in: intel-microcode (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** Changed in: intel-microcode (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
Sorry, second line would contain the 'sig=' entry that identifies the
processor family.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882914
Title:
Thinkpad T460S won't boot with latest
Hi, can you please include the output of
dmesg | grep microcode
and confirm that the first line contains "sig=0x406e3"?
If so, this is likely a duplicate of bug 1882890.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Can you please post the output of:
dmesg | grep microcode
thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1882943
Title:
Boot freezes silently after 'intel-microcode' upgrade
To manage
==
Ubuntu Security Notice USN-4392-1
June 10, 2020
linux, linux-lts-trusty vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-4391-1
June 10, 2020
linux, linux-aws, linux-kvm vulnerabilities
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN-4393-1
June 10, 2020
linux vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-4389-1
June 09, 2020
linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle
vulnerabilities
==
A security issue
==
Ubuntu Security Notice USN-4387-1
June 09, 2020
linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp,
linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle,
linux-oracle-5.3 vulnerabilities
==
Ubuntu Security Notice USN-4390-1
June 10, 2020
linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,
linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle
vulnerabilities
==
Ubuntu Security Notice USN-4388-1
June 09, 2020
linux-gke-5.0, linux-oem-osp1 vulnerabilities
==
A security issue affects these releases of Ubuntu
==
Ubuntu Security Notice USN-4385-1
June 09, 2020
intel-microcode vulnerabilities
==
A security issue affects these releases of Ubuntu and its
This issue ultimately has the same root cause as LP: #1880659, namely
that in the 5.6 development cycle, the proc_fs infrastructure was
modified to not use the generic file_operations struct and instead use a
simplified procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc
from VFS with
In the 5.6 development cycle, the proc_fs infrastructure was modified to
not use the generic file_operations struct and instead use a simplified
procfs_ops struct (see d56c0d45f0e27 'proc: decouple proc from VFS with
"struct proc_ops"'), which is why this test is failing.
I've fixed this in QRT
** Also affects: openscap (Ubuntu Groovy)
Importance: Low
Status: Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851682
Title:
oscap is broken in ubuntu 19.10
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
==
Ubuntu Security Notice USN-4369-2
May 28, 2020
linux, linux-raspi2, linux-raspi2-5.3 regression
==
A security issue affects these releases of Ubuntu
==
Ubuntu Security Notice USN-4367-2
May 28, 2020
linux regression
==
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu
Thanks, David, for the feedback, marking all versions as verification-
done.
** Tags added: verification-done-bionic verification-done-eoan
verification-done-focal verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
How is one supposed to know about this environment variable?
$ man ubuntu-security-status
No manual entry for ubuntu-security-status
$ ubuntu-security-status --help
usage: ubuntu-security-status [-h] [--thirdparty] [--unavailable]
Return information about security support for packages
Because these packages may end up getting copied to the security
pockets, these have been built in the ubuntu-security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/
Direct links to the packages are
focal:
** Changed in: qa-regression-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1879339
Title:
test_310_config_security_perf_events_restrict /
The test_400_refcount_config failure has been addressed in
qa-regression-testing commit
https://git.launchpad.net/qa-regression-testing/commit/?id=480aaab47c0e7e11ab5bad5b56f61742ac8fdf9e
Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
==
Ubuntu Security Notice USN-4369-1
May 21, 2020
linux, linux-aws, linux-aws-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3,
linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3, linux-raspi2
vulnerabilities
Ubuntu Security team ack for binary copying these into the security
pockets as well.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878108
Title:
new upstream release 2020a
To manage
For the test_310_config_security_perf_events_restrict -- missing
SECURITY_PERF_EVENTS_RESTRICT option; it appears the linux-oem-5.6
kernel is missing the following Ubuntu SAUCE patch:
commit 4e6246de75c468397327fa741b380c926020c81f
Author: Ben Hutchings
Date: Tue Aug 16 10:27:00 2016
** Also affects: gce-compute-image-packages (Ubuntu Groovy)
Importance: Undecided
Assignee: Steve Beattie (sbeattie)
Status: New
** Also affects: gce-compute-image-packages (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: gce-compute-image-packages (Ubuntu
==
Ubuntu Security Notice USN-4367-1
May 19, 2020
linux, linux-aws, linux-gcp, linux-kvm, linux-oracle, linux-riscv
vulnerabilities
==
A security issue
==
Ubuntu Security Notice USN-4368-1
May 19, 2020
linux-gke-5.0, linux-oem-osp1 vulnerabilities
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN-4364-1
May 18, 2020
linux, linux-aws, linux-lts-xenial, linux-raspi2, linux-snapdragon
vulnerabilities
==
A security issue
==
Ubuntu Security Notice USN-4363-1
May 18, 2020
linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe,
linux-oem, linux-oracle, linux-snapdragon vulnerabilities
-packages (Ubuntu)
Importance: Undecided
Assignee: Steve Beattie (sbeattie)
Status: New
** Changed in: gce-compute-image-packages (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Ubuntu
Bugs, wh
All that about CONFIG_RT_GROUP_SCHED seems sensible, but then I am
confused as to why is it only showing up in s390x environments?
The test is trying to exercise CAP_SYS_NICE, and doing so by calling
setpriority(PRIO_PROCESS, 0, -5)
Does the test needs to be put into a cgroup with rt
I have seen a similar failure with that specific test when running the
tests under virtualbox on x86, though I have not tried it in several
years.
If this is the expected behavior going forward on s390s, we can address
it in qa-regression-testing.
Thanks.
--
You received this bug notification
An initial port of aa-status to C landed in
https://gitlab.com/apparmor/apparmor/-/commit/8f9046b1b179190d0003ae1beacf460ee93c5090
and will e in the upcoming AppArmor 3 release. There is a follow up
improvement in https://gitlab.com/apparmor/apparmor/-/merge_requests/487
that should also land.
**
==
Ubuntu Security Notice USN-4344-1
April 28, 2020
linux-gke-5.0, linux-oem-osp11 vulnerabilities
==
A security issue affects these releases of Ubuntu
==
Ubuntu Security Notice USN-4345-1
April 28, 2020
linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp,
linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle,
linux-raspi2, linux-snapdragon vulnerabilities
==
Ubuntu Security Notice USN-4346-1
April 29, 2020
linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2,
linux-snapdragon vulnerabilities
==
A
==
Ubuntu Security Notice USN-4342-1
April 28, 2020
linux, linux-aws, linux-azure, linux-gcp, linux-gke-5.3, linux-hwe,
linux-kvm, linux-raspi2, linux-raspi2-5.3 vulnerabilities
Fixes for this issue were published in USN 4318-1
https://usn.ubuntu.com/4318-1/. Closing this issue on the Ubuntu side of
things and making the report public.
Thanks for all your help!
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux
Oh, and I have no crash files in /var/crash/.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871538
Title:
dbus timeout-ed during an upgrade, taking services down including gdm
To manage
Hi, I had a similar crash this morning upgrading focal, after trying to
get unattended-upgrades to stop spinning on missing focal-security apt
list files. In this case, I don't use gnome-shell as my desktop
environment, but it still tore down my entire desktop environment and
caused gdm3 to
==
Ubuntu Security Notice USN-4318-1
April 06, 2020
linux, linux-hwe vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-4319-1
April 06, 2020
linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm,
linux-oracle, linux-oracle-5.3, linux-raspi2, linux-raspi2-5.3
vulnerabilities
==
Ubuntu Security Notice USN-4313-1
March 30, 2020
linux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3,
linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3,
linux-raspi2, linux-raspi2-5.3
==
Ubuntu Security Notice USN-4303-1
March 17, 2020
linux, linux-aws, linux-kvm vulnerability
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN-4303-2
March 17, 2020
linux-lts-xenial, linux-aws vulnerability
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN-4302-1
March 17, 2020
linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe,
linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
==
Ubuntu Security Notice USN-4301-1
March 16, 2020
linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-oracle-5.0 vulnerabilities
==
A security issue
==
Ubuntu Security Notice USN-4300-1
March 16, 2020
linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe,
linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865429
Title:
bionic/linux-gke-5.0: 5.0.0-1032.33
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865431
Title:
bionic/linux-gcp: 5.0.0-1033.34 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865106
Title:
xenial/linux: 4.4.0-176.206 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865422
Title:
bionic/linux-oracle-5.0: 5.0.0-1013.18
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865245
Title:
xenial/linux-aws: 4.4.0-1104.115
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865111
Title:
eoan/linux: 5.3.0-42.34 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865434
Title:
bionic/linux-aws-5.0: 5.0.0-1027.30
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865109
Title:
bionic/linux: 4.15.0-91.92 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865255
Title:
bionic/linux-gke-4.15: 4.15.0-1055.58
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865251
Title:
xenial/linux-gcp: 4.15.0-1058.62
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864729
Title:
bionic/linux-snapdragon: 4.15.0-1074.81
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865247
Title:
bionic/linux-kvm: 4.15.0-1056.57
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865269
Title:
bionic/linux-aws: 4.15.0-1063.67
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865421
Title:
xenial/linux-aws-hwe:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865200
Title:
bionic/linux-oem: 4.15.0-1076.86
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865243
Title:
xenial/linux-kvm: 4.4.0-1068.75 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865480
Title:
bionic/linux-oracle: 4.15.0-1035.39
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865198
Title:
xenial/linux-azure: 4.15.0-1074.79
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865193
Title:
bionic/linux-azure: 5.0.0-1034.36
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865142
Title:
xenial/linux-hwe: 4.15.0-91.92~16.04.1
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864726
Title:
bionic/linux-raspi2: 4.15.0-1057.61
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863329
Title:
xenial/linux-snapdragon: 4.4.0-1134.142
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863324
Title:
xenial/linux-raspi2: 4.4.0-1130.139
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865493
Title:
eoan/linux-oracle: 5.3.0-1011.12
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865492
Title:
bionic/linux-oracle-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865491
Title:
eoan/linux-gcp: 5.3.0-1014.15 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865488
Title:
bionic/linux-gcp-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865490
Title:
bionic/linux-gke-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865482
Title:
eoan/linux-aws: 5.3.0-1013.14 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865438
Title:
eoan/linux-kvm: 5.3.0-1012.13 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865189
Title:
bionic/linux-azure-5.3:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865190
Title:
eoan/linux-azure: 5.3.0-1015.16 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865139
Title:
bionic/linux-hwe: 5.3.0-42.34~18.04.1
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863269
Title:
eoan/linux-raspi2: 5.3.0-1019.21
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863268
Title:
bionic/linux-raspi2-5.3:
I reviewed libxcrypt 1:4.4.10-10ubuntu1 as checked into focal. This shouldn't
be
considered a full audit but rather a quick gauge of maintainability.
libxcrypt is a library for handling one-way hashing of passwords. It's
use here is to replace the deprecated glibc libcrypt library.
- Only CVE
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a
601 - 700 of 12097 matches
Mail list logo