[Kernel-packages] [Bug 1658219] Re: flock not mediated by 'k'

2017-02-27 Thread Jamie Strandboge
4.10.0-8.10-generic has the fix for this bug so marking the zesty task as released. ** Changed in: linux (Ubuntu) Status: Incomplete => Fix Released ** Changed in: apparmor Status: Triaged => In Progress ** Changed in: apparmor Assignee: (unassigned) => John Johansen

[Kernel-packages] [Bug 1658219] Re: flock not mediated by 'k'

2017-02-27 Thread Jamie Strandboge
4.4.0-65.86-generic fixes this issue on xenial. ** Tags removed: verification-needed-xenial verification-needed-yakkety ** Tags added: verification-done-xenial verification-done-yakkety -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to

[Kernel-packages] [Bug 1658219] Re: flock not mediated by 'k'

2017-02-27 Thread Jamie Strandboge
4.8.0-40.43-generic fixes this issue on yakkety. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1658219 Title: flock not mediated by 'k' Status in AppArmor: In Progress Status in

[Kernel-packages] [Bug 1648903] Re: Permission denied and inconsistent behavior in complain mode with 'ip netns list' command

2017-02-27 Thread Jamie Strandboge
FYI, this issue was hitting snapcrafters on Raspberry Pi3 (https://lists.ubuntu.com/archives/snapcraft/2017-February/003366.html). Please also update the other reference kernels and snaps. Thanks! -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1648903] Re: Permission denied and inconsistent behavior in complain mode with 'ip netns list' command

2017-02-27 Thread Jamie Strandboge
Confirmed this bug is fixed with 4.4.0-65.86-generic on xenial. ** Tags removed: verification-needed-xenial ** Tags added: verification-done-xenial ** Changed in: apparmor Status: New => In Progress ** Changed in: apparmor Assignee: (unassigned) => John Johansen (jjohansen) -- You

[Kernel-packages] [Bug 1648903] Re: Permission denied and inconsistent behavior in complain mode with 'ip netns list' command

2017-02-27 Thread Jamie Strandboge
Confirmed this bug is fixed with 4.8.0-40.43-generic on yakkety. ** Tags removed: verification-needed-yakkety ** Tags added: verification-done-yakkety -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1648903] Re: Permission denied and inconsistent behavior in complain mode with 'ip netns list' command

2017-02-27 Thread Jamie Strandboge
This is fixed with 4.10.0-8.10-generic. Marking zesty task as fixed. ** Changed in: linux (Ubuntu) Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] WifiSyslog.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "WifiSyslog.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737712/+files/WifiSyslog.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] UdevDb.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "UdevDb.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737711/+files/UdevDb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] RfKill.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "RfKill.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737710/+files/RfKill.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] PulseList.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "PulseList.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737709/+files/PulseList.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] Re: System failed to suspend properly or resume

2016-09-09 Thread Jamie Strandboge
apport information ** Tags added: apport-collected ** Description changed: I noticed this system failed to suspend properly and failed to resume. Closed the lid, the fans kept going. Opened the lid and lights were flashing indicating an error and had to hard reset. It had the following

[Kernel-packages] [Bug 1621899] Re: System failed to suspend properly or resume

2016-09-09 Thread Jamie Strandboge
I found that the system sometimes suspends and resumes, seemingly ok, but then there is a kernel trace when I try to reboot that halts the reboot and need to hard reset on reboot. The trace is not logged. With the kernel from xenial-updates (4.4.0.36) I found a reliable reproducer: 1. boot 2.

[Kernel-packages] [Bug 1621899] ProcModules.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "ProcModules.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737708/+files/ProcModules.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] ProcInterrupts.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "ProcInterrupts.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737707/+files/ProcInterrupts.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] JournalErrors.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "JournalErrors.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737702/+files/JournalErrors.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] ProcEnviron.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737706/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] CurrentDmesg.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "CurrentDmesg.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737700/+files/CurrentDmesg.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] CRDA.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "CRDA.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737699/+files/CRDA.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1621899

[Kernel-packages] [Bug 1621899] IwConfig.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "IwConfig.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737701/+files/IwConfig.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] Lspci.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "Lspci.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737703/+files/Lspci.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1621899

[Kernel-packages] [Bug 1621899] Lsusb.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "Lsusb.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737704/+files/Lsusb.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1621899

[Kernel-packages] [Bug 1621899] ProcCpuinfo.txt

2016-09-09 Thread Jamie Strandboge
apport information ** Attachment added: "ProcCpuinfo.txt" https://bugs.launchpad.net/bugs/1621899/+attachment/4737705/+files/ProcCpuinfo.txt -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1621899] [NEW] System failed to suspend properly or resume

2016-09-09 Thread Jamie Strandboge
Public bug reported: I noticed this system failed to suspend properly and failed to resume. Closed the lid, the fans kept going. Opened the lid and lights were flashing indicating an error and had to hard reset. It had the following in the logs: Sep 9 07:43:19 ginny gnome-session[6351]:

[Kernel-packages] [Bug 1626194] Re: Seccomp actions are not audited in the 4.8 kernel

2016-09-21 Thread Jamie Strandboge
FYI, this will likely cause tests in (at least) snap-confine to fail. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1626194 Title: Seccomp actions are not audited in the 4.8 kernel

[Kernel-packages] [Bug 1636847] Re: unexpectedly large memory usage of mounted snaps

2016-10-26 Thread Jamie Strandboge
Marking as 'confirmed' so the bot doesn't auto-close it. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1636847

[Kernel-packages] [Bug 1634753] [NEW] srcname from mount rule corrupted under load

2016-10-19 Thread Jamie Strandboge
Public bug reported: This came up in snapd spread tests but can be reproduced with: In an i386 up to date 16.04 VM: 1. in one terminal, run this: $ cat changehat_reproducer.sh #!/bin/sh set -e sudo sysctl -w kernel.printk_ratelimit=0 sudo snap install hello-world || true count=0 while

[Kernel-packages] [Bug 1634753] Re: srcname from mount rule corrupted under load

2016-10-19 Thread Jamie Strandboge
** Description changed: This came up in snapd spread tests but can be reproduced with: In an i386 up to date 16.04 VM: 1. in one terminal, run this: - $ cat changehat_reproducer.sh + $ cat reproducer.sh #!/bin/sh set -e sudo sysctl -w kernel.printk_ratelimit=0 sudo snap

[Kernel-packages] [Bug 1408106] Re: attach_disconnected not sufficient for overlayfs

2017-07-06 Thread Jamie Strandboge
@Frode, I can yes, when I file them. I need to do a bit of work for simple reproducers/etc/etc to file them. I've added an item to add a comment to this bug when I do. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1408106] Re: attach_disconnected not sufficient for overlayfs

2017-05-16 Thread Jamie Strandboge
Actually, I marked the MAAS task as incomplete in case people want to give feedback. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1408106 Title: attach_disconnected not sufficient for

[Kernel-packages] [Bug 1408106] Re: attach_disconnected not sufficient for overlayfs

2017-05-16 Thread Jamie Strandboge
Ok, I spent quite a bit of time evaluating this and believe this bug can be closed, but other bugs open. In looking at this I created https://code.launchpad.net/~jdstrand/+git /test-overlay (to build simply git clone, run 'snapcraft', install the snap and then run 'test-overlay' for instructions

[Kernel-packages] [Bug 1408106] Re: attach_disconnected not sufficient for overlayfs

2017-05-16 Thread Jamie Strandboge
Closing the MAAS task as it the referenced bug is marked Fix Release. If there are issues there still, please see my previous comment and look at the code in that snap-- there are viable ways to use overlayfs with chroot and an apparmor alias rule, or overlayfs with private mount, chroot and

[Kernel-packages] [Bug 1716848] Re: package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2017-09-13 Thread Jamie Strandboge
Marking as "Won't Fix" for the bluez deb -- the postinst is doing the right thing, there just happens to be something installed outside of dpkg/apt that is getting in the way. ** Changed in: bluez (Ubuntu) Status: Confirmed => Won't Fix -- You received this bug notification because you

[Kernel-packages] [Bug 1716848] Re: package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2017-09-13 Thread Jamie Strandboge
Looking at the logs I see: Sep 13 07:51:08 agda-HP-Pavilion-dv6500-Notebook-PC audit[1221]: AVC apparmor="STATUS" operation="profile_replace" profile="unconfined" name="snap.bluez.bluetoothctl" pid=1221 comm="apparmor_parser" This indicates you have the bluez snap installed. This bug is about

[Kernel-packages] [Bug 1734038] Re: utils don't understand «include "/where/ever"» (was: Potential regression found with apparmor test on Xenial/Zesty)

2017-11-27 Thread Jamie Strandboge
@mvo - this is probably obvious, but if you used '#include' instead of 'include', it would side-step the issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1734038 Title: utils don't

[Kernel-packages] [Bug 1734038] Re: utils don't understand «include "/where/ever"» (was: Potential regression found with apparmor test on Xenial/Zesty)

2017-11-30 Thread Jamie Strandboge
Since snapd is using this bug for its SRU blocker and we have bug #1733700 that is the same issue, I'm going to use this bug as the snapd one and for the apparmor one. ** Summary changed: - utils don't understand «include "/where/ever"» (was: Potential regression found with apparmor test on

[Kernel-packages] [Bug 1772775] Re: 4.4.0-127.153 generates many "sit: non-ECT" messages

2018-05-23 Thread Jamie Strandboge
I too am seeing this after the most recent upgrade: $ grep -cF 'sit: non-ECT' /var/log/syslog 2917 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1772775 Title: 4.4.0-127.153 generates

[Kernel-packages] [Bug 1370218] Re: Fine-grained shm mediation (confined applications need access to /run/shm/shmfd*)

2018-02-06 Thread Jamie Strandboge
** Changed in: qtbase-opensource-src (Ubuntu) Status: New => Won't Fix ** Changed in: qtmultimedia-opensource-src (Ubuntu) Status: New => Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1691152] Re: linux-azure: -proposed tracker

2018-07-25 Thread Jamie Strandboge
** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => Ubuntu Security Team (ubuntu-security) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-azure in Ubuntu.

[Kernel-packages] [Bug 1699051] Re: linux: -proposed tracker

2018-07-25 Thread Jamie Strandboge
** Changed in: kernel-sru-workflow/security-signoff Assignee: Canonical Security Team (canonical-security) => Ubuntu Security Team (ubuntu-security) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1746463] Re: apparmor profile load in stacked policy container fails

2018-02-27 Thread Jamie Strandboge
Add a snapd task so that when the https://launchpad.net/ubuntu/+source /linux-gcp is Fix Released, snapd can re-enable the tests/main/lxd test on GCE. ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Artful) Status: New => Fix

[Kernel-packages] [Bug 1746463] Re: apparmor profile load in stacked policy container fails

2018-02-27 Thread Jamie Strandboge
Since this is going to be fixed in 'linux' and 'linux-gcp', adding tasks for those. ** Changed in: apparmor (Ubuntu Artful) Status: Won't Fix => Fix Committed ** Changed in: linux (Ubuntu Artful) Status: Fix Committed => Confirmed ** Also affects: linux-gcp (Ubuntu) Importance:

[Kernel-packages] [Bug 1746463] Re: apparmor profile load in stacked policy container fails

2018-02-27 Thread Jamie Strandboge
FYI, the following kernels are also affected (all 4.13 based): * linux-azure * linux-hwe * linux-hwe-edge * linux-oem * linux-raspi2 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1746463

[Kernel-packages] [Bug 1567597] Re: implement 'complain mode' in seccomp for developer mode with snaps

2018-03-05 Thread Jamie Strandboge
This is fixed in xenial 2.3.1-2.1ubuntu2~16.04.1 ** Changed in: libseccomp (Ubuntu Xenial) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1898280] Re: Please unrevert the apparmor audit rule filtering feature

2020-11-12 Thread Jamie Strandboge
Thanks John! :) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1898280 Title: Please unrevert the apparmor audit rule filtering feature Status in linux package in Ubuntu: Fix

[Kernel-packages] [Bug 1217618] Re: apparmor DENIED in telepathy-ofono when receiving call

2013-08-27 Thread Jamie Strandboge
** Changed in: telepathy-mission-control-5 (Ubuntu) Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-maguro in Ubuntu. https://bugs.launchpad.net/bugs/1217618 Title: apparmor DENIED in

[Kernel-packages] [Bug 1220713] [NEW] Provide LSM hook for access()

2013-09-04 Thread Jamie Strandboge
Public bug reported: Currently one cannot use access() to see if the call would be blocked by the LSM. It would be nice if this was in place so application developers could use a standard method to determine access instead of resorting to looking up sandbox variables or trying to open files in

[Kernel-packages] [Bug 1259255] [NEW] incorrect ifconfig output for unused wired ethernet

2013-12-09 Thread Jamie Strandboge
Public bug reported: I was trying to diagnose network problems on this machine and found that Ubuntu 12.04 LTS, -56 and -57 will show the following with ifconfig: $ ifconfig eth0 eth0 Link encap:Ethernet HWaddr 1c:75:08:5a:9f:b1   UP BROADCAST MULTICAST MTU:1500 Metric:1  

[Kernel-packages] [Bug 1259255] Re: incorrect ifconfig output for unused wired ethernet

2013-12-09 Thread Jamie Strandboge
** Description changed: - I was trying to diagnose network problems on this machine and found that Ubuntu 12.04 LTS, -56 and -57 will show the following with ifconfig: + I was trying to diagnose network problems on this machine and found that Ubuntu 12.04 will show the following with ifconfig

[Kernel-packages] [Bug 1259255] Re: incorrect ifconfig output for unused wired ethernet

2013-12-09 Thread Jamie Strandboge
** Description changed: I was trying to diagnose network problems on this machine and found that Ubuntu 12.04 will show the following with ifconfig after a little while: $ ifconfig eth0 eth0 Link encap:Ethernet HWaddr 1c:75:08:5a:9f:b1   UP BROADCAST MULTICAST MTU:1500

[Kernel-packages] [Bug 1208988] Re: AppArmor no longer mediates access to path-based AF_UNIX socket files

2013-12-12 Thread Jamie Strandboge
This was fixed in at least 25.0.1+build1-0ubuntu0.13.10.1 ** Changed in: firefox (Ubuntu Saucy) Status: Fix Committed = Fix Released ** Changed in: apparmor Status: Triaged = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is

[Kernel-packages] [Bug 1208988] Re: AppArmor no longer mediates access to path-based AF_UNIX socket files

2013-12-12 Thread Jamie Strandboge
Trusty firefox has the fix as well. ** Changed in: firefox (Ubuntu) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-maguro in Ubuntu. https://bugs.launchpad.net/bugs/1208988 Title:

[Kernel-packages] [Bug 1204005] Re: [saucy] kvm host hangs of guest boot with 3.10.0-5

2013-08-13 Thread Jamie Strandboge
Preliminary testing shows that this is no longer a problem with 3.11.0-1.4 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1204005 Title: [saucy] kvm host hangs of guest boot with

[Kernel-packages] [Bug 1259255] Re: incorrect ifconfig output for unused wired ethernet

2013-12-17 Thread Jamie Strandboge
Ok, I had her run the release kernel (-23) and the issue is there too: $ ifconfig eth0 eth0 Link encap:Ethernet HWaddr 1c:75:08:5a:9f:b1 UP BROADCAST MULTICAST MTU:1500 Metric:1 RX packets:4294744618 errors:4293631228 dropped:4294521940 overruns:4294744618

[Kernel-packages] [Bug 1257149] Re: linux-ti-omap4: 3.5.0-237.53 -proposed tracker

2013-12-19 Thread Jamie Strandboge
** Also affects: qa-regression-testing Importance: Undecided Status: New ** Changed in: qa-regression-testing Assignee: (unassigned) = Steve Beattie (sbeattie) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-ti-omap4

[Kernel-packages] [Bug 1252419] Re: CVE-2013-4511

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1252417] Re: CVE-2013-4270

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1252422] Re: CVE-2013-4579

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1252426] Re: CVE-2013-6763

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1252424] Re: CVE-2013-4588

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1254897] Re: CVE-2013-4591

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1254894] Re: CVE-2013-4563

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1254901] Re: CVE-2013-6282

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1254900] Re: CVE-2013-4592

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256083] Re: CVE-2013-6380

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256080] Re: CVE-2013-6378

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256094] Re: CVE-2013-6383

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256095] Re: CVE-2013-6392

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256088] Re: CVE-2013-6381

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256091] Re: CVE-2013-6382

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260610] Re: CVE-2013-2929

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1256919] Re: CVE-2013-6405

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260613] Re: CVE-2013-2930

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260616] Re: CVE-2013-6432

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260619] Re: CVE-2013-7026

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260615] Re: CVE-2013-6431

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1261564] Re: CVE-2013-4587

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1260622] Re: CVE-2013-7027

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1261570] Re: CVE-2013-6376

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1261566] Re: CVE-2013-6367

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1261568] Re: CVE-2013-6368

2013-12-20 Thread Jamie Strandboge
** Changed in: linux-lts-backport-maverick (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-natty (Ubuntu Lucid) Status: New = Won't Fix ** Changed in: linux-lts-backport-maverick (Ubuntu Precise) Status: New = Won't Fix ** Changed in:

[Kernel-packages] [Bug 1228675] Re: bcmwl-kernel-source 6.20.155.1+bdcom-0ubuntu0.0.1: bcmwl kernel module failed to build

2013-09-24 Thread Jamie Strandboge
*** This bug is a duplicate of bug 1228380 *** https://bugs.launchpad.net/bugs/1228380 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu.

[Kernel-packages] [Bug 1228830] Re: bcmwl-kernel-source 6.20.155.1+bdcom-0ubuntu0.0.1: bcmwl kernel module failed to build

2013-09-24 Thread Jamie Strandboge
*** This bug is a duplicate of bug 1228472 *** https://bugs.launchpad.net/bugs/1228472 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu.

[Kernel-packages] [Bug 1228988] Re: bcmwl-kernel-source 6.20.155.1+bdcom-0ubuntu0.0.1: bcmwl kernel module failed to build

2013-09-24 Thread Jamie Strandboge
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to bcmwl in Ubuntu. https://bugs.launchpad.net/bugs/1228988 Title: bcmwl-kernel-source 6.20.155.1+bdcom-0ubuntu0.0.1: bcmwl kernel

[Kernel-packages] [Bug 1228473] Re: [Dell Inc. Dell System XPS L502X] suspend/resume failure

2013-09-24 Thread Jamie Strandboge
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1228473 Title: [Dell Inc. Dell System XPS L502X] suspend/resume failure

[Kernel-packages] [Bug 1226000] Re: [OEM I42IL1] suspend/resume failure

2013-09-24 Thread Jamie Strandboge
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a regular (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Kernel-packages] [Bug 1204005] Re: [saucy] kvm host hangs of guest boot with 3.10.0-5

2013-08-09 Thread Jamie Strandboge
** Also affects: linux (Ubuntu Saucy) Importance: Critical Assignee: Andy Whitcroft (apw) Status: Triaged -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1204005 Title:

[Kernel-packages] [Bug 1244157] Re: [3.11.0-12.18 regression] Failed name lookup - disconnected path in dhclient D-BUS access

2013-10-24 Thread Jamie Strandboge
For adding the attach_disconnected flag, unfortunately there isn't a convenient way to apply attach_disconnected without modifying the profile directly. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1208988] Re: AppArmor no longer mediates access to path-based AF_UNIX socket files

2013-10-08 Thread Jamie Strandboge
apparmor-easyprof-ubuntu needs to allow /dev/socket/property_service and use attach_disconnected on touch images. ** Changed in: apparmor-easyprof-ubuntu (Ubuntu Saucy) Status: Fix Released = In Progress -- You received this bug notification because you are a member of Kernel Packages,

[Kernel-packages] [Bug 1208988] Re: AppArmor no longer mediates access to path-based AF_UNIX socket files

2013-10-08 Thread Jamie Strandboge
** Changed in: apparmor (Ubuntu Saucy) Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-maguro in Ubuntu. https://bugs.launchpad.net/bugs/1208988 Title: AppArmor no longer mediates access

[Kernel-packages] [Bug 1208988] Re: AppArmor no longer mediates access to path-based AF_UNIX socket files

2013-10-11 Thread Jamie Strandboge
** Changed in: firefox (Ubuntu Saucy) Status: Triaged = Fix Committed ** Changed in: firefox (Ubuntu Saucy) Milestone: None = saucy-updates ** Changed in: firefox (Ubuntu Saucy) Assignee: (unassigned) = Jamie Strandboge (jdstrand) -- You received this bug notification because

[Kernel-packages] [Bug 1204005] Re: [saucy] kvm host hangs of guest boot with 3.10.0-5

2013-10-11 Thread Jamie Strandboge
I have not seen this on 13.10 since 3.11.0-1.4. This bug can probably be closed. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1204005 Title: [saucy] kvm host hangs of guest boot with

[Kernel-packages] [Bug 1244157] Re: [3.11.0-12.18 regression] Failed name lookup - disconnected path in dhclient D-BUS access

2014-03-06 Thread Jamie Strandboge
** Tags removed: rls-t-incoming -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1244157 Title: [3.11.0-12.18 regression] Failed name lookup - disconnected path in dhclient D-BUS access

[Kernel-packages] [Bug 1295646] [NEW] Traceback when unplugging USB port replicator

2014-03-21 Thread Jamie Strandboge
Public bug reported: I have a lenovo USB 2.0 port replicator with Digtial Video (MODEL #VDK8736). I discovered that whenever I unplugged my port replicator, there would be a kernel traceback. My laptop has a VGA port which I plug an external monitor into, and I use the port replicator for

[Kernel-packages] [Bug 1295646] Re: Traceback when unplugging USB port replicator

2014-03-21 Thread Jamie Strandboge
** Description changed: I have a lenovo USB 2.0 port replicator with Digtial Video (MODEL #VDK8736). I discovered that whenever I unplugged my port replicator, there would be a kernel traceback. My laptop has a VGA port which I plug an external monitor into, and I use the port replicator

[Kernel-packages] [Bug 1295646] Re: Traceback when unplugging USB port replicator

2014-03-21 Thread Jamie Strandboge
This was all prompted by me thinking there was a bug in lightdm/screenlocking since I was sometimes unable to suspend/resume/unlock. I'm going to attach my test matrix procedure for how I discovered the traceback and proved to myself that the traceback is the most likely cause of my failure to

[Kernel-packages] [Bug 1295646] Re: Traceback when unplugging USB port replicator

2014-03-24 Thread Jamie Strandboge
Using the amd64 kernel in http://kernel.ubuntu.com/~kernel- ppa/mainline/v3.14-rc7-trusty/, I can reproduce the problem. Attached is the dmesg after booting with the port replicator plugged in and unplugging. ** Attachment added: lp1295646_v3.14-rc7-trusty.dmesg

[Kernel-packages] [Bug 1015440] Re: package apparmor 2.7.102-0ubuntu3.1 failed to install/upgrade: dependency problems - leaving unconfigured

2014-03-24 Thread Jamie Strandboge
** Package changed: apparmor (Ubuntu) = linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1015440 Title: package apparmor 2.7.102-0ubuntu3.1 failed to install/upgrade:

[Kernel-packages] [Bug 1271441] Re: CVE-2014-1438

2014-04-17 Thread Jamie Strandboge
** No longer affects: linux-lts-backport-maverick (Ubuntu) ** No longer affects: linux-lts-backport-natty (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1271441 Title:

[Kernel-packages] [Bug 1079859] Re: CVE-2012-4444

2014-04-17 Thread Jamie Strandboge
** Changed in: linux-ti-omap4 (Ubuntu Raring) Status: Fix Committed = Won't Fix -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-armadaxp in Ubuntu. https://bugs.launchpad.net/bugs/1079859 Title: CVE-2012- Status in

  1   2   3   4   5   6   7   >