. [Other Information] * Upstream bug: https://github.com/sosreport/sos/issues/2062 * Upstream commit: https://github.com/sosreport/sos/pull/2063/commits/dc58a038c18ff3e838d883d4b31aad5dac7ea9e1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1883320/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1884293] Re: Update to maintenance release v3.9.1
This bug was fixed in the package sosreport - 3.9.1-1ubuntu0.20.04.1 --- sosreport (3.9.1-1ubuntu0.20.04.1) focal; urgency=medium * New 3.9.1 upstream release. (LP: #1884293) (LP: #1883320) This maintenance release includes: - New plugins: sos_extras, ovirt_engine_backup, console, validation_framework. - lxd plugin collections have been overhauled. - Fixed handling of the namespace pattern for the networking plugin. - A basic path is now defined in Policy for all subclasses. Plugin API Enhancements: - Enablement checks have been extended to include architecture constraints. - SoSPredicate has been extended to include architecture constraints, as well as negative constraints for all elements. - Plugins will now capture service status information for all services defined in the services class attr. Further release information and tarballs are available at: - https://github.com/sosreport/sos/releases/tag/3.9.1 * Former patches now fixed upstream: - d/p/0001-unittest-py3-fix.patch - d/p/0002-lxd-drop-db-collection-and-introduce-lxd-buginfo.patch * Other specific modifications: - d/p/0001-lshw-command.patch - d/p/0002-lds-substitute-oidc-conf.patch - d/p/0003-kvm-change-trigger-to-dev-kvm.patch -- Eric Desrochers Tue, 16 Jun 2020 12:18:58 + ** Changed in: sosreport (Ubuntu Focal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1884293 Title: Update to maintenance release v3.9.1 Status in sosreport package in Ubuntu: Fix Released Status in sosreport source package in Xenial: Won't Fix Status in sosreport source package in Bionic: Fix Released Status in sosreport source package in Eoan: Fix Released Status in sosreport source package in Focal: Fix Released Bug description: [Impact] sosreport 3.9.1 is now released. It would be great to find sosreport v3.9.1 in supported stable releases, and active development release considering the fact that the releases (especially LTSes) are going to be supported for a couple of years. Sosreport is widely used by Canonical support team (and mission critical) to troubleshoot UA (Ubuntu Advantage) customer, partners, community users, and so on. Just like we did for : - v3.5 (LP: #1734983) - v3.6 (LP: #1775195) - v3.9 (LP: #1862830) [Test Case] * Install sosreport * Run sosreport in different customer scenarios: server, desktop, cloud, hypervisor, instance (container, vm), physical server, ... * Extract archive and look at the content, look for 0 size file (and use common sense if legit or not) * Look under "sos_reports" for full report. * Look under "sos_logs" for warnings/errors. $ grep -v "INFO:" sos_logs/sos.log * Run "simple.sh": A quick port of the travis tests to bash. Generating various type of sosreports collection (which is part of the autopkgtest (d/test/simple.sh) now. * Perform some dog fooding test routines (--all-logs, --upload, looking sosreport archive content, ... and so on) * https://wiki.ubuntu.com/SosreportUpdates [Regression Potential] Sosreport, as of today, has 300 plugins that are all configured differently and configured to run under certain conditions. We can't test all possible scenarios. All we can do is identify the most common, important and Ubuntu/Canonical related one and test them (e.g. Openstack*, juju, MAAS, kernel, ...). With that being said, it is definitely possible that certain plugins may not work as expected, but the risk will be very low (e.g. not collecting the desired information) and isolated to this specific plugin. It shouldn't affect the other plugins nor core functionalities of sosreport. [Other Information] * Release note: https://github.com/sosreport/sos/releases/tag/3.9.1 [Original Description] 3.9.1 is now found in Debian unstable and Groovy (Current Active Devel Release) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1884293/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885511] Re: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker
** Changed in: kernel-sru-workflow/promote-signing-to-proposed Status: In Progress => Fix Committed ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-signing-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips - phase: Promote to Proposed - phase-changed: Monday, 06. July 2020 13:41 UTC + phase: Testing + phase-changed: Monday, 06. July 2020 13:52 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-signing-to-proposed: Ongoing -- review in progress + regression-testing: Ongoing -- testing in progress + verification-testing: Ongoing -- testing in progress variant: debs versions: main: 4.4.0-1043.48 meta: 4.4.0.1043.45 signed: 4.4.0-1043.48 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885511 Title: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Testing phase-changed: Monday, 06. July 2020 13:52 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: regression-testing: Ongoing -- testing in progress verification-testing: Ongoing -- testing in progress variant: debs versions: main: 4.4.0-1043.48 meta: 4.4.0.1043.45 signed: 4.4.0-1043.48 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885511/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885510] Re: xenial/linux-snapdragon: 4.4.0-1140.148 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/certification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-snapdragon meta: linux-meta-snapdragon - phase: Promote to Proposed - phase-changed: Monday, 06. July 2020 11:18 UTC + phase: Testing + phase-changed: Monday, 06. July 2020 13:02 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + certification-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1885509 variant: debs versions: main: 4.4.0-1140.148 meta: 4.4.0.1140.132 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885510 Title: xenial/linux-snapdragon: 4.4.0-1140.148 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux-snapdragon source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-snapdragon meta: linux-meta-snapdragon phase: Testing phase-changed: Monday, 06. July 2020 13:02 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress certification-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1885509 variant: debs versions: main: 4.4.0-1140.148 meta: 4.4.0.1140.132 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885510/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885503] Re: xenial/linux-aws: 4.4.0-1111.123 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/regression-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/regression-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-aws meta: linux-meta-aws - phase: Promote to Proposed - phase-changed: Monday, 06. July 2020 11:18 UTC + phase: Testing + phase-changed: Monday, 06. July 2020 13:01 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + regression-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: xenial/linux-aws/aws-kernel: bug 1885502 variant: debs versions: main: 4.4.0-.123 meta: 4.4.0..116 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885503 Title: xenial/linux-aws: 4.4.0-.123 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: In Progress Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux-aws source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-aws meta: linux-meta-aws phase: Testing phase-changed: Monday, 06. July 2020 13:01 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress regression-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-aws/aws-kernel: bug 1885502 variant: debs versions: main: 4.4.0-.123 meta: 4.4.0..116 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885503/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885511] Re: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker
** Changed in: kernel-sru-workflow/promote-signing-to-proposed Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips - phase: Building in Signing - phase-changed: Monday, 06. July 2020 11:48 UTC + phase: Ready for Promote to Proposed + phase-changed: Monday, 06. July 2020 13:02 UTC reason: - build-packages-signing: Pending -- building in Signing signed:queued - promote-to-proposed: Stalled -- packages copying to Signing + promote-signing-to-proposed: Pending -- ready for review variant: debs versions: main: 4.4.0-1043.48 meta: 4.4.0.1043.45 signed: 4.4.0-1043.48 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885511 Title: xenial/linux-fips: 4.4.0-1043.48 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Confirmed Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: New Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Ready for Promote to Proposed phase-changed: Monday, 06. July 2020 13:02 UTC reason: promote-signing-to-proposed: Pending -- ready for review variant: debs versions: main: 4.4.0-1043.48 meta: 4.4.0.1043.45 signed: 4.4.0-1043.48 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885511/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1885508] Re: xenial/linux-raspi2: 4.4.0-1136.145 -proposed tracker
** Changed in: kernel-sru-workflow/automated-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/certification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Fix Committed => Fix Released ** Changed in: kernel-sru-workflow/security-signoff Status: New => Confirmed ** Changed in: kernel-sru-workflow/verification-testing Status: New => Confirmed ** Changed in: kernel-sru-workflow/automated-testing Status: Confirmed => In Progress ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Promote to Proposed - phase-changed: Monday, 06. July 2020 11:08 UTC + phase: Testing + phase-changed: Monday, 06. July 2020 12:36 UTC + proposed-announcement-sent: true + proposed-testing-requested: true reason: - promote-to-proposed: Ongoing -- packages waiting in -proposed for - mirror sync + automated-testing: Ongoing -- testing in progress + certification-testing: Ongoing -- testing in progress + security-signoff: Pending -- waiting for signoff + verification-testing: Ongoing -- testing in progress trackers: xenial/linux-raspi2/pi2-kernel: bug 1885507 variant: debs versions: main: 4.4.0-1136.145 meta: 4.4.0.1136.136 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1885508 Title: xenial/linux-raspi2: 4.4.0-1136.145 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: In Progress Status in Kernel SRU Workflow certification-testing series: Confirmed Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Confirmed Status in Kernel SRU Workflow verification-testing series: Confirmed Status in linux-raspi2 source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1885514 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Testing phase-changed: Monday, 06. July 2020 12:36 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: automated-testing: Ongoing -- testing in progress certification-testing: Ongoing -- testing in progress security-signoff: Pending -- waiting for signoff verification-testing: Ongoing -- testing in progress trackers: xenial/linux-raspi2/pi2-kernel: bug 1885507 variant: debs versions: main: 4.4.0-1136.145 meta: 4.4.0.1136.136 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1885508/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882761] Re: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882761 Title: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Complete phase-changed: Monday, 06. July 2020 08:28 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: xenial/linux-cascade/cascade-kernel: bug 1882760 variant: debs versions: main: 4.4.0-1020.22 meta: 4.4.0.1020.23 signed: 4.4.0-1020.22 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882761/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882767] Re: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882767 Title: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Complete phase-changed: Monday, 06. July 2020 08:29 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} variant: debs versions: main: 4.4.0-1042.47 meta: 4.4.0.1042.44 signed: 4.4.0-1042.47 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882767/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45
This bug was fixed in the package snapd - 2.45.1+18.04 --- snapd (2.45.1+18.04) bionic; urgency=medium * New upstream release, LP: #1875071 - data/selinux: allow checking /var/cache/app-info - cmd/snap-confine: add support for libc6-lse - interfaces: miscellanious policy updates xlv - snap-bootstrap: remove sealed key file on reinstall - interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/ - gadget: make ext4 filesystems with or without metadata checksum - interfaces/fwupd: allow bind mount to /boot on core - tests: cherry-pick test fixes from master - snap/squashfs: also symlink snap Install with uc20 seed snap dir layout - interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed devices - snap,many: mv Open to snapfile pkg to support add'l options to Container methods - interfaces/builtin/desktop: do not mount fonts cache on distros with quirks - devicestate, sysconfig: revert support for cloud.cfg.d/ in the gadget - data/completion, packaging: cherry-pick zsh completion - state: log task errors in the journal too - devicestate: do not report "ErrNoState" for seeded up - interfaces/desktop: silence more /var/lib/snapd/desktop/icons denials - packaging/fedora: disable FIPS compliant crypto for static binaries - packaging: stop depending on python-docutils -- Michael Vogt Fri, 05 Jun 2020 15:13:49 +0200 ** Changed in: snapd (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1875071 Title: [SRU] 2.45 Status in snapd package in Ubuntu: Fix Released Status in snapd source package in Xenial: Fix Released Status in snapd source package in Bionic: Fix Released Status in snapd source package in Eoan: Fix Released Status in snapd source package in Focal: Fix Released Bug description: This is a new version of snapd. The changelog is available here https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog, the raw git changelog is available here: https://github.com/snapcore/snapd/commits/2.45 (note that the debian changelog is auto-generated from the merges of the git commits so there is usually no need to look at the raw git commits). The travis logs for 2.45 can be found here: https://travis- ci.org/snapcore/snapd/branches The snappy team released a new release that we want SRU into xenial. The new process described in https://wiki.ubuntu.com/SnapdUpdates was used and we have done integration-tests on the snappy images, autopkgtests on classic and unit tests. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1856159] Re: [SRU] 2.43
This bug was fixed in the package snapd - 2.45.1+19.10 --- snapd (2.45.1+19.10) eoan; urgency=medium * New upstream release, LP: #1875071 - data/selinux: allow checking /var/cache/app-info - cmd/snap-confine: add support for libc6-lse - interfaces: miscellanious policy updates xlv - snap-bootstrap: remove sealed key file on reinstall - interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/ - gadget: make ext4 filesystems with or without metadata checksum - interfaces/fwupd: allow bind mount to /boot on core - tests: cherry-pick test fixes from master - snap/squashfs: also symlink snap Install with uc20 seed snap dir layout - interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed devices - snap,many: mv Open to snapfile pkg to support add'l options to Container methods - interfaces/builtin/desktop: do not mount fonts cache on distros with quirks - devicestate, sysconfig: revert support for cloud.cfg.d/ in the gadget - data/completion, packaging: cherry-pick zsh completion - state: log task errors in the journal too - devicestate: do not report "ErrNoState" for seeded up - interfaces/desktop: silence more /var/lib/snapd/desktop/icons denials - packaging/fedora: disable FIPS compliant crypto for static binaries - packaging: stop depending on python-docutils -- Michael Vogt Fri, 05 Jun 2020 15:13:49 +0200 ** Changed in: snapd (Ubuntu Eoan) Status: Confirmed => Fix Released ** Changed in: snapd (Ubuntu Bionic) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1856159 Title: [SRU] 2.43 Status in snapd package in Ubuntu: Fix Released Status in snapd source package in Trusty: Confirmed Status in snapd source package in Xenial: Fix Released Status in snapd source package in Bionic: Fix Released Status in snapd source package in Eoan: Fix Released Bug description: This is a new version of snapd. The changelog is available here https://github.com/snapcore/snapd/blob/2.43/packaging/ubuntu-16.04/changelog, the raw git changelog is available here: https://github.com/snapcore/snapd/commits/2.43 (note that the debian changelog is auto-generated from the merges of the git commits so there is usually no need to look at the raw git commits). The travis logs for 2.43 can be found here: https://travis- ci.org/snapcore/snapd/branches The snappy team released a new release that we want SRU into xenial. The new process described in https://wiki.ubuntu.com/SnapdUpdates was used and we have done integration-tests on the snappy images, autopkgtests on classic and unit tests. This time we also include trusty to ensure that on trusty users can get a more recent version that auto-installs the snapd snap so that they get the benefit of re-exec there. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1856159/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1856159] Re: [SRU] 2.43
This bug was fixed in the package snapd - 2.45.1+18.04 --- snapd (2.45.1+18.04) bionic; urgency=medium * New upstream release, LP: #1875071 - data/selinux: allow checking /var/cache/app-info - cmd/snap-confine: add support for libc6-lse - interfaces: miscellanious policy updates xlv - snap-bootstrap: remove sealed key file on reinstall - interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/ - gadget: make ext4 filesystems with or without metadata checksum - interfaces/fwupd: allow bind mount to /boot on core - tests: cherry-pick test fixes from master - snap/squashfs: also symlink snap Install with uc20 seed snap dir layout - interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed devices - snap,many: mv Open to snapfile pkg to support add'l options to Container methods - interfaces/builtin/desktop: do not mount fonts cache on distros with quirks - devicestate, sysconfig: revert support for cloud.cfg.d/ in the gadget - data/completion, packaging: cherry-pick zsh completion - state: log task errors in the journal too - devicestate: do not report "ErrNoState" for seeded up - interfaces/desktop: silence more /var/lib/snapd/desktop/icons denials - packaging/fedora: disable FIPS compliant crypto for static binaries - packaging: stop depending on python-docutils -- Michael Vogt Fri, 05 Jun 2020 15:13:49 +0200 ** Changed in: snapd (Ubuntu Xenial) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1856159 Title: [SRU] 2.43 Status in snapd package in Ubuntu: Fix Released Status in snapd source package in Trusty: Confirmed Status in snapd source package in Xenial: Fix Released Status in snapd source package in Bionic: Fix Released Status in snapd source package in Eoan: Fix Released Bug description: This is a new version of snapd. The changelog is available here https://github.com/snapcore/snapd/blob/2.43/packaging/ubuntu-16.04/changelog, the raw git changelog is available here: https://github.com/snapcore/snapd/commits/2.43 (note that the debian changelog is auto-generated from the merges of the git commits so there is usually no need to look at the raw git commits). The travis logs for 2.43 can be found here: https://travis- ci.org/snapcore/snapd/branches The snappy team released a new release that we want SRU into xenial. The new process described in https://wiki.ubuntu.com/SnapdUpdates was used and we have done integration-tests on the snappy images, autopkgtests on classic and unit tests. This time we also include trusty to ensure that on trusty users can get a more recent version that auto-installs the snapd snap so that they get the benefit of re-exec there. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1856159/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45
This bug was fixed in the package snapd - 2.45.1+20.04 --- snapd (2.45.1+20.04) focal; urgency=medium * New upstream release, LP: #1875071 - data/selinux: allow checking /var/cache/app-info - cmd/snap-confine: add support for libc6-lse - interfaces: miscellanious policy updates xlv - snap-bootstrap: remove sealed key file on reinstall - interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/ - gadget: make ext4 filesystems with or without metadata checksum - interfaces/fwupd: allow bind mount to /boot on core - tests: cherry-pick test fixes from master - snap/squashfs: also symlink snap Install with uc20 seed snap dir layout - interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed devices - snap,many: mv Open to snapfile pkg to support add'l options to Container methods - interfaces/builtin/desktop: do not mount fonts cache on distros with quirks - devicestate, sysconfig: revert support for cloud.cfg.d/ in the gadget - data/completion, packaging: cherry-pick zsh completion - state: log task errors in the journal too - devicestate: do not report "ErrNoState" for seeded up - interfaces/desktop: silence more /var/lib/snapd/desktop/icons denials - packaging/fedora: disable FIPS compliant crypto for static binaries - packaging: stop depending on python-docutils -- Michael Vogt Fri, 05 Jun 2020 15:13:49 +0200 ** Changed in: snapd (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1875071 Title: [SRU] 2.45 Status in snapd package in Ubuntu: Fix Released Status in snapd source package in Xenial: Fix Released Status in snapd source package in Bionic: Fix Released Status in snapd source package in Eoan: Fix Released Status in snapd source package in Focal: Fix Released Bug description: This is a new version of snapd. The changelog is available here https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog, the raw git changelog is available here: https://github.com/snapcore/snapd/commits/2.45 (note that the debian changelog is auto-generated from the merges of the git commits so there is usually no need to look at the raw git commits). The travis logs for 2.45 can be found here: https://travis- ci.org/snapcore/snapd/branches The snappy team released a new release that we want SRU into xenial. The new process described in https://wiki.ubuntu.com/SnapdUpdates was used and we have done integration-tests on the snappy images, autopkgtests on classic and unit tests. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1875071] Re: [SRU] 2.45
This bug was fixed in the package snapd - 2.45.1+19.10 --- snapd (2.45.1+19.10) eoan; urgency=medium * New upstream release, LP: #1875071 - data/selinux: allow checking /var/cache/app-info - cmd/snap-confine: add support for libc6-lse - interfaces: miscellanious policy updates xlv - snap-bootstrap: remove sealed key file on reinstall - interfaces-ssh-keys: Support reading /etc/ssh/ssh_config.d/ - gadget: make ext4 filesystems with or without metadata checksum - interfaces/fwupd: allow bind mount to /boot on core - tests: cherry-pick test fixes from master - snap/squashfs: also symlink snap Install with uc20 seed snap dir layout - interfaces/serial-port: add NXP SC16IS7xx (ttySCX) to allowed devices - snap,many: mv Open to snapfile pkg to support add'l options to Container methods - interfaces/builtin/desktop: do not mount fonts cache on distros with quirks - devicestate, sysconfig: revert support for cloud.cfg.d/ in the gadget - data/completion, packaging: cherry-pick zsh completion - state: log task errors in the journal too - devicestate: do not report "ErrNoState" for seeded up - interfaces/desktop: silence more /var/lib/snapd/desktop/icons denials - packaging/fedora: disable FIPS compliant crypto for static binaries - packaging: stop depending on python-docutils -- Michael Vogt Fri, 05 Jun 2020 15:13:49 +0200 ** Changed in: snapd (Ubuntu Eoan) Status: Fix Committed => Fix Released ** Changed in: snapd (Ubuntu Focal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1875071 Title: [SRU] 2.45 Status in snapd package in Ubuntu: Fix Released Status in snapd source package in Xenial: Fix Released Status in snapd source package in Bionic: Fix Released Status in snapd source package in Eoan: Fix Released Status in snapd source package in Focal: Fix Released Bug description: This is a new version of snapd. The changelog is available here https://github.com/snapcore/snapd/blob/2.45/packaging/ubuntu-16.04/changelog, the raw git changelog is available here: https://github.com/snapcore/snapd/commits/2.45 (note that the debian changelog is auto-generated from the merges of the git commits so there is usually no need to look at the raw git commits). The travis logs for 2.45 can be found here: https://travis- ci.org/snapcore/snapd/branches The snappy team released a new release that we want SRU into xenial. The new process described in https://wiki.ubuntu.com/SnapdUpdates was used and we have done integration-tests on the snappy images, autopkgtests on classic and unit tests. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1875071/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882767] Re: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:54 UTC + phase: Complete + phase-changed: Monday, 06. July 2020 08:29 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} variant: debs versions: main: 4.4.0-1042.47 meta: 4.4.0.1042.44 signed: 4.4.0-1042.47 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882767 Title: xenial/linux-fips: 4.4.0-1042.47 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Complete phase-changed: Monday, 06. July 2020 08:29 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} variant: debs versions: main: 4.4.0-1042.47 meta: 4.4.0.1042.44 signed: 4.4.0-1042.47 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882767/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882761] Re: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:53 UTC + phase: Complete + phase-changed: Monday, 06. July 2020 08:28 UTC proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} trackers: xenial/linux-cascade/cascade-kernel: bug 1882760 variant: debs versions: main: 4.4.0-1020.22 meta: 4.4.0.1020.23 signed: 4.4.0-1020.22 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882761 Title: xenial/linux-cascade: 4.4.0-1020.22 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Complete phase-changed: Monday, 06. July 2020 08:28 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: {} trackers: xenial/linux-cascade/cascade-kernel: bug 1882760 variant: debs versions: main: 4.4.0-1020.22 meta: 4.4.0.1020.23 signed: 4.4.0-1020.22 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882761/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu1.2~16.04.1 --- linux-base (4.5ubuntu1.2~16.04.1) xenial; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:43:40 -0300 ** Changed in: linux-base (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu1.2 --- linux-base (4.5ubuntu1.2) bionic; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:39:07 -0300 ** Changed in: linux-base (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu1.2 --- linux-base (4.5ubuntu1.2) bionic; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:39:07 -0300 ** Changed in: linux-base (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu2.2 --- linux-base (4.5ubuntu2.2) eoan; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:34:46 -0300 ** Changed in: linux-base (Ubuntu Bionic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu3.1 --- linux-base (4.5ubuntu3.1) focal; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:23:24 -0300 ** Changed in: linux-base (Ubuntu Focal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-snapdragon meta: linux-meta-snapdragon - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:54 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 08:06 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1882765 variant: debs versions: main: 4.4.0-1139.147 meta: 4.4.0.1139.131 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882766 Title: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-snapdragon source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-snapdragon meta: linux-meta-snapdragon phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 08:06 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) trackers: xenial/linux-snapdragon/dragonboard-kernel: bug 1882765 variant: debs versions: main: 4.4.0-1139.147 meta: 4.4.0.1139.131 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882766/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1881338] Re: linux-azure: Update SGX version to version LD_1.33
This bug was fixed in the package linux-base - 4.5ubuntu2.2 --- linux-base (4.5ubuntu2.2) eoan; urgency=medium * Update SGX udev rules for version LD_1.33 (LP: #1881338). -- Marcelo Henrique Cerri Thu, 25 Jun 2020 14:34:46 -0300 ** Changed in: linux-base (Ubuntu Eoan) Status: Fix Committed => Fix Released ** Changed in: linux-base (Ubuntu Eoan) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1881338 Title: linux-azure: Update SGX version to version LD_1.33 Status in linux-azure package in Ubuntu: In Progress Status in linux-azure-4.15 package in Ubuntu: New Status in linux-base package in Ubuntu: Fix Released Status in linux-azure source package in Xenial: Invalid Status in linux-azure-4.15 source package in Xenial: Invalid Status in linux-base source package in Xenial: Fix Released Status in linux-azure source package in Bionic: Fix Committed Status in linux-azure-4.15 source package in Bionic: Fix Committed Status in linux-base source package in Bionic: Fix Released Status in linux-azure source package in Eoan: Fix Committed Status in linux-azure-4.15 source package in Eoan: Invalid Status in linux-base source package in Eoan: Fix Released Status in linux-azure source package in Focal: Fix Committed Status in linux-azure-4.15 source package in Focal: Invalid Status in linux-base source package in Focal: Fix Released Bug description: [Impact] We have included the DCAP version of SGX into the linux-azure kernels in order to provide a signed version of this driver that can be used with secure boot in Azure instances. Since a new version of this driver was released, we should update the embedded driver: https://github.com/intel/SGXDataCenterAttestationPrimitives/tree/LD_1.33/driver/linux [Test Case] - Install the new kernel on an ACC azure instance. - Ensure the module loads properly. - Check if ECL (provided on the azure images) is working properly. [Regression Potential] The changes are extensive, but both Canonical and Microsoft perform validation tests on SGX. Besides that, the change is restricted to linux-azure running on specific instances. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1881338/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-raspi2 meta: linux-meta-raspi2 - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:54 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 08:05 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: xenial/linux-raspi2/pi2-kernel: bug 1882763 variant: debs versions: main: 4.4.0-1135.144 meta: 4.4.0.1135.135 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882764 Title: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-raspi2 source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-raspi2 meta: linux-meta-raspi2 phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 08:05 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) trackers: xenial/linux-raspi2/pi2-kernel: bug 1882763 variant: debs versions: main: 4.4.0-1135.144 meta: 4.4.0.1135.135 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882764/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882770] Re: xenial/linux: 4.4.0-185.215 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:51 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 08:14 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: trusty/linux-aws: bug 1882768 trusty/linux-lts-xenial: bug 1882769 xenial/linux-aws: bug 1882759 xenial/linux-cascade: bug 1882761 xenial/linux-fips: bug 1882767 xenial/linux-kvm: bug 1882762 xenial/linux-raspi2: bug 1882764 xenial/linux-snapdragon: bug 1882766 xenial/linux/caracalla-kernel: bug 1882755 xenial/linux/pc-kernel: bug 1882756 xenial/linux/stlouis-kernel: bug 1882757 variant: debs versions: main: 4.4.0-185.215 meta: 4.4.0.185.191 signed: 4.4.0-185.215 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882770 Title: xenial/linux: 4.4.0-185.215 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true bugs-spammed: true packages: main: linux meta: linux-meta signed: linux-signed phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 08:14 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) trackers: trusty/linux-aws: bug 1882768 trusty/linux-lts-xenial: bug 1882769 xenial/linux-aws: bug 1882759 xenial/linux-cascade: bug 1882761 xenial/linux-fips: bug 1882767 xenial/linux-kvm: bug 1882762 xenial/linux-raspi2: bug 1882764 xenial/linux-snapdragon: bug 1882766 xenial/linux/caracalla-kernel: bug 1882755 xenial/linux/pc-kernel: bug 1882756 xenial/linux/stlouis-kernel: bug 1882757 variant: debs versions: main: 4.4.0-185.215 meta: 4.4.0.185.191 signed: 4.4.0-185.215 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882770/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1879752] Re: test_bpf of ubuntu_kernel_selftests.net ADT test failure with linux 4.4.0-180.210
This bug was fixed in the package linux - 4.4.0-185.215 --- linux (4.4.0-185.215) xenial; urgency=medium * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: disallow data races on gcc-10 as well - scsi: iscsi: Fix a potential deadlock in the timeout handler - Linux 4
[Group.of.nepali.translators] [Bug 1881356] Re: Xenial update: 4.4.224 upstream stable release
This bug was fixed in the package linux - 4.4.0-185.215 --- linux (4.4.0-185.215) xenial; urgency=medium * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: disallow data races on gcc-10 as well - scsi: iscsi: Fix a potential deadlock in the timeout handler - Linux 4
[Group.of.nepali.translators] [Bug 1880213] Re: ext2 build failure on 4.4.0-180.210
This bug was fixed in the package linux - 4.4.0-185.215 --- linux (4.4.0-185.215) xenial; urgency=medium * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: disallow data races on gcc-10 as well - scsi: iscsi: Fix a potential deadlock in the timeout handler - Linux 4
[Group.of.nepali.translators] [Bug 1882766] Re: xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker
This bug was fixed in the package linux-snapdragon - 4.4.0-1139.147 --- linux-snapdragon (4.4.0-1139.147) xenial; urgency=medium * xenial/linux-snapdragon: 4.4.0-1139.147 -proposed tracker (LP: #1882766) [ Ubuntu: 4.4.0-185.215 ] * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce -
[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker
This bug was fixed in the package linux-kvm - 4.4.0-1076.83 --- linux-kvm (4.4.0-1076.83) xenial; urgency=medium * xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker (LP: #1882762) [ Ubuntu: 4.4.0-185.215 ] * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: disallow data
[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-aws meta: linux-meta-aws - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:52 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 08:04 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published trackers: xenial/linux-aws/aws-kernel: bug 1882758 variant: debs versions: main: 4.4.0-1110.121 meta: 4.4.0.1110.114 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882759 Title: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-aws source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-aws meta: linux-meta-aws phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 08:04 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) trackers: xenial/linux-aws/aws-kernel: bug 1882758 variant: debs versions: main: 4.4.0-1110.121 meta: 4.4.0.1110.114 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882759/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1882764] Re: xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker
This bug was fixed in the package linux-raspi2 - 4.4.0-1135.144 --- linux-raspi2 (4.4.0-1135.144) xenial; urgency=medium * xenial/linux-raspi2: 4.4.0-1135.144 -proposed tracker (LP: #1882764) [ Ubuntu: 4.4.0-185.215 ] * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: d
[Group.of.nepali.translators] [Bug 1882759] Re: xenial/linux-aws: 4.4.0-1110.121 -proposed tracker
This bug was fixed in the package linux-aws - 4.4.0-1110.121 --- linux-aws (4.4.0-1110.121) xenial; urgency=medium * xenial/linux-aws: 4.4.0-1110.121 -proposed tracker (LP: #1882759) [ Ubuntu: 4.4.0-185.215 ] * Packaging resync (LP: #1786013) - [Packaging] update helper scripts * CVE-2020-0543 - UBUNTU/SAUCE: x86/speculation/srbds: do not try to turn mitigation off when not supported * Xenial update: 4.4.224 upstream stable release (LP: #1881356) - USB: serial: qcserial: Add DW5816e support - Revert "net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS" - dp83640: reverse arguments to list_add_tail - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() - sch_sfq: validate silly quantum values - sch_choke: avoid potential panic in choke_reset() - enic: do not overwrite error code - ipv6: fix cleanup ordering for ip6_mr failure - binfmt_elf: move brk out of mmap when doing direct loader exec - x86/apm: Don't access __preempt_count with zeroed fs - Revert "IB/ipoib: Update broadcast object if PKey value was changed in index 0" - USB: uas: add quirk for LaCie 2Big Quadra - USB: serial: garmin_gps: add sanity checking for data length - batman-adv: fix batadv_nc_random_weight_tq - scripts/decodecode: fix trapping instruction formatting - phy: micrel: Ensure interrupts are reenabled on resume - binfmt_elf: Do not move brk for INTERP-less ET_EXEC - ext4: add cond_resched() to ext4_protect_reserved_inode - blktrace: Fix potential deadlock between delete & sysfs ops - blktrace: fix unlocked access to init/start-stop/teardown - blktrace: fix trace mutex deadlock - ptp: do not explicitly set drvdata in ptp_clock_register() - ptp: use is_visible method to hide unused attributes - ptp: create "pins" together with the rest of attributes - chardev: add helper function to register char devs with a struct device - ptp: Fix pass zero to ERR_PTR() in ptp_clock_register - ptp: fix the race between the release of ptp_clock and cdev - ptp: free ptp device pin descriptors properly - net: handle no dst on skb in icmp6_send - net/sonic: Fix a resource leak in an error handling path in 'jazz_sonic_probe()' - net: moxa: Fix a potential double 'free_irq()' - drop_monitor: work around gcc-10 stringop-overflow warning - scsi: sg: add sg_remove_request in sg_write - cifs: Check for timeout on Negotiate stage - cifs: Fix a race condition with cifs_echo_request - dmaengine: pch_dma.c: Avoid data race between probe and irq handler - dmaengine: mmp_tdma: Reset channel error on release - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() - ipc/util.c: sysvipc_find_ipc() incorrectly updates position index - net: openvswitch: fix csum updates for MPLS actions - gre: do not keep the GRE header around in collect medata mode - mm/memory_hotplug.c: fix overflow in test_pages_in_a_zone() - scsi: qla2xxx: Avoid double completion of abort command - i40e: avoid NVM acquire deadlock during NVM update - net/mlx5: Fix driver load error flow when firmware is stuck - netfilter: conntrack: avoid gcc-10 zero-length-bounds warning - IB/mlx4: Test return value of calls to ib_get_cached_pkey - pnp: Use list_for_each_entry() instead of open coding - gcc-10 warnings: fix low-hanging fruit - kbuild: compute false-positive -Wmaybe-uninitialized cases in Kconfig - Stop the ad-hoc games with -Wno-maybe-initialized - gcc-10: disable 'zero-length-bounds' warning for now - gcc-10: disable 'array-bounds' warning for now - gcc-10: disable 'stringop-overflow' warning for now - gcc-10: disable 'restrict' warning for now - blk-mq: sync the update nr_hw_queues with blk_mq_queue_tag_busy_iter - blk-mq: Allow blocking queue tag iter callbacks - x86/paravirt: Remove the unused irq_enable_sysexit pv op - gcc-10: avoid shadowing standard library 'free()' in crypto - net: fix a potential recursive NETDEV_FEAT_CHANGE - net: ipv4: really enforce backoff for redirects - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses - ALSA: rawmidi: Initialize allocated buffers - ARM: dts: imx27-phytec-phycard-s-rdk: Fix the I2C1 pinctrl entries - x86: Fix early boot crash on gcc-10, third try - exec: Move would_dump into flush_old_exec - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' - usb: gadget: audio: Fix a missing error return value in audio_bind() - usb: gadget: legacy: fix error return code in gncm_bind() - usb: gadget: legacy: fix error return code in cdc_bind() - ARM: dts: r8a7740: Add missing extal2 to CPG node - KVM: x86: Fix off-by-one error in kvm_vcpu_ioctl_x86_setup_mce - Makefile: disallow d
[Group.of.nepali.translators] [Bug 1882762] Re: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-kvm meta: linux-meta-kvm - phase: Promote to Updates - phase-changed: Monday, 06. July 2020 07:53 UTC + phase: Holding before Promote to Security + phase-changed: Monday, 06. July 2020 08:05 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) - promote-to-updates: Ongoing -- packages not yet published variant: debs versions: main: 4.4.0-1076.83 meta: 4.4.0.1076.74 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1882762 Title: xenial/linux-kvm: 4.4.0-1076.83 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Fix Released Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: New Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Fix Released Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-kvm source package in Xenial: Fix Released Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true kernel-stable-master-bug: 1882770 packages: main: linux-kvm meta: linux-meta-kvm phase: Holding before Promote to Security phase-changed: Monday, 06. July 2020 08:05 UTC proposed-announcement-sent: true proposed-testing-requested: true reason: promote-to-security: Holding -- not ready for security (replication dwell) variant: debs versions: main: 4.4.0-1076.83 meta: 4.4.0.1076.74 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1882762/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1884159] Re: Update lockdown patches
** Also affects: linux-oem-osp1 (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux-oem-osp1 (Ubuntu Xenial) ** No longer affects: linux-oem-osp1 (Ubuntu Eoan) ** No longer affects: linux-oem-osp1 (Ubuntu Focal) ** Changed in: linux-oem-osp1 (Ubuntu) Status: New => Invalid ** Changed in: linux-oem-osp1 (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1884159 Title: Update lockdown patches Status in linux package in Ubuntu: Fix Committed Status in linux-oem-osp1 package in Ubuntu: Invalid Status in linux source package in Xenial: Fix Committed Status in linux source package in Bionic: Fix Committed Status in linux-oem-osp1 source package in Bionic: Fix Committed Status in linux source package in Eoan: Fix Committed Status in linux source package in Focal: Fix Committed Bug description: Impact: The lockdown patches have evolved over time, and part of this was restricting more areas of the kernel. Not all of these additions were backported, and some can lead to lockdown bypasses, see [1] and [2]. Fix: Backport newer lockdown restrictions to older releases. Test Case: Test cases for most of the backports can be found at [3], and [4] is another test case. Some which need e.g. specific hardware to test have not been tested. Regression Potential: Most of these are small, simple fixes with low potential for regression. Users may also lose access to some functionality previously accissible under secure boot. Some changes are more substantial, especially the hw_param and debugfs changes for xenial, but they are based on well-tested upstream code. The xmon backports also carry a more moderate risk of regression. [1] https://lists.ubuntu.com/archives/kernel-team/2020-June/111050.html [2] https://lore.kernel.org/lkml/20200615104332.901519-1-ja...@zx2c4.com/ [3] https://git.launchpad.net/~sforshee/+git/lockdown-tests [4] https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language.sh To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1884159/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp