[Bug 1705359] Re: The default PAM configuration for kerberos authentication allows unauthenticated SSH access

2020-07-14 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1705359 Title: The default PAM configuration for kerberos authentication allows

[Bug 1886668] Re: linux 4.15.0-109-generic network DoS regression vs -108

2020-07-08 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1886668 Title: linux 4.15.0-109-generic network DoS regression vs -108 To manage

[Bug 1882093] Re: CVE-2020-{5963|5967} NVIDIA

2020-07-02 Thread Steve Beattie
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1882093 Title: CVE-2020-{5963|5967} NVIDIA To manage notifications about this bug

[Bug 1884887] Re: rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2020-06-30 Thread Steve Beattie
Updated groovy debdiff against the merge from debian currently in groovy-proposed. ** Patch added: "rsyslog_8.2006.0-2ubuntu2.debdiff" https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5388559/+files/rsyslog_8.2006.0-2ubuntu2.debdiff ** Patch removed:

[Bug 1877027] Re: SNMP stopped running all of sudden (snmpd 5.8+dfsg-2)

2020-06-25 Thread Steve Beattie
FYI, this was assigned CVE-2019-20892. ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-20892 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1877027 Title: SNMP stopped running

[Bug 1884887] Re: rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2020-06-24 Thread Steve Beattie
Fixed debdiff to add the bug reference for groovy. ** Patch removed: "rsyslog_8.2001.0-1ubuntu2.debdiff" https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5386642/+files/rsyslog_8.2001.0-1ubuntu2.debdiff ** Patch added: "rsyslog_8.2001.0-1ubuntu2.debdiff"

[Bug 1884887] Re: rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2020-06-24 Thread Steve Beattie
Focal version. ** Patch added: "rsyslog_8.2001.0-1ubuntu1.1.debdiff" https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/1884887/+attachment/5386929/+files/rsyslog_8.2001.0-1ubuntu1.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1877027] Re: SNMP stopped running all of sudden (snmpd 5.8+dfsg-2)

2020-06-24 Thread Steve Beattie
Andreas, agreed, I think (speaking from the Ubuntu Security Team's perspective), this should go to focal-security. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1877027 Title: SNMP stopped running

[Bug 1884887] Re: rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2020-06-24 Thread Steve Beattie
Debdiff for groovy attached: - adds a second ExecStartPost entru to chmod /var/log/dmesg - adjusts the savelog(8) call in ExecStartPre to set the permission mode to 640 explicitly when rotating dmesg logs ** Patch added: "rsyslog_8.2001.0-1ubuntu2.debdiff"

[Bug 1884887] [NEW] rsyslogd dmesg unit leaves /var/log/dmesg* world readable

2020-06-24 Thread Steve Beattie
Public bug reported: [Impact] The rsyslog dmesg systemd unit /lib/systemd/system/dmesg.service in eoan, focal, and groovy create /var/log/dmesg* with the following permissions: -rw-r--r-- 1 root adm 45146 Jun 16 12:32 /var/log/dmesg Most other system logs in /var/log/ are only readable by

[Bug 1811861] Re: incorrect permissions on /var/log after debootstrap

2020-06-23 Thread Steve Beattie
Thanks for clarifying, closing. ** Changed in: rsyslog (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1811861 Title: incorrect permissions on /var/log after

[Bug 1881942] Re: default configuration forwards sshd failures to port 7070

2020-06-23 Thread Steve Beattie
Hi John, I'm not sure what's happened here, but the default /etc/rsyslog.d/50-default.conf contains no such snippet (a pristine copy is also stored in /usr/share/rsyslog/50-default.conf) and is managed via ucf. The contents of a pristine version are attached. Either another package you have

[Bug 1880663] Re: Dell Latitude 7300, sig=0x806eb/20200609, sometimes stuck at purple screen after grub and fails to boot up

2020-06-17 Thread Steve Beattie
Acelan, did this system also fail with the 20191115 microcode, revision 0x00ca? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880663 Title: Dell Latitude 7300, sig=0x806eb/20200609, sometimes

[Bug 1883002] Re: Dell Latitude 7300, i7-8665U, sig=0x806ec/20200609: hangs on Whiskey Lake

2020-06-16 Thread Steve Beattie
Andrea, thanks again for the report and the testing you've done, and again, sorry you are having this issue. I have filed https://github.com/intel/Intel-Linux-Processor-Microcode-Data- Files/issues/35 specifically for this issue with sig=0x806ea revision=0xd6. ** Bug watch added:

[Bug 1742903] Re: Microcode updates require a reboot to apply, but package postinst doesn't touch /run/reboot-required

2020-06-16 Thread Steve Beattie
The needrestart package has some sophisticated logic to detect whether the system needs to be booted to get an updated microcode applied (needrestart -w is how it can be invoked directly to report on microcode status). The needrestart package is a bit much to be included as a dependency or even a

[Bug 1608933] Re: intel-microcode updates fail to install when running from live (read-only /boot) media

2020-06-16 Thread Steve Beattie
** Summary changed: - package intel-microcode 3.20151106.1 failed to install/upgrade: subprocess installed post-removal script returned error exit status 1 + intel-microcode updates fail to install when running from live (read-only /boot) media -- You received this bug notification because

[Bug 1854764] Re: Dell 5280 (id=0x00050654/06-55-04) hangs on warm reboot after upgrading intel-microcode package

2020-06-16 Thread Steve Beattie
** Summary changed: - Dell 5280 hangs on warm reboot after upgrading intel-microcode package + Dell 5280 (id=0x00050654/06-55-04) hangs on warm reboot after upgrading intel-microcode package -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1883598] Re: efi: Restrict efivar_ssdt_load when the kernel is locked down

2020-06-16 Thread Steve Beattie
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883598 Title: efi: Restrict efivar_ssdt_load when the kernel is locked down To

[Bug 1883595] Re: fwupd-signed needs to be updated in sync with fwupd security update

2020-06-16 Thread Steve Beattie
** Changed in: fwupd-signed (Ubuntu Bionic) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883595 Title: fwupd-signed needs to be updated in sync with fwupd

[Bug 1883598] Re: efi: Restrict efivar_ssdt_load when the kernel is locked down

2020-06-15 Thread Steve Beattie
** Description changed: Upstream git commit 1957a85b0032 needs to be backported to older releases:   efi: Restrict efivar_ssdt_load when the kernel is locked down   efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an   EFI variable, which gives arbitrary code

[Bug 1883598] [NEW] efi: Restrict efivar_ssdt_load when the kernel is locked down

2020-06-15 Thread Steve Beattie
*** This bug is a security vulnerability *** Public security bug reported: Upstream git commit 1957a85b0032 needs to be backported to older releases:   efi: Restrict efivar_ssdt_load when the kernel is locked down   efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an   EFI

[Bug 1883595] [NEW] fwupd-signed needs to be updated in sync with fwupd security update

2020-06-15 Thread Steve Beattie
Public bug reported: A security update was issued for fwupd (https://usn.ubuntu.com/4395-1/) in bionic, eoan, and focal; however fwupd-signed needs to be updated at the same time. ** Affects: fwupd-signed (Ubuntu) Importance: Undecided Status: Invalid ** Affects: fwupd-signed

[Bug 1880663] Re: Dell Latitude 7300 ( cpu id 0x806eb) sometimes stuck at purple screen after grub and fails to boot up

2020-06-12 Thread Steve Beattie
** Summary changed: - Dell Latitude 7300 sometimes stuck at purple screen after grub and fails to boot up + Dell Latitude 7300 ( cpu id 0x806eb) sometimes stuck at purple screen after grub and fails to boot up -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-11 Thread Steve Beattie
Thanks for testing! The issue you are seeing looks very similar to https://github.com/intel/Intel-Linux-Processor-Microcode-Data- Files/issues/24 except that in that report, version 0xca was also problematic. ** Bug watch added: github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues

[Bug 1862751] Re: Hard lockups using microcode releases 20191115 on Intel Whiskey Lake

2020-06-11 Thread Steve Beattie
Hi You-Sheng Yang, are you still seeing this issue after the release of the 20200609 microcode update? Particularly after a warm reboot? Bug 1883002 looks to be the same processor id and reports similar instability with the 20200609 microcode, particularly after a warm reboot. Thanks. -- You

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-11 Thread Steve Beattie
** Changed in: intel-microcode (Ubuntu) Status: Fix Released => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883002 Title: intel-ucode 20200609: hangs on Whiskey Lake To manage

[Bug 1882943] Re: Boot freezes silently after 'intel-microcode' upgrade

2020-06-11 Thread Steve Beattie
Thanks for testing and sorry you're experiencing this. Can you confirm that the output of 'iucode-tool -Sv' contains: iucode-tool: system has processor(s) with signature 0x000906ed output of lscpu would be useful too, along with ensuring you have the latest BIOS installed from Dell. Raising

[Bug 1862938] Re: Enable late loading of microcode by default

2020-06-11 Thread Steve Beattie
The version in eoan was superceded by the 20200609 release. In focal and groovy, this change was reverted in 3.20200609.0ubuntu0.20.04.2 because the tmpfiles.d approach, in addition to attmepting to late load early in the boot process, also caused late loading to trigger during package

[Bug 1883016] Re: revert tmpfiles.d loading of microcode

2020-06-11 Thread Steve Beattie
This was fixed in 3.20200609.0ubuntu0.20.04.2 in focal and groovy (thanks for the forward copy!). The eoan patch to add tmpfiles.d late loading never made it out of eoan-proposed. Closing all tasks. Thanks! ** Changed in: intel-microcode (Ubuntu Focal) Status: In Progress => Fix Released

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-10 Thread Steve Beattie
** Changed in: intel-microcode (Ubuntu) Status: Fix Released => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883002 Title: intel-ucode 20200609: hangs on Whiskey Lake To manage

[Bug 1882943] Re: Boot freezes silently after 'intel-microcode' upgrade

2020-06-10 Thread Steve Beattie
This is on Ubuntu 20.04 LTS/focal, correct? If so, this is either exacerbated or triggered entirely because focal's intel-microcode package enabled late loading of microcode (known to be risky) that would get triggered while updating the intel-microcode package itself; see LP: #1883002. Even

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-10 Thread Steve Beattie
Henrique, I didn't realize until today that the systemd tmpfiles.d would also get triggered as part of the intel-microcode postinst in addition to very early in the boot process. I have reverted it for focal (and eventually groovy) because of the increased risk of instability and the greater

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-10 Thread Steve Beattie
** Changed in: intel-microcode (Ubuntu) Status: Fix Released => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883002 Title: intel-ucode 20200609: hangs on Whiskey Lake To manage

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-10 Thread Steve Beattie
For others hitting this issue, add the 'dis_ucode_ldr' kernel boot option in grub before booting to disable microcode loading. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883002 Title:

[Bug 1883002] Re: intel-ucode 20200609: hangs on Whiskey Lake

2020-06-10 Thread Steve Beattie
Henrique, I think that's a consequence of the change in focal's intel- microcode to add a tmpfiles.d snippet to do late loading of microcode (LP: #1862938), the intel-microcode postinst generated ends up calling 'systemd-tmpfiles --create' on the added microcode conf file, causing it to be

[Bug 1882890] Re: intel-ucode/06-4e-03 from release 20200609 hangs system in early boot

2020-06-10 Thread Steve Beattie
** Also affects: intel-microcode (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: intel-microcode (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: intel-microcode (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects:

[Bug 1882914] Re: Thinkpad T460S won't boot with latest intel-microcode update

2020-06-10 Thread Steve Beattie
*** This bug is a duplicate of bug 1882890 *** https://bugs.launchpad.net/bugs/1882890 Great, thank you, appreciated. And yes, I'll mark this as a duplicate of the other. ** This bug has been marked a duplicate of bug 1882890 intel-ucode/06-4e-03 from release 20200609 hangs system in

[Bug 1882914] Re: Thinkpad T460S won't boot with latest intel-microcode update

2020-06-10 Thread Steve Beattie
Thanks! I have packages that revert the problematic microcode back to the version included in the microcode updates from 20191115 available for testing in https://launchpad.net/~sbeattie/+archive/ubuntu/lp1882890/ ; can you confirm that after installing them from that ppa, that you can

[Bug 1882890] Re: intel-ucode/06-4e-03 from release 20200609 hangs system in early boot

2020-06-10 Thread Steve Beattie
Rodman: no, that's an older issue affecting a difference processor family. This issue is specifically affecting processors with id 0x406e3; if the output of dmesg | grep microcode does not contain "sig=0x406e3" then you have a different issue, and should open a new bug report. I am working on

[Bug 1882890] Re: intel-ucode/06-4e-03 from release 20200609 hangs system in early boot

2020-06-10 Thread Steve Beattie
in: intel-microcode (Ubuntu) Assignee: (unassigned) => Steve Beattie (sbeattie) ** Changed in: intel-microcode (Ubuntu) Importance: Undecided => Critical -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.la

[Bug 1882914] Re: Thinkpad T460S won't boot with latest intel-microcode update

2020-06-10 Thread Steve Beattie
Sorry, second line would contain the 'sig=' entry that identifies the processor family. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1882914 Title: Thinkpad T460S won't boot with latest

[Bug 1882914] Re: Thinkpad T460S won't boot with latest intel-microcode update

2020-06-10 Thread Steve Beattie
Hi, can you please include the output of dmesg | grep microcode and confirm that the first line contains "sig=0x406e3"? If so, this is likely a duplicate of bug 1882890. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1882943] Re: Boot freezes silently after 'intel-microcode' upgrade

2020-06-10 Thread Steve Beattie
Can you please post the output of: dmesg | grep microcode thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1882943 Title: Boot freezes silently after 'intel-microcode' upgrade To manage

[Bug 1879340] Re: test_072_strict_devmem from ubuntu_qrt_kernel_security failed to build on F-OEM-5.6

2020-06-08 Thread Steve Beattie
This issue ultimately has the same root cause as LP: #1880659, namely that in the 5.6 development cycle, the proc_fs infrastructure was modified to not use the generic file_operations struct and instead use a simplified procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc from VFS with

[Bug 1880659] Re: test_120_smep_works from ubuntu_qrt_kernel_security fail on F-OEM-5.6

2020-06-08 Thread Steve Beattie
In the 5.6 development cycle, the proc_fs infrastructure was modified to not use the generic file_operations struct and instead use a simplified procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc from VFS with "struct proc_ops"'), which is why this test is failing. I've fixed this in QRT

[Bug 1851682] Re: oscap is broken in ubuntu 19.10

2020-06-05 Thread Steve Beattie
** Also affects: openscap (Ubuntu Groovy) Importance: Low Status: Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1851682 Title: oscap is broken in ubuntu 19.10 To manage

[Bug 1880360] Re: package linux-modules-extra-5.4.0-31-generic 5.4.0-31.35 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting a removal

2020-06-02 Thread Steve Beattie
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1878654] Re: Remove automatically added groups from os-login

2020-05-27 Thread Steve Beattie
Thanks, David, for the feedback, marking all versions as verification- done. ** Tags added: verification-done-bionic verification-done-eoan verification-done-focal verification-done-xenial -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1878499] Re: MY_MIRROR env could be better documented

2020-05-26 Thread Steve Beattie
How is one supposed to know about this environment variable? $ man ubuntu-security-status No manual entry for ubuntu-security-status $ ubuntu-security-status --help usage: ubuntu-security-status [-h] [--thirdparty] [--unavailable] Return information about security support for packages

[Bug 1878654] Re: Remove automatically added groups from os-login

2020-05-21 Thread Steve Beattie
Because these packages may end up getting copied to the security pockets, these have been built in the ubuntu-security-proposed ppa: https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/ Direct links to the packages are focal:

[Bug 1879339] Re: test_310_config_security_perf_events_restrict / test_400_refcount_config in ubuntu_qrt_kernel_security failed on F-OEM-5.6

2020-05-21 Thread Steve Beattie
** Changed in: qa-regression-testing Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1879339 Title: test_310_config_security_perf_events_restrict /

[Bug 1879339] Re: test_310_config_security_perf_events_restrict / test_400_refcount_config in ubuntu_qrt_kernel_security failed on F-OEM-5.6

2020-05-21 Thread Steve Beattie
The test_400_refcount_config failure has been addressed in qa-regression-testing commit https://git.launchpad.net/qa-regression-testing/commit/?id=480aaab47c0e7e11ab5bad5b56f61742ac8fdf9e Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1878108] Re: new upstream release 2020a

2020-05-20 Thread Steve Beattie
Ubuntu Security team ack for binary copying these into the security pockets as well. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1878108 Title: new upstream release 2020a To manage

[Bug 1879339] Re: test_310_config_security_perf_events_restrict / test_400_refcount_config in ubuntu_qrt_kernel_security failed on F-OEM-5.6

2020-05-20 Thread Steve Beattie
For the test_310_config_security_perf_events_restrict -- missing SECURITY_PERF_EVENTS_RESTRICT option; it appears the linux-oem-5.6 kernel is missing the following Ubuntu SAUCE patch: commit 4e6246de75c468397327fa741b380c926020c81f Author: Ben Hutchings Date: Tue Aug 16 10:27:00 2016

[Bug 1878654] Re: Remove automatically added groups from os-login

2020-05-19 Thread Steve Beattie
** Also affects: gce-compute-image-packages (Ubuntu Groovy) Importance: Undecided Assignee: Steve Beattie (sbeattie) Status: New ** Also affects: gce-compute-image-packages (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: gce-compute-image-packages (Ubuntu

[Bug 1878654] [NEW] Remove automatically added groups from os-login

2020-05-14 Thread Steve Beattie
-packages (Ubuntu) Importance: Undecided Assignee: Steve Beattie (sbeattie) Status: New ** Changed in: gce-compute-image-packages (Ubuntu) Assignee: (unassigned) => Steve Beattie (sbeattie) -- You received this bug notification because you are a member of Ubuntu Bugs, wh

[Bug 1876697] Re: test_regression_testsuite from ubuntu_qrt_apparmor failed on Focal zVM

2020-05-05 Thread Steve Beattie
All that about CONFIG_RT_GROUP_SCHED seems sensible, but then I am confused as to why is it only showing up in s390x environments? The test is trying to exercise CAP_SYS_NICE, and doing so by calling setpriority(PRIO_PROCESS, 0, -5) Does the test needs to be put into a cgroup with rt

[Bug 1876697] Re: test_regression_testsuite from ubuntu_qrt_apparmor failed on Focal zVM

2020-05-04 Thread Steve Beattie
I have seen a similar failure with that specific test when running the tests under virtualbox on x86, though I have not tried it in several years. If this is the expected behavior going forward on s390s, we can address it in qa-regression-testing. Thanks. -- You received this bug notification

[Bug 1865519] Re: apparmor depends on python3

2020-04-29 Thread Steve Beattie
An initial port of aa-status to C landed in https://gitlab.com/apparmor/apparmor/-/commit/8f9046b1b179190d0003ae1beacf460ee93c5090 and will e in the upcoming AppArmor 3 release. There is a follow up improvement in https://gitlab.com/apparmor/apparmor/-/merge_requests/487 that should also land. **

[Bug 1867717]

2020-04-08 Thread Steve Beattie
Fixes for this issue were published in USN 4318-1 https://usn.ubuntu.com/4318-1/. Closing this issue on the Ubuntu side of things and making the report public. Thanks for all your help! ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Changed in: linux

[Bug 1871538] Re: dbus timeout-ed during an upgrade, taking services down including gdm

2020-04-08 Thread Steve Beattie
Oh, and I have no crash files in /var/crash/. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1871538 Title: dbus timeout-ed during an upgrade, taking services down including gdm To manage

[Bug 1871538] Re: dbus timeout-ed during an upgrade, taking services down including gdm

2020-04-08 Thread Steve Beattie
Hi, I had a similar crash this morning upgrading focal, after trying to get unattended-upgrades to stop spinning on missing focal-security apt list files. In this case, I don't use gnome-shell as my desktop environment, but it still tore down my entire desktop environment and caused gdm3 to

[Bug 1865429] Re: bionic/linux-gke-5.0: 5.0.0-1032.33 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865429 Title: bionic/linux-gke-5.0: 5.0.0-1032.33

[Bug 1865431] Re: bionic/linux-gcp: 5.0.0-1033.34 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865431 Title: bionic/linux-gcp: 5.0.0-1033.34 -proposed

[Bug 1865106] Re: xenial/linux: 4.4.0-176.206 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865106 Title: xenial/linux: 4.4.0-176.206 -proposed

[Bug 1865422] Re: bionic/linux-oracle-5.0: 5.0.0-1013.18 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865422 Title: bionic/linux-oracle-5.0: 5.0.0-1013.18

[Bug 1865245] Re: xenial/linux-aws: 4.4.0-1104.115 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865245 Title: xenial/linux-aws: 4.4.0-1104.115

[Bug 1865111] Re: eoan/linux: 5.3.0-42.34 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865111 Title: eoan/linux: 5.3.0-42.34 -proposed tracker

[Bug 1865434] Re: bionic/linux-aws-5.0: 5.0.0-1027.30 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865434 Title: bionic/linux-aws-5.0: 5.0.0-1027.30

[Bug 1865109] Re: bionic/linux: 4.15.0-91.92 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865109 Title: bionic/linux: 4.15.0-91.92 -proposed

[Bug 1865255] Re: bionic/linux-gke-4.15: 4.15.0-1055.58 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865255 Title: bionic/linux-gke-4.15: 4.15.0-1055.58

[Bug 1865251] Re: xenial/linux-gcp: 4.15.0-1058.62 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865251 Title: xenial/linux-gcp: 4.15.0-1058.62

[Bug 1864729] Re: bionic/linux-snapdragon: 4.15.0-1074.81 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1864729 Title: bionic/linux-snapdragon: 4.15.0-1074.81

[Bug 1865247] Re: bionic/linux-kvm: 4.15.0-1056.57 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865247 Title: bionic/linux-kvm: 4.15.0-1056.57

[Bug 1865269] Re: bionic/linux-aws: 4.15.0-1063.67 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865269 Title: bionic/linux-aws: 4.15.0-1063.67

[Bug 1865421] Re: xenial/linux-aws-hwe: 4.15.0-1063.67~16.04.1 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865421 Title: xenial/linux-aws-hwe:

[Bug 1865200] Re: bionic/linux-oem: 4.15.0-1076.86 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865200 Title: bionic/linux-oem: 4.15.0-1076.86

[Bug 1865243] Re: xenial/linux-kvm: 4.4.0-1068.75 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865243 Title: xenial/linux-kvm: 4.4.0-1068.75 -proposed

[Bug 1865480] Re: bionic/linux-oracle: 4.15.0-1035.39 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865480 Title: bionic/linux-oracle: 4.15.0-1035.39

[Bug 1865198] Re: xenial/linux-azure: 4.15.0-1074.79 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865198 Title: xenial/linux-azure: 4.15.0-1074.79

[Bug 1865193] Re: bionic/linux-azure: 5.0.0-1034.36 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865193 Title: bionic/linux-azure: 5.0.0-1034.36

[Bug 1865142] Re: xenial/linux-hwe: 4.15.0-91.92~16.04.1 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865142 Title: xenial/linux-hwe: 4.15.0-91.92~16.04.1

[Bug 1864726] Re: bionic/linux-raspi2: 4.15.0-1057.61 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1864726 Title: bionic/linux-raspi2: 4.15.0-1057.61

[Bug 1863329] Re: xenial/linux-snapdragon: 4.4.0-1134.142 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863329 Title: xenial/linux-snapdragon: 4.4.0-1134.142

[Bug 1863324] Re: xenial/linux-raspi2: 4.4.0-1130.139 -proposed tracker

2020-03-13 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863324 Title: xenial/linux-raspi2: 4.4.0-1130.139

[Bug 1865493] Re: eoan/linux-oracle: 5.3.0-1011.12 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865493 Title: eoan/linux-oracle: 5.3.0-1011.12

[Bug 1865492] Re: bionic/linux-oracle-5.3: 5.3.0-1011.12~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865492 Title: bionic/linux-oracle-5.3:

[Bug 1865491] Re: eoan/linux-gcp: 5.3.0-1014.15 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865491 Title: eoan/linux-gcp: 5.3.0-1014.15 -proposed

[Bug 1865488] Re: bionic/linux-gcp-5.3: 5.3.0-1014.15~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865488 Title: bionic/linux-gcp-5.3:

[Bug 1865490] Re: bionic/linux-gke-5.3: 5.3.0-1014.15~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865490 Title: bionic/linux-gke-5.3:

[Bug 1865482] Re: eoan/linux-aws: 5.3.0-1013.14 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865482 Title: eoan/linux-aws: 5.3.0-1013.14 -proposed

[Bug 1865438] Re: eoan/linux-kvm: 5.3.0-1012.13 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865438 Title: eoan/linux-kvm: 5.3.0-1012.13 -proposed

[Bug 1865189] Re: bionic/linux-azure-5.3: 5.3.0-1015.16~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865189 Title: bionic/linux-azure-5.3:

[Bug 1865190] Re: eoan/linux-azure: 5.3.0-1015.16 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865190 Title: eoan/linux-azure: 5.3.0-1015.16 -proposed

[Bug 1865139] Re: bionic/linux-hwe: 5.3.0-42.34~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865139 Title: bionic/linux-hwe: 5.3.0-42.34~18.04.1

[Bug 1863269] Re: eoan/linux-raspi2: 5.3.0-1019.21 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863269 Title: eoan/linux-raspi2: 5.3.0-1019.21

[Bug 1863268] Re: bionic/linux-raspi2-5.3: 5.3.0-1019.21~18.04.1 -proposed tracker

2020-03-12 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863268 Title: bionic/linux-raspi2-5.3:

[Bug 1865532] Re: [MIR] libxcrypt (dependency of glibc)

2020-03-11 Thread Steve Beattie
I reviewed libxcrypt 1:4.4.10-10ubuntu1 as checked into focal. This shouldn't be considered a full audit but rather a quick gauge of maintainability. libxcrypt is a library for handling one-way hashing of passwords. It's use here is to replace the deprecated glibc libcrypt library. - Only CVE

[Bug 1865480] Re: bionic/linux-oracle: 4.15.0-1035.39 -proposed tracker

2020-03-11 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => Steve Beattie (sbeattie) -- You received this bug notification because you are a

[Bug 1865422] Re: bionic/linux-oracle-5.0: 5.0.0-1013.18 -proposed tracker

2020-03-10 Thread Steve Beattie
** Changed in: kernel-sru-workflow/security-signoff Status: Confirmed => In Progress ** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => Steve Beattie (sbeattie) -- You received this bug notification because you are a

<    1   2   3   4   5   6   7   8   9   10   >