[Group.of.nepali.translators] [Bug 1927911] Re: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms
This bug was fixed in the package intel-microcode - 3.20210216.0ubuntu0.16.04.1 --- intel-microcode (3.20210216.0ubuntu0.16.04.1) xenial-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 -- Alex Murray Fri, 14 May 2021 16:31:00 +0930 ** Changed in: intel-microcode (Ubuntu Xenial) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1927911 Title: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms Status in intel-microcode package in Ubuntu: Fix Released Status in intel-microcode source package in Xenial: Fix Released Status in intel-microcode source package in Bionic: Fix Released Status in intel-microcode source package in Focal: Fix Released Status in intel-microcode source package in Groovy: Fix Released Status in intel-microcode source package in Hirsute: Fix Released Status in intel-microcode source package in Impish: Fix Released Bug description: Intel released microcode 20210216 which should be incorporated into the various Ubuntu releases as a security update. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1927911/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926437] Re: [SRU] Backport zstd support, fix bug in python-apt
This bug was fixed in the package python-apt - 2.2.0~ubuntu0.21.04.1 --- python-apt (2.2.0~ubuntu0.21.04.1) hirsute; urgency=medium * Upload to hirsute; changes since 2.1.7ubuntu2: - Annotate test dependencies with (Closes: #980719) - Mirror list updates - debfile: Pass `Name` instead of `Binary` to ExtractTar. Passing the binary causes it to fail trying to find the `false` compressor when a binary for a given compressor is not installed. (LP: #1926437) - debian/gbp.conf: Branch name is main python-apt (2.2.0) unstable; urgency=medium [ Helmut Grohne ] * Annotate test dependencies with (Closes: #980719) [ Julian Andres Klode ] * debian/rules: Re-enable PIE hardening * Mirror list updates * debfile: Pass `Name` instead of `Binary` to ExtractTar. Passing the binary causes it to fail trying to find the `false` compressor when a binary for a given compressor is not installed. (LP: #1926437) * debian/gbp.conf: Branch name is main -- Julian Andres Klode Thu, 29 Apr 2021 15:20:13 +0200 ** Changed in: python-apt (Ubuntu Hirsute) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926437 Title: [SRU] Backport zstd support, fix bug in python-apt Status in apt package in Ubuntu: Fix Released Status in python-apt package in Ubuntu: Fix Released Status in apt source package in Xenial: Fix Released Status in python-apt source package in Xenial: Fix Committed Status in python-apt source package in Bionic: Fix Committed Status in python-apt source package in Focal: Fix Committed Status in python-apt source package in Groovy: Fix Committed Status in python-apt source package in Hirsute: Fix Released Status in python-apt source package in Impish: Fix Released Bug description: [Impact] APT in xenial needs to learn about zstd support to enable Launchpad to work with zstd packages. python-apt in all releases needs to be adjusted to pass the compressor names instead of programs to ExtractTar, as otherwise, if /usr/bin/zstd does not exist, it will pass "false" as the compressor, and then ExtractTar fails (same for other compressors). On hirsute, the python-apt upload also includes some new annotations for build-dependencies, as it's a straight upload of the 2.2 stable series. [Test plan] The apt regression tests cover the compression methods extensively, including even stored compressed lists in /var/lib/apt and fetching Packages files compressed with such methods, for all compression methods. The final test is to make apt_inst.DebFile("glibc-doc- reference_2.33-0ubuntu2~zstd1_all.deb").control.extractall() from 1923845 work in python3-apt. For hirsute, the build dependency changes will verify themselves during the build ;) [Where problems could occur] APT: The changes to APT are adding the zstd compression backend to FileFd and then linking it into the configuration. The former is adding new code, triggered only on zstd files, and should not be able to cause regressions. The latter is a bunch of small lines here and there, and it caused issues during backporting in the test suite because it expected compressors in a specific order. However, chances are that nothing else has as stringent requirements as the test suite, so I don't believe that is a problem for existing users. Bugs can of course be in the code dealing with zstd, and that might open you up to security vulnerabilities in the zstd code if you pass APT zstd compressed files. A regression can be if clients used apt-helper cat-file to cat a zstd- compressed file ending in .zst - they'll now get uncompressed content, rather than compressed. python-apt: The change just replaces Binary with Name, aligning the code with APT itself, so it's so trivial, we don't expect regressions. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1926437/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926468] Re: xenial/linux-fips: 4.4.0-1063.69 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Tags removed: kernel-release-tracking-bug-live -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926468 Title: xenial/linux-fips: 4.4.0-1063.69 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - meta - main - signed kernel-stable-master-bug: 1926472 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - signed - main - meta proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1063.69 meta: 4.4.0.1063.65 signed: 4.4.0-1063.69 source: 4.4.0-1063.69 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926468/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926467] Re: xenial/linux-aws: 4.4.0-1129.143 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Tags removed: kernel-release-tracking-bug-live -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926467 Title: xenial/linux-aws: 4.4.0-1129.143 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-aws source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-aws meta: linux-meta-aws phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-aws/aws-kernel: bug 1926466 variant: debs versions: main: 4.4.0-1129.143 meta: 4.4.0.1129.134 source: 4.4.0-1129.143 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926467/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926469] Re: xenial/linux-kvm: 4.4.0-1094.103 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Tags removed: kernel-release-tracking-bug-live -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926469 Title: xenial/linux-kvm: 4.4.0-1094.103 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-kvm source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-kvm meta: linux-meta-kvm phase: Complete phase-changed: Monday, 17. May 2021 21:14 UTC promote: - meta - main proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1094.103 meta: 4.4.0.1094.92 source: 4.4.0-1094.103 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926469/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926472] Re: xenial/linux: 4.4.0-211.243 -proposed tracker
All tasks have been completed and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress => Fix Released ** Tags removed: kernel-release-tracking-bug-live -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926472 Title: xenial/linux: 4.4.0-211.243 -proposed tracker Status in Kernel SRU Workflow: Fix Released Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow kernel-signoff series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - main - signed - meta packages: main: linux meta: linux-meta signed: linux-signed phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta - signed proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: trusty/linux-aws: bug 1926470 trusty/linux-lts-xenial: bug 1926471 xenial/linux-aws: bug 1926467 xenial/linux-cascade: bug 1928677 xenial/linux-fips: bug 1926468 xenial/linux-kvm: bug 1926469 xenial/linux/caracalla-kernel: bug 1928203 xenial/linux/pc-kernel: bug 1926465 xenial/linux/stlouis-kernel: bug 1928205 variant: debs versions: main: 4.4.0-211.243 meta: 4.4.0.211.218 signed: 4.4.0-211.243 source: 4.4.0-211.243 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926472/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928674] Re: due to a new recommends grub-efi-arm64-signed is installed which does not have postinst.d script
And it's easier to reintroduce the conffiles to grub-efi-amd64. ** Package changed: grub2-signed (Ubuntu) => grub2-unsigned (Ubuntu) -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928674 Title: due to a new recommends grub-efi-arm64-signed is installed which does not have postinst.d script Status in grub2-unsigned package in Ubuntu: Fix Released Status in grub2-unsigned source package in Trusty: Triaged Status in grub2-unsigned source package in Xenial: Triaged Status in grub2-unsigned source package in Bionic: Triaged Bug description: [Impact] * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on arm64 with grub-efi-arm64-signed installed, without grub-efi-arm64. * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on amd64 with grub-efi-amd64-signed installed without grub-pc or grub-efi- amd64. * This results in newly installed kernels not getting added to grub.cfg and thus upon reboot one does not boot into the new kernel. * In later series these scripts moved to grub2-common. Maybe we should move these to grub2-common in bionic and earlier too, for compatibility with onegrub. Or alternatively grub2-signed should ship these in grub-efi-{amd64,arm64}-signed packages too. [Test Plan] * Install new grubs * If testing on arm64 ensure that grub-efi-arm64 is not installed; and grub-efi-arm64-signed is installed. * If testing on amd64 ensure that grub-efi-amd64 and grub-pc are not installed; and grub-efi-amd64-signed is installed. * Install a new kernel that was not installed before * Observe that grub.cfg is regenerated and new kernel is present * Remove an old kernel * Observe that grub.cfg is regenerated and new kernel is removed from grub.cfg [Where problems could occur] * These are conffiles. Although nobody should modify them, care should be taken when moving conffiles around. [Other Info] * First reported by klebers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/1928674/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926469] Re: xenial/linux-kvm: 4.4.0-1094.103 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-kvm meta: linux-meta-kvm - phase: Promote to Updates - phase-changed: Monday, 17. May 2021 20:53 UTC + phase: Complete + phase-changed: Monday, 17. May 2021 21:14 UTC promote: - meta - main proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1094.103 meta: 4.4.0.1094.92 source: 4.4.0-1094.103 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926469 Title: xenial/linux-kvm: 4.4.0-1094.103 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-kvm source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-kvm meta: linux-meta-kvm phase: Complete phase-changed: Monday, 17. May 2021 21:14 UTC promote: - meta - main proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1094.103 meta: 4.4.0.1094.92 source: 4.4.0-1094.103 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926469/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926467] Re: xenial/linux-aws: 4.4.0-1129.143 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-aws meta: linux-meta-aws - phase: Promote to Updates - phase-changed: Monday, 17. May 2021 20:53 UTC + phase: Complete + phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-aws/aws-kernel: bug 1926466 variant: debs versions: main: 4.4.0-1129.143 meta: 4.4.0.1129.134 source: 4.4.0-1129.143 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926467 Title: xenial/linux-aws: 4.4.0-1129.143 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Invalid Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux-aws source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 delta: promote-to-updates: - meta - main kernel-stable-master-bug: 1926472 packages: main: linux-aws meta: linux-meta-aws phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-aws/aws-kernel: bug 1926466 variant: debs versions: main: 4.4.0-1129.143 meta: 4.4.0.1129.134 source: 4.4.0-1129.143 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926467/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926468] Re: xenial/linux-fips: 4.4.0-1063.69 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - meta - main - signed kernel-stable-master-bug: 1926472 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips - phase: Promote to Updates - phase-changed: Monday, 17. May 2021 20:53 UTC + phase: Complete + phase-changed: Monday, 17. May 2021 21:13 UTC promote: - signed - main - meta proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1063.69 meta: 4.4.0.1063.65 signed: 4.4.0-1063.69 source: 4.4.0-1063.69 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926468 Title: xenial/linux-fips: 4.4.0-1063.69 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - meta - main - signed kernel-stable-master-bug: 1926472 packages: main: linux-fips meta: linux-meta-fips signed: linux-signed-fips phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - signed - main - meta proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid variant: debs versions: main: 4.4.0-1063.69 meta: 4.4.0.1063.65 signed: 4.4.0-1063.69 source: 4.4.0-1063.69 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926468/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926472] Re: xenial/linux: 4.4.0-211.243 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-updates Status: In Progress => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - main - signed - meta packages: main: linux meta: linux-meta signed: linux-signed - phase: Promote to Updates - phase-changed: Monday, 17. May 2021 20:52 UTC + phase: Complete + phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta - signed proposed-announcement-sent: true proposed-testing-requested: true - reason: - promote-to-updates: Ongoing -- packages not yet published + reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: trusty/linux-aws: bug 1926470 trusty/linux-lts-xenial: bug 1926471 xenial/linux-aws: bug 1926467 xenial/linux-cascade: bug 1928677 xenial/linux-fips: bug 1926468 xenial/linux-kvm: bug 1926469 xenial/linux/caracalla-kernel: bug 1928203 xenial/linux/pc-kernel: bug 1926465 xenial/linux/stlouis-kernel: bug 1928205 variant: debs versions: main: 4.4.0-211.243 meta: 4.4.0.211.218 signed: 4.4.0-211.243 source: 4.4.0-211.243 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926472 Title: xenial/linux: 4.4.0-211.243 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow kernel-signoff series: Fix Released Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Released Status in Kernel SRU Workflow promote-signing-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-proposed series: Fix Released Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: Fix Released Status in Kernel SRU Workflow regression-testing series: Fix Released Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow verification-testing series: Fix Released Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- boot-testing-requested: true built: main: build#1 meta: build#1 signed: build#1 delta: promote-to-updates: - main - signed - meta packages: main: linux meta: linux-meta signed: linux-signed phase: Complete phase-changed: Monday, 17. May 2021 21:13 UTC promote: - main - meta - signed proposed-announcement-sent: true proposed-testing-requested: true reason: {} synthetic: :promote-to-as-proposed: Invalid trackers: trusty/linux-aws: bug 1926470 trusty/linux-lts-xenial: bug 1926471 xenial/linux-aws: bug 1926467 xenial/linux-cascade: bug 1928677 xenial/linux-fips: bug 1926468 xenial/linux-kvm: bug 1926469 xenial/linux/caracalla-kernel: bug 1928203 xenial/linux/pc-kernel: bug 1926465 xenial/linux/stlouis-kernel: bug 1928205 variant: debs versions: main: 4.4.0-211.243 meta: 4.4.0.211.218 signed: 4.4.0-211.243 source: 4.4.0-211.243 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1926472/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928677] Re: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker
** Changed in: kernel-sru-workflow/sru-review Status: In Progress => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928677 Title: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Committed Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow sru-review series: Fix Released Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: main: build#1 meta: build#1 signed: build#1 delta: sru-review: - main - signed - meta kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Holding before Promote to Proposed phase-changed: Monday, 17. May 2021 16:18 UTC reason: :prepare-packages: Ongoing -- building in ppa (signed:building) prepare-package-signed: Ongoing -- signed package not yet fully built synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs versions: main: 4.4.0-1036.39 meta: 4.4.0.1036.39 signed: 4.4.0-1036.39 source: 4.4.0-1036.39 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1928677/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928677] Re: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: main: build#1 meta: build#1 signed: build#1 delta: sru-review: - main - signed - meta kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Holding before Promote to Proposed phase-changed: Monday, 17. May 2021 16:18 UTC reason: - :prepare-packages: Pending -- building in ppa (signed:depwait - main:queued) - prepare-package: Ongoing -- main package not yet fully built + :prepare-packages: Ongoing -- building in ppa (signed:building) prepare-package-signed: Ongoing -- signed package not yet fully built sru-review: Pending -- ready for review synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs versions: main: 4.4.0-1036.39 meta: 4.4.0.1036.39 signed: 4.4.0-1036.39 source: 4.4.0-1036.39 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928677 Title: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Released Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Committed Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow sru-review series: Confirmed Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: main: build#1 meta: build#1 signed: build#1 delta: sru-review: - main - signed - meta kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Holding before Promote to Proposed phase-changed: Monday, 17. May 2021 16:18 UTC reason: :prepare-packages: Ongoing -- building in ppa (signed:building) prepare-package-signed: Ongoing -- signed package not yet fully built sru-review: Pending -- ready for review synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs versions: main: 4.4.0-1036.39 meta: 4.4.0.1036.39 signed: 4.4.0-1036.39 source: 4.4.0-1036.39 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1928677/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928677] Re: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta Status: Fix Committed => Fix Released ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: main: build#1 meta: build#1 signed: build#1 delta: sru-review: - main - signed - meta kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Holding before Promote to Proposed phase-changed: Monday, 17. May 2021 16:18 UTC reason: - :prepare-packages: Pending -- building in ppa (main:building - signed:depwait meta:queued) + :prepare-packages: Ongoing -- building in ppa (main:building + signed:depwait) prepare-package: Ongoing -- main package not yet fully built - prepare-package-meta: Ongoing -- meta package not yet fully built prepare-package-signed: Ongoing -- signed package not yet fully built sru-review: Pending -- ready for review synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs versions: main: 4.4.0-1036.39 meta: 4.4.0.1036.39 signed: 4.4.0-1036.39 source: 4.4.0-1036.39 -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928677 Title: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: Fix Committed Status in Kernel SRU Workflow prepare-package-meta series: Fix Released Status in Kernel SRU Workflow prepare-package-signed series: Fix Committed Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow sru-review series: Confirmed Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- built: main: build#1 meta: build#1 signed: build#1 delta: sru-review: - main - signed - meta kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Holding before Promote to Proposed phase-changed: Monday, 17. May 2021 16:18 UTC reason: :prepare-packages: Ongoing -- building in ppa (main:building signed:depwait) prepare-package: Ongoing -- main package not yet fully built prepare-package-signed: Ongoing -- signed package not yet fully built sru-review: Pending -- ready for review synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs versions: main: 4.4.0-1036.39 meta: 4.4.0.1036.39 signed: 4.4.0-1036.39 source: 4.4.0-1036.39 To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1928677/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928677] Re: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid ** Changed in: kernel-sru-workflow/security-signoff Status: New => Invalid ** Description changed: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade - phase: Ready for Packaging - phase-changed: Monday, 17. May 2021 12:53 UTC + phase: Packaging + phase-changed: Monday, 17. May 2021 14:17 UTC reason: - :prepare-packages: Pending -b Debs ready to be cranked - prepare-package: Pending -- version not specified + :prepare-packages: 'Ongoing -b Being cranked by: kleber-souza' + prepare-package: Pending -- tag not published and package not + uploaded + prepare-package-meta: Pending -- tag not published and package not + uploaded + prepare-package-signed: Pending -- tag not published and package not + uploaded + synthetic: + :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928677 Title: xenial/linux-cascade: 4.4.0-1036.39 -proposed tracker Status in Kernel SRU Workflow: In Progress Status in Kernel SRU Workflow automated-testing series: Invalid Status in Kernel SRU Workflow certification-testing series: Invalid Status in Kernel SRU Workflow prepare-package series: In Progress Status in Kernel SRU Workflow prepare-package-meta series: In Progress Status in Kernel SRU Workflow prepare-package-signed series: In Progress Status in Kernel SRU Workflow promote-signing-to-proposed series: New Status in Kernel SRU Workflow promote-to-proposed series: New Status in Kernel SRU Workflow promote-to-security series: Invalid Status in Kernel SRU Workflow promote-to-updates series: New Status in Kernel SRU Workflow regression-testing series: Invalid Status in Kernel SRU Workflow security-signoff series: Invalid Status in Kernel SRU Workflow sru-review series: New Status in Kernel SRU Workflow verification-testing series: New Status in linux source package in Xenial: New Bug description: This bug will contain status and test results related to a kernel source (or snap) as stated in the title. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1926472 packages: main: linux-cascade meta: linux-meta-cascade signed: linux-signed-cascade phase: Packaging phase-changed: Monday, 17. May 2021 14:17 UTC reason: :prepare-packages: 'Ongoing -b Being cranked by: kleber-souza' prepare-package: Pending -- tag not published and package not uploaded prepare-package-meta: Pending -- tag not published and package not uploaded prepare-package-signed: Pending -- tag not published and package not uploaded synthetic: :promote-to-as-proposed: Invalid trackers: xenial/linux-cascade/cascade-kernel: bug 1928676 variant: debs To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1928677/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1926300] Re: clamdscan - MULTISCAN parameter causes Segmentation fault error
Please stop changing the status on this bug. Since Xenial is now in Extended Security Maintenance, the fix was pushed to the ESM repository for Xenial. The "Fix Released" status on this bug is accurate. See the following for more information on Extended Security Maintenance: https://lists.ubuntu.com/archives/ubuntu-security-announce/2021-March/005930.html ** Changed in: clamav (Ubuntu Xenial) Status: Triaged => Fix Released ** Changed in: clamav (Ubuntu) Status: Triaged => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1926300 Title: clamdscan - MULTISCAN parameter causes Segmentation fault error Status in ClamAV: Unknown Status in clamav package in Ubuntu: Fix Released Status in clamav source package in Xenial: Fix Released Status in clamav source package in Bionic: Fix Released Status in clamav source package in Focal: Fix Released Status in clamav source package in Groovy: Fix Released Status in clamav source package in Hirsute: Fix Released Bug description: While running clamdscan with the --multiscan parameter we get the following error: Segmentation fault (core dumped) The scan starts without '--multiscan' but it cause performance issues The issue is present on Ubuntu 16.04.7 LTS, Ubuntu 18.04.5 LTS, Ubuntu 20.04.2 LTS from dmesg log: [Wed Apr 21 13:45:30 2021] clamdscan[5805]: segfault at 0 ip 7f42b5128bf5 sp 7fff89b76088 error 4 in libc-2.27.so[7f42b5072000+1e7000] [Wed Apr 21 13:45:30 2021] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 8f 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f ClamAV 0.103.2/26152/Mon Apr 26 11:04:28 2021 clamav 0.103.2+dfsg-0ubuntu0.16.04.1 amd64 clamav-base 0.103.2+dfsg-0ubuntu0.16.04.1 all clamav-daemon0.103.2+dfsg-0ubuntu0.16.04.1 amd64 clamav-docs 0.103.2+dfsg-0ubuntu0.16.04.1 all clamav-freshclam 0.103.2+dfsg-0ubuntu0.16.04.1 amd64 clamdscan0.103.2+dfsg-0ubuntu0.16.04.1 amd64 To manage notifications about this bug go to: https://bugs.launchpad.net/clamav/+bug/1926300/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1928674] [NEW] due to a new recommends grub-efi-arm64-signed is installed which does not have postinst.d script
*** This bug is a security vulnerability *** Public security bug reported: [Impact] * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on arm64 with grub-efi-arm64-signed installed, without grub-efi-arm64. * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on amd64 with grub-efi-amd64-signed installed without grub-pc or grub-efi-amd64. * This results in newly installed kernels not getting added to grub.cfg and thus upon reboot one does not boot into the new kernel. * In later series these scripts moved to grub2-common. Maybe we should move these to grub2-common in bionic and earlier too, for compatibility with onegrub. Or alternatively grub2-signed should ship these in grub- efi-{amd64,arm64}-signed packages too. [Test Plan] * Install new grubs * Install a new kernel that was not installed before * Observe that grub.cfg is regenerated and new kernel is present * Remove an old kernel * Observe that grub.cfg is regenerated and new kernel is removed from grub.cfg [Where problems could occur] * These are conffiles. Although nobody should modify them, care should be taken when moving conffiles around. [Other Info] * First reported by klebers ** Affects: grub2-signed (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: grub2-signed (Ubuntu Trusty) Importance: Undecided Status: Triaged ** Affects: grub2-signed (Ubuntu Xenial) Importance: Undecided Status: Triaged ** Affects: grub2-signed (Ubuntu Bionic) Importance: Undecided Status: Triaged ** Also affects: grub2-signed (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: grub2-signed (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: grub2-signed (Ubuntu Bionic) Importance: Undecided Status: New ** Information type changed from Public to Public Security ** Changed in: grub2-signed (Ubuntu) Status: New => Fix Released ** Changed in: grub2-signed (Ubuntu Trusty) Status: New => Triaged ** Changed in: grub2-signed (Ubuntu Xenial) Status: New => Triaged ** Changed in: grub2-signed (Ubuntu Bionic) Status: New => Triaged ** Description changed: [Impact] - * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on arm64 + * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on arm64 with grub-efi-arm64-signed installed, without grub-efi-arm64. - * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on amd64 + * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on amd64 with grub-efi-amd64-signed installed without grub-pc or grub-efi-amd64. - * This results in newly installed kernels not getting added to grub.cfg + * This results in newly installed kernels not getting added to grub.cfg and thus upon reboot one does not boot into the new kernel. - * In later series these scripts moved to grub2-common. Maybe we should + * In later series these scripts moved to grub2-common. Maybe we should move these to grub2-common in bionic and earlier too, for compatibility - with onegrub. - + with onegrub. Or alternatively grub2-signed should ship these in grub- + efi-{amd64,arm64}-signed packages too. [Test Plan] - * Install new grubs + * Install new grubs - * Install a new kernel that was not installed before + * Install a new kernel that was not installed before - * Observe that grub.cfg is regenerated and new kernel is present + * Observe that grub.cfg is regenerated and new kernel is present - * Remove an old kernel + * Remove an old kernel - * Observe that grub.cfg is regenerated and new kernel is removed from + * Observe that grub.cfg is regenerated and new kernel is removed from grub.cfg [Where problems could occur] - * These are conffiles. Although nobody should modify them, care should + * These are conffiles. Although nobody should modify them, care should be taken when moving conffiles around. [Other Info] - - * First reported by klebers + + * First reported by klebers -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928674 Title: due to a new recommends grub-efi-arm64-signed is installed which does not have postinst.d script Status in grub2-signed package in Ubuntu: Fix Released Status in grub2-signed source package in Trusty: Triaged Status in grub2-signed source package in Xenial: Triaged Status in grub2-signed source package in Bionic: Triaged Bug description: [Impact] * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on arm64 with grub-efi-arm64-signed installed, without grub-efi-arm64. * /etc/kernel/{postinst.d,postrm.d}/zz-update-grub missing on amd64 with grub-efi-amd64-signed installed without grub-pc or grub-efi- amd64. * This results in newly installed
[Group.of.nepali.translators] [Bug 1928648] [NEW] expiring trust anchor compatibility issue
*** This bug is a security vulnerability *** Public security bug reported: https://community.letsencrypt.org/t/openssl-client-compatibility- changes-for-let-s-encrypt-certificates/143816 Currently gnutls28 in bionic and earlier will not establish a connection, if any parts of the trust chain have expired, even though alternative non-expired chains are available. This has been fixed in GnuTLS 3.6.14, but probably should be backported to bionic and earlier if it was not already been done so. https://gitlab.com/gnutls/gnutls/-/issues/1008 https://gitlab.com/gnutls/gnutls/-/merge_requests/1271 ** Affects: gnutls28 (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: gnutls28 (Ubuntu Precise) Importance: Undecided Status: New ** Affects: gnutls28 (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: gnutls28 (Ubuntu Xenial) Importance: Undecided Status: New ** Affects: gnutls28 (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: gnutls28 (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: gnutls28 (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: gnutls28 (Ubuntu Xenial) Importance: Undecided Status: New ** Also affects: gnutls28 (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: gnutls28 (Ubuntu) Status: New => Fix Released ** Information type changed from Public to Public Security -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1928648 Title: expiring trust anchor compatibility issue Status in gnutls28 package in Ubuntu: Fix Released Status in gnutls28 source package in Precise: New Status in gnutls28 source package in Trusty: New Status in gnutls28 source package in Xenial: New Status in gnutls28 source package in Bionic: New Bug description: https://community.letsencrypt.org/t/openssl-client-compatibility- changes-for-let-s-encrypt-certificates/143816 Currently gnutls28 in bionic and earlier will not establish a connection, if any parts of the trust chain have expired, even though alternative non-expired chains are available. This has been fixed in GnuTLS 3.6.14, but probably should be backported to bionic and earlier if it was not already been done so. https://gitlab.com/gnutls/gnutls/-/issues/1008 https://gitlab.com/gnutls/gnutls/-/merge_requests/1271 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1928648/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1927911] Re: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms
This bug was fixed in the package intel-microcode - 3.20210216.0ubuntu0.20.10.1 --- intel-microcode (3.20210216.0ubuntu0.20.10.1) groovy-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 -- Alex Murray Mon, 10 May 2021 16:41:24 +0930 ** Changed in: intel-microcode (Ubuntu Groovy) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1927911 Title: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms Status in intel-microcode package in Ubuntu: Fix Released Status in intel-microcode source package in Xenial: Confirmed Status in intel-microcode source package in Bionic: Fix Released Status in intel-microcode source package in Focal: Fix Released Status in intel-microcode source package in Groovy: Fix Released Status in intel-microcode source package in Hirsute: Fix Released Status in intel-microcode source package in Impish: Fix Released Bug description: Intel released microcode 20210216 which should be incorporated into the various Ubuntu releases as a security update. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1927911/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1927911] Re: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms
This bug was fixed in the package intel-microcode - 3.20210216.0ubuntu0.20.04.1 --- intel-microcode (3.20210216.0ubuntu0.20.04.1) focal-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 -- Alex Murray Mon, 10 May 2021 16:42:34 +0930 ** Changed in: intel-microcode (Ubuntu Bionic) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1927911 Title: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms Status in intel-microcode package in Ubuntu: Fix Released Status in intel-microcode source package in Xenial: Confirmed Status in intel-microcode source package in Bionic: Fix Released Status in intel-microcode source package in Focal: Fix Released Status in intel-microcode source package in Groovy: Confirmed Status in intel-microcode source package in Hirsute: Fix Released Status in intel-microcode source package in Impish: Fix Released Bug description: Intel released microcode 20210216 which should be incorporated into the various Ubuntu releases as a security update. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1927911/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp
[Group.of.nepali.translators] [Bug 1927911] Re: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms
This bug was fixed in the package intel-microcode - 3.20210216.0ubuntu0.21.04.1 --- intel-microcode (3.20210216.0ubuntu0.21.04.1) hirsute-security; urgency=medium * SECURITY UPDATE: New upstream microcode datafile 2021-02-16 (LP: #1927911) + Updated Microcodes: sig 0x00050654, pf_mask 0xb7, 2020-12-31, rev 0x2006a0a, size 36864 sig 0x00050656, pf_mask 0xbf, 2020-12-31, rev 0x4003006, size 53248 sig 0x00050657, pf_mask 0xbf, 2020-12-31, rev 0x5003006, size 53248 sig 0x000706a1, pf_mask 0x01, 2020-06-09, rev 0x0034, size 74752 - CVE-2020-8695 RAPL, INTEL-TA-00389 - CVE-2020-8696 Vector Register Leakage-Active, INTEL-TA-00381 - CVE-2020-8698 Fast forward store predictor, INTEL-TA-00381 * SECURITY REGRESSION: Some CPUs in the Tiger Lake family sig=0x806c1 fail to boot (LP: #1903883) - remove 06-8c-01/0x000806c1 microcode -- Alex Murray Mon, 10 May 2021 16:37:53 +0930 ** Changed in: intel-microcode (Ubuntu Hirsute) Status: Confirmed => Fix Released ** Changed in: intel-microcode (Ubuntu Focal) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of नेपाली भाषा समायोजकहरुको समूह, which is subscribed to Xenial. Matching subscriptions: Ubuntu 16.04 Bugs https://bugs.launchpad.net/bugs/1927911 Title: Update intel-microcode to latest upstream release 20210216 for CVE fixes for xeon platforms Status in intel-microcode package in Ubuntu: Fix Released Status in intel-microcode source package in Xenial: Confirmed Status in intel-microcode source package in Bionic: Fix Released Status in intel-microcode source package in Focal: Fix Released Status in intel-microcode source package in Groovy: Confirmed Status in intel-microcode source package in Hirsute: Fix Released Status in intel-microcode source package in Impish: Fix Released Bug description: Intel released microcode 20210216 which should be incorporated into the various Ubuntu releases as a security update. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1927911/+subscriptions ___ Mailing list: https://launchpad.net/~group.of.nepali.translators Post to : group.of.nepali.translators@lists.launchpad.net Unsubscribe : https://launchpad.net/~group.of.nepali.translators More help : https://help.launchpad.net/ListHelp