** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705359
Title:
The default PAM configuration for kerberos authentication allows
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1886668
Title:
linux 4.15.0-109-generic network DoS regression vs -108
To manage
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882093
Title:
CVE-2020-{5963|5967} NVIDIA
To manage notifications about this bug
Updated groovy debdiff against the merge from debian currently in
groovy-proposed.
** Patch added: "rsyslog_8.2006.0-2ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5388559/+files/rsyslog_8.2006.0-2ubuntu2.debdiff
** Patch removed:
FYI, this was assigned CVE-2019-20892.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-20892
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877027
Title:
SNMP stopped running
Fixed debdiff to add the bug reference for groovy.
** Patch removed: "rsyslog_8.2001.0-1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5386642/+files/rsyslog_8.2001.0-1ubuntu2.debdiff
** Patch added: "rsyslog_8.2001.0-1ubuntu2.debdiff"
Focal version.
** Patch added: "rsyslog_8.2001.0-1ubuntu1.1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5386929/+files/rsyslog_8.2001.0-1ubuntu1.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Andreas, agreed, I think (speaking from the Ubuntu Security Team's
perspective), this should go to focal-security.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877027
Title:
SNMP stopped running
Debdiff for groovy attached:
- adds a second ExecStartPost entru to chmod /var/log/dmesg
- adjusts the savelog(8) call in ExecStartPre to set the permission mode to
640 explicitly when rotating dmesg logs
** Patch added: "rsyslog_8.2001.0-1ubuntu2.debdiff"
Public bug reported:
[Impact]
The rsyslog dmesg systemd unit /lib/systemd/system/dmesg.service in
eoan, focal, and groovy create /var/log/dmesg* with the following
permissions:
-rw-r--r-- 1 root adm 45146 Jun 16 12:32 /var/log/dmesg
Most other system logs in /var/log/ are only readable by
Thanks for clarifying, closing.
** Changed in: rsyslog (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811861
Title:
incorrect permissions on /var/log after
Hi John,
I'm not sure what's happened here, but the default
/etc/rsyslog.d/50-default.conf contains no such snippet (a pristine copy
is also stored in /usr/share/rsyslog/50-default.conf) and is managed via
ucf. The contents of a pristine version are attached.
Either another package you have
Acelan, did this system also fail with the 20191115 microcode, revision
0x00ca?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880663
Title:
Dell Latitude 7300, sig=0x806eb/20200609, sometimes
Andrea, thanks again for the report and the testing you've done, and
again, sorry you are having this issue. I have filed
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-
Files/issues/35 specifically for this issue with sig=0x806ea
revision=0xd6.
** Bug watch added:
The needrestart package has some sophisticated logic to detect whether
the system needs to be booted to get an updated microcode applied
(needrestart -w is how it can be invoked directly to report on microcode
status). The needrestart package is a bit much to be included as a
dependency or even a
** Summary changed:
- package intel-microcode 3.20151106.1 failed to install/upgrade: subprocess
installed post-removal script returned error exit status 1
+ intel-microcode updates fail to install when running from live (read-only
/boot) media
--
You received this bug notification because
** Summary changed:
- Dell 5280 hangs on warm reboot after upgrading intel-microcode package
+ Dell 5280 (id=0x00050654/06-55-04) hangs on warm reboot after upgrading
intel-microcode package
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883598
Title:
efi: Restrict efivar_ssdt_load when the kernel is locked down
To
** Changed in: fwupd-signed (Ubuntu Bionic)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883595
Title:
fwupd-signed needs to be updated in sync with fwupd
** Description changed:
Upstream git commit 1957a85b0032 needs to be backported to older
releases:
efi: Restrict efivar_ssdt_load when the kernel is locked down
efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
EFI variable, which gives arbitrary code
*** This bug is a security vulnerability ***
Public security bug reported:
Upstream git commit 1957a85b0032 needs to be backported to older
releases:
efi: Restrict efivar_ssdt_load when the kernel is locked down
efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
EFI
Public bug reported:
A security update was issued for fwupd (https://usn.ubuntu.com/4395-1/)
in bionic, eoan, and focal; however fwupd-signed needs to be updated at
the same time.
** Affects: fwupd-signed (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: fwupd-signed
** Summary changed:
- Dell Latitude 7300 sometimes stuck at purple screen after grub and fails to
boot up
+ Dell Latitude 7300 ( cpu id 0x806eb) sometimes stuck at purple screen after
grub and fails to boot up
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Thanks for testing! The issue you are seeing looks very similar to
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-
Files/issues/24 except that in that report, version 0xca was also
problematic.
** Bug watch added:
github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues
Hi You-Sheng Yang, are you still seeing this issue after the release of
the 20200609 microcode update? Particularly after a warm reboot?
Bug 1883002 looks to be the same processor id and reports similar
instability with the 20200609 microcode, particularly after a warm
reboot.
Thanks.
--
You
** Changed in: intel-microcode (Ubuntu)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883002
Title:
intel-ucode 20200609: hangs on Whiskey Lake
To manage
Thanks for testing and sorry you're experiencing this. Can you confirm
that the output of 'iucode-tool -Sv' contains:
iucode-tool: system has processor(s) with signature 0x000906ed
output of lscpu would be useful too, along with ensuring you have the
latest BIOS installed from Dell.
Raising
The version in eoan was superceded by the 20200609 release. In focal and
groovy, this change was reverted in 3.20200609.0ubuntu0.20.04.2 because
the tmpfiles.d approach, in addition to attmepting to late load early in
the boot process, also caused late loading to trigger during package
This was fixed in 3.20200609.0ubuntu0.20.04.2 in focal and groovy
(thanks for the forward copy!). The eoan patch to add tmpfiles.d late
loading never made it out of eoan-proposed.
Closing all tasks. Thanks!
** Changed in: intel-microcode (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: intel-microcode (Ubuntu)
Status: Fix Released => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883002
Title:
intel-ucode 20200609: hangs on Whiskey Lake
To manage
This is on Ubuntu 20.04 LTS/focal, correct?
If so, this is either exacerbated or triggered entirely because focal's
intel-microcode package enabled late loading of microcode (known to be
risky) that would get triggered while updating the intel-microcode
package itself; see LP: #1883002. Even
Henrique, I didn't realize until today that the systemd tmpfiles.d would
also get triggered as part of the intel-microcode postinst in addition
to very early in the boot process. I have reverted it for focal (and
eventually groovy) because of the increased risk of instability and the
greater
** Changed in: intel-microcode (Ubuntu)
Status: Fix Released => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883002
Title:
intel-ucode 20200609: hangs on Whiskey Lake
To manage
For others hitting this issue, add the 'dis_ucode_ldr' kernel boot
option in grub before booting to disable microcode loading.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883002
Title:
Henrique, I think that's a consequence of the change in focal's intel-
microcode to add a tmpfiles.d snippet to do late loading of microcode
(LP: #1862938), the intel-microcode postinst generated ends up calling
'systemd-tmpfiles --create' on the added microcode conf file, causing it
to be
** Also affects: intel-microcode (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: intel-microcode (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: intel-microcode (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a duplicate of bug 1882890 ***
https://bugs.launchpad.net/bugs/1882890
Great, thank you, appreciated. And yes, I'll mark this as a duplicate of
the other.
** This bug has been marked a duplicate of bug 1882890
intel-ucode/06-4e-03 from release 20200609 hangs system in
Thanks!
I have packages that revert the problematic microcode back to the
version included in the microcode updates from 20191115 available for
testing in https://launchpad.net/~sbeattie/+archive/ubuntu/lp1882890/ ;
can you confirm that after installing them from that ppa, that you can
Rodman: no, that's an older issue affecting a difference processor
family.
This issue is specifically affecting processors with id 0x406e3; if the
output of dmesg | grep microcode does not contain "sig=0x406e3" then you
have a different issue, and should open a new bug report.
I am working on
in: intel-microcode (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** Changed in: intel-microcode (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
Sorry, second line would contain the 'sig=' entry that identifies the
processor family.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882914
Title:
Thinkpad T460S won't boot with latest
Hi, can you please include the output of
dmesg | grep microcode
and confirm that the first line contains "sig=0x406e3"?
If so, this is likely a duplicate of bug 1882890.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Can you please post the output of:
dmesg | grep microcode
thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882943
Title:
Boot freezes silently after 'intel-microcode' upgrade
To manage
This issue ultimately has the same root cause as LP: #1880659, namely
that in the 5.6 development cycle, the proc_fs infrastructure was
modified to not use the generic file_operations struct and instead use a
simplified procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc
from VFS with
In the 5.6 development cycle, the proc_fs infrastructure was modified to
not use the generic file_operations struct and instead use a simplified
procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc from VFS with
"struct proc_ops"'), which is why this test is failing.
I've fixed this in QRT
** Also affects: openscap (Ubuntu Groovy)
Importance: Low
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851682
Title:
oscap is broken in ubuntu 19.10
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks, David, for the feedback, marking all versions as verification-
done.
** Tags added: verification-done-bionic verification-done-eoan
verification-done-focal verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
How is one supposed to know about this environment variable?
$ man ubuntu-security-status
No manual entry for ubuntu-security-status
$ ubuntu-security-status --help
usage: ubuntu-security-status [-h] [--thirdparty] [--unavailable]
Return information about security support for packages
Because these packages may end up getting copied to the security
pockets, these have been built in the ubuntu-security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/
Direct links to the packages are
focal:
** Changed in: qa-regression-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1879339
Title:
test_310_config_security_perf_events_restrict /
The test_400_refcount_config failure has been addressed in
qa-regression-testing commit
https://git.launchpad.net/qa-regression-testing/commit/?id=480aaab47c0e7e11ab5bad5b56f61742ac8fdf9e
Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Ubuntu Security team ack for binary copying these into the security
pockets as well.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878108
Title:
new upstream release 2020a
To manage
For the test_310_config_security_perf_events_restrict -- missing
SECURITY_PERF_EVENTS_RESTRICT option; it appears the linux-oem-5.6
kernel is missing the following Ubuntu SAUCE patch:
commit 4e6246de75c468397327fa741b380c926020c81f
Author: Ben Hutchings
Date: Tue Aug 16 10:27:00 2016
** Also affects: gce-compute-image-packages (Ubuntu Groovy)
Importance: Undecided
Assignee: Steve Beattie (sbeattie)
Status: New
** Also affects: gce-compute-image-packages (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: gce-compute-image-packages (Ubuntu
-packages (Ubuntu)
Importance: Undecided
Assignee: Steve Beattie (sbeattie)
Status: New
** Changed in: gce-compute-image-packages (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Ubuntu
Bugs, wh
All that about CONFIG_RT_GROUP_SCHED seems sensible, but then I am
confused as to why is it only showing up in s390x environments?
The test is trying to exercise CAP_SYS_NICE, and doing so by calling
setpriority(PRIO_PROCESS, 0, -5)
Does the test needs to be put into a cgroup with rt
I have seen a similar failure with that specific test when running the
tests under virtualbox on x86, though I have not tried it in several
years.
If this is the expected behavior going forward on s390s, we can address
it in qa-regression-testing.
Thanks.
--
You received this bug notification
An initial port of aa-status to C landed in
https://gitlab.com/apparmor/apparmor/-/commit/8f9046b1b179190d0003ae1beacf460ee93c5090
and will e in the upcoming AppArmor 3 release. There is a follow up
improvement in https://gitlab.com/apparmor/apparmor/-/merge_requests/487
that should also land.
**
Fixes for this issue were published in USN 4318-1
https://usn.ubuntu.com/4318-1/. Closing this issue on the Ubuntu side of
things and making the report public.
Thanks for all your help!
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux
Oh, and I have no crash files in /var/crash/.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871538
Title:
dbus timeout-ed during an upgrade, taking services down including gdm
To manage
Hi, I had a similar crash this morning upgrading focal, after trying to
get unattended-upgrades to stop spinning on missing focal-security apt
list files. In this case, I don't use gnome-shell as my desktop
environment, but it still tore down my entire desktop environment and
caused gdm3 to
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865429
Title:
bionic/linux-gke-5.0: 5.0.0-1032.33
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865431
Title:
bionic/linux-gcp: 5.0.0-1033.34 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865106
Title:
xenial/linux: 4.4.0-176.206 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865422
Title:
bionic/linux-oracle-5.0: 5.0.0-1013.18
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865245
Title:
xenial/linux-aws: 4.4.0-1104.115
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865111
Title:
eoan/linux: 5.3.0-42.34 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865434
Title:
bionic/linux-aws-5.0: 5.0.0-1027.30
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865109
Title:
bionic/linux: 4.15.0-91.92 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865255
Title:
bionic/linux-gke-4.15: 4.15.0-1055.58
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865251
Title:
xenial/linux-gcp: 4.15.0-1058.62
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864729
Title:
bionic/linux-snapdragon: 4.15.0-1074.81
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865247
Title:
bionic/linux-kvm: 4.15.0-1056.57
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865269
Title:
bionic/linux-aws: 4.15.0-1063.67
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865421
Title:
xenial/linux-aws-hwe:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865200
Title:
bionic/linux-oem: 4.15.0-1076.86
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865243
Title:
xenial/linux-kvm: 4.4.0-1068.75 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865480
Title:
bionic/linux-oracle: 4.15.0-1035.39
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865198
Title:
xenial/linux-azure: 4.15.0-1074.79
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865193
Title:
bionic/linux-azure: 5.0.0-1034.36
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865142
Title:
xenial/linux-hwe: 4.15.0-91.92~16.04.1
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864726
Title:
bionic/linux-raspi2: 4.15.0-1057.61
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863329
Title:
xenial/linux-snapdragon: 4.4.0-1134.142
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863324
Title:
xenial/linux-raspi2: 4.4.0-1130.139
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865493
Title:
eoan/linux-oracle: 5.3.0-1011.12
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865492
Title:
bionic/linux-oracle-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865491
Title:
eoan/linux-gcp: 5.3.0-1014.15 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865488
Title:
bionic/linux-gcp-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865490
Title:
bionic/linux-gke-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865482
Title:
eoan/linux-aws: 5.3.0-1013.14 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865438
Title:
eoan/linux-kvm: 5.3.0-1012.13 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865189
Title:
bionic/linux-azure-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865190
Title:
eoan/linux-azure: 5.3.0-1015.16 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865139
Title:
bionic/linux-hwe: 5.3.0-42.34~18.04.1
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863269
Title:
eoan/linux-raspi2: 5.3.0-1019.21
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863268
Title:
bionic/linux-raspi2-5.3:
I reviewed libxcrypt 1:4.4.10-10ubuntu1 as checked into focal. This shouldn't
be
considered a full audit but rather a quick gauge of maintainability.
libxcrypt is a library for handling one-way hashing of passwords. It's
use here is to replace the deprecated glibc libcrypt library.
- Only CVE
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
301 - 400 of 11491 matches
Mail list logo