[Kernel-packages] [Bug 2038942] Re: [MIR] protection-domain-mapper & qrtr

2023-10-10 Thread Mark Esler
I reviewed qrtr 1.0-2 as checked into mantic. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.

qrtr: Userspace reference for net/qrtr in the Linux kernel

- CVE History:
  - no CVE history
  - no security policy
  - CVE-2019-19079 and CVE-2021-29647 affect kernel implementation
- Build-Depends?
  - no explicit dependencies in d/control
- pre/post inst/rm scripts?
  - postinst configures and starts qrtr-ns.service
  - prerm stops qrtr-ns.service
  - postrm runs daemon-reload and purges qrtr-ns.service
- init scripts?
  - init
- systemd units?
  - ./lib/systemd/system/qrtr-ns.service
- spartan documentation
- starts qrtr-ns
- dbus services?
  - none
- setuid binaries?
  - none
- binaries in PATH?
  - ./usr/bin/qrtr-cfg
  - ./usr/bin/qrtr-lookup
  - ./usr/bin/qrtr-ns
- sudo fragments?
  - none
- polkit files?
  - none
- udev rules?
  - none
- unit tests / autopkgtests?
  - tests, hardware tests, are needed
- cron jobs?
  - none
- Build logs:
  - mostly clean
  - see -proposed

- Processes spawned?
  - none
- Memory management?
  - memory use appears safe
  - if values are confidential, memset_s should be used
- File IO?
  - only sockets
- Logging?
  - yes, see PLOGE 
  - string use looks safe
- Environment variable usage?
  - none
- Use of privileged functions?
  - none
- Use of cryptography / random number sources etc?
  - none
- Use of temp files?
  - none
- Use of networking?
  - heavy, most of codebase
  - nothing obviously concerning
- Use of WebKit?
  - none
- Use of PolicyKit?
  - none

- Any significant cppcheck results?
  - none
- Any significant Coverity results?
  - rc appears to be false positive
  - src/ns.c:796:2 appears to be an infinite loop
- Any significant shellcheck results?
  - none
- Any significant bandit results?
  - none
  - ./qrtr.py is python2.7

We should be cautious of IPC routers running root permissions. Similar code has
enabled vendor backdoors [0].

Qualcomm IPC will only be enabled in kernels which require it, such as for the
x13s.

Some mitigations exist to prevent spoofing and non-local observers. Fuzzing
seems worthwhile.

Possibly zero in-line comments. No documentation. This is a major maintenance
issue.

slyon's recommendations are great!

Thank you for adding a hardened systemd profile to -proposed for promotion \o/
http://launchpadlibrarian.net/691288509/qrtr_1.0-2_1.0-2ubuntu1.diff.gz

Security team ACK for promoting qrtr to main.

[0]
https://redmine.replicant.us/projects/replicant/wiki/samsunggalaxybackdoor

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-19079

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-29647

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2038942

Title:
  [MIR] protection-domain-mapper & qrtr

Status in protection-domain-mapper package in Ubuntu:
  Fix Committed
Status in qrtr package in Ubuntu:
  Fix Committed

Bug description:
  [Availability]
  The package protection-domain-mapper is already in Ubuntu universe.
  The package protection-domain-mapper build for the architectures it is 
designed to work on.
  It currently builds and works for architectures: any, verified as working on 
arm64
  Link to package https://launchpad.net/ubuntu/+source/protection-domain-mapper

  [Rationale]

  - The package protection-domain-mapper is required in Ubuntu main for
    ubuntu-desktop on ARM64, as it enables power-indicator (among other
    things) on most Windows on Arm laptops (qcom based laptops ~7 SKUs
    and more coming). There is no other way to implement this.

  - protection-domain-mapper depends on qrtr for library and a systemd
    service it provides.

  - There is no other/better way to solve this that is already in main
    or should go universe->main instead of this. As this is the only
    implementation of talking to the qcom hardware.

  - The package protection-domain-mapper is required in Ubuntu main no
    later than today due to Mantic release, if we want to have the best
    impression of Ubuntu Desktop in the live session on x13s.

  - If that fails, having it fixed as SRU is the next best option.

  [Security]

  - No CVEs/security issues in this software in the past. This is a
    reference open source implementation of these tools, which otherwise
    are used on qcom Android devices

  - no `suid` or `sgid` binaries no executables in `/sbin` and
    `/usr/sbin`

  - Package does install services: pd-mapper.service & qrtr-ns.service
    which allow runtime access to the qcom hardware which are run as
    root

  - Security has been kept in mind and common isolation/risk-mitigation
  patterns are in place utilizing the following features:

  - Packages does not open privileged ports (ports < 1024).

  - Package does not expose any external endpoints

  - Packages does not contain extensions to security-sensitive software
    (filters, sc

[Kernel-packages] [Bug 2038942] Re: [MIR] protection-domain-mapper & qrtr

2023-10-10 Thread Mark Esler
I reviewed protection-domain-mapper as checked into mantic.  This shouldn't be
considered a full audit but rather a quick gauge of maintainability.

pd-mapper: [no upstream description]

- CVE History:
  - no CVE history
  - possible security issues in commit messages
  - no security policy
  - upstream may not be reporting security issues
- this is a maintenance issue
- Build-Depends?
  - qrtr
- pre/post inst/rm scripts?
  - postinst configures and starts pd-mapper.service
  - prerm stops pd-mapper.service
  - postrm runs daemon-reload and purges pd-mapper.service
- init scripts?
  - none
- systemd units?
  - ./lib/systemd/system/pd-mapper.service
  - spartan documentation
  - starts pd-mapper
- dbus services?
  - none
- setuid binaries?
  - none
- binaries in PATH?
  - ./usr/bin/pd-mapper
- sudo fragments?
  - none
- polkit files?
  - none
- udev rules?
  - none
- unit tests / autopkgtests?
  - tests, hardware tests, are needed
- cron jobs?
  - none
- Build logs:
  - no-manual-page

- Processes spawned?
  - none
- Memory management?
  - owning team has agreed to fix issues
- File IO?
  - pd_enumerate_jsons looks dangerous
- statically opens /sys/class/remoteproc/
- only root should own these files
- if continues, without consequence
  - /lib/firmware/ also set
  - interprets json
- Logging?
  - minimal, mostly stderr
- Environment variable usage?
  - none
- Use of privileged functions?
  - none
- Use of cryptography / random number sources etc?
  - none
- Use of temp files?
  - none
- Use of networking?
  - through qrtr
- Use of WebKit?
  - none
- Use of PolicyKit?
  - none

- Any significant cppcheck results?
  - none
- Any significant Coverity results?
  - high density for only ~1k loc
  - owning team agreed to address all positive results
- Any significant shellcheck results?
  - none
- Any significant bandit results?
  - none

This deserves fuzzing and a deeper review. Hardware enablement is a priority
and urgent.

slyon's recommendations are great!

There is no release or changelog history. Commit messages are the only context
Possibly zero in-line comments. No documentation. This project does not even
have a description. This is a major maintenance issue.

Thank you for adding a hardened systemd profile in -proposed for promotion \o/
http://launchpadlibrarian.net/691288606/protection-domain-mapper_1.0-4ubuntu1_1.0-4ubuntu2.diff.gz

Security team ACK for promoting protection-domain-mapper to main.

** Attachment added: "coverity-protection-domain-mapper.txt"
   
https://bugs.launchpad.net/ubuntu/+source/qrtr/+bug/2038942/+attachment/5708388/+files/coverity-protection-domain-mapper.txt

** Changed in: protection-domain-mapper (Ubuntu)
 Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

** Changed in: qrtr (Ubuntu)
 Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

** Changed in: protection-domain-mapper (Ubuntu)
   Status: Confirmed => Fix Committed

** Changed in: qrtr (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2038942

Title:
  [MIR] protection-domain-mapper & qrtr

Status in protection-domain-mapper package in Ubuntu:
  Fix Committed
Status in qrtr package in Ubuntu:
  Fix Committed

Bug description:
  [Availability]
  The package protection-domain-mapper is already in Ubuntu universe.
  The package protection-domain-mapper build for the architectures it is 
designed to work on.
  It currently builds and works for architectures: any, verified as working on 
arm64
  Link to package https://launchpad.net/ubuntu/+source/protection-domain-mapper

  [Rationale]

  - The package protection-domain-mapper is required in Ubuntu main for
    ubuntu-desktop on ARM64, as it enables power-indicator (among other
    things) on most Windows on Arm laptops (qcom based laptops ~7 SKUs
    and more coming). There is no other way to implement this.

  - protection-domain-mapper depends on qrtr for library and a systemd
    service it provides.

  - There is no other/better way to solve this that is already in main
    or should go universe->main instead of this. As this is the only
    implementation of talking to the qcom hardware.

  - The package protection-domain-mapper is required in Ubuntu main no
    later than today due to Mantic release, if we want to have the best
    impression of Ubuntu Desktop in the live session on x13s.

  - If that fails, having it fixed as SRU is the next best option.

  [Security]

  - No CVEs/security issues in this software in the past. This is a
    reference open source implementation of these tools, which otherwise
    are used on qcom Android devices

  - no `suid` or `sgid` binaries no executables in `/sbin` and
    `/usr/sbin`

  - Package does install services: pd-mapper.service & qrtr-ns.service
    which allow runtime access to the qcom hardware which 

[Kernel-packages] [Bug 2080290] Re: tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah CPUs

2024-09-10 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2080290

Title:
   tools/power/cpupower: Fix Pstate frequency reporting on AMD Family
  1Ah CPUs

Status in linux package in Ubuntu:
  New

Bug description:
  cpupower utility reports incorrect pstates in one portion of its
  output on Turin.

  root@volcano-ef0fhost:/home/amd# cpupower frequency-info
  analyzing CPU 0:
driver: acpi-cpufreq
CPUs which run at the same hardware frequency: 0
CPUs which need to have their frequency coordinated by software: 0
maximum transition latency:  Cannot determine or is not supported.
hardware limits: 1.50 GHz - 3.25 GHz
available frequency steps:  1.90 GHz, 1.70 GHz, 1.50 GHz
available cpufreq governors: conservative ondemand userspace powersave 
performance schedutil
current policy: frequency should be within 1.50 GHz and 1.90 GHz.
The governor "schedutil" may decide which speed to use
within this range.
current CPU frequency: 1.50 GHz (asserted by call to hardware)
boost state support:
  Supported: yes
  Active: yes
  Boost States: 0
  Total States: 3
  Pstate-P0:  24800MHz
  Pstate-P1:  16800MHz
  Pstate-P2:  8800MHz

  This issue occurs both with the distro cpufreq utility that comes with
  Ubuntu 22.04 5.15.0.87 kernel-tools package as well as the upstream
  cpufreq utility.

  The fix is commit 43cad521c6d :

  tools/power/cpupower: Fix Pstate frequency reporting on AMD Family 1Ah
  CPUs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2080290/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2045931] Re: ps3 sixasis controller request pin to connect to bt

2024-02-15 Thread Mark Esler
Regardless of how the bluetooth device works, enabling unbonded devices
in BlueZ makes a computer vulnerable to CVE-2023-45866. It won't be
enabled by the security team.

Perhaps GNOME or other desktops could become more aware of gaming
controllers with these issues to make pairing easier, without needing to
open a terminal. If there are feature requests for this, please link
them in this bug for others.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2045931

Title:
  ps3 sixasis controller request pin to connect to bt

Status in bluez package in Ubuntu:
  Won't Fix

Bug description:
  [ Workaround ]

  1. Set ClassicBondedOnly=false in /etc/bluetooth/input.conf
  2. Run: systemctl restart bluetooth # or reboot

  [ Original Description ]

  Once my Ubuntu updated bluez package to 5.64-0ubuntu1.1 I was not able
  to connect my PS3 Sixasis controller via bluetooth. It is aking to
  enter a PIN in the device (not possible to enter a pin in the
  gamepad).

  Source pacakge (from "apt list -a bluez"):

  bluez/jammy-updates,jammy-security 5.64-0ubuntu1.1 amd64

  Once downgraded to 5.64-0ubuntu1 version, gamepad connects OK again
  without asking for a connection PIN.

  Ubuntu release:
  Description:  Ubuntu 22.04.3 LTS
  Release:  22.04

  Package version:
  bluez:
    Installed: 5.64-0ubuntu1.1

  Expected to happen:
  Connect PS3 Controller by Bluetooth without asking for a PIN code

  Happened instead:
  PS3 Controller cannot connect because PIN code is requested

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2045931/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1904391] Re: Touchpad and Keyboard not detectable in the new kernel

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1904391

Title:
  Touchpad and Keyboard not detectable in the new kernel

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Hello! I had to abruptly shutdown my pc while update for new groovy
  was on. Upon rebooting, the touchpad and keyboard is not detectable in
  the new kernel. They're working fine in older kernel which I had to
  select in boot options. Please kindly resolve this issue. Thank you!

  ProblemType: Bug
  DistroRelease: Ubuntu 20.10
  Package: linux-image-5.8.0-28-generic 5.8.0-28.30
  ProcVersionSignature: Ubuntu 5.8.0-28.30-generic 5.8.14
  Uname: Linux 5.8.0-28-generic x86_64
  ApportVersion: 2.20.11-0ubuntu50.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  niraj  6806 F pulseaudio
   /dev/snd/pcmC0D0p:   niraj  6806 F...m pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Nov 16 14:14:33 2020
  InstallationDate: Installed on 2018-09-09 (798 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  Lsusb:
   Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
   Bus 001 Device 005: ID 04ca:3018 Lite-On Technology Corp. 
   Bus 001 Device 003: ID 13d3:5a01 IMC Networks USB2.0 VGA UVC WebCam
   Bus 001 Device 002: ID 0bda:0129 Realtek Semiconductor Corp. RTS5129 Card 
Reader Controller
   Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
  MachineType: ASUSTeK COMPUTER INC. X556URK
  ProcFB: 0 EFI VGA
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-28-generic 
root=UUID=a268e846-0346-4124-855c-4a0a45bd4c8e ro recovery nomodeset 
dis_ucode_ldr
  RelatedPackageVersions:
   linux-restricted-modules-5.8.0-28-generic N/A
   linux-backports-modules-5.8.0-28-generic  N/A
   linux-firmware1.190.1
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 10/24/2016
  dmi.bios.release: 5.12
  dmi.bios.vendor: American Megatrends Inc.
  dmi.bios.version: X556URK.302
  dmi.board.asset.tag: ATN12345678901234567
  dmi.board.name: X556URK
  dmi.board.vendor: ASUSTeK COMPUTER INC.
  dmi.board.version: 1.0
  dmi.chassis.asset.tag: No Asset Tag
  dmi.chassis.type: 10
  dmi.chassis.vendor: ASUSTeK COMPUTER INC.
  dmi.chassis.version: 1.0
  dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrX556URK.302:bd10/24/2016:br5.12:svnASUSTeKCOMPUTERINC.:pnX556URK:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnX556URK:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
  dmi.product.family: X
  dmi.product.name: X556URK
  dmi.product.version: 1.0
  dmi.sys.vendor: ASUSTeK COMPUTER INC.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1904391/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1919150] Re: My keyboard stop working

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1919150

Title:
  My keyboard stop working

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I am using UBUNTU 18. My keyboard and mouse do not work.

  ProblemType: Bug
  DistroRelease: Ubuntu 18.04
  Package: linux-image-4.15.0-136-generic 4.15.0-136.140
  ProcVersionSignature: Ubuntu 4.15.0-136.140-generic 4.15.18
  Uname: Linux 4.15.0-136-generic x86_64
  ApportVersion: 2.20.9-0ubuntu7.23
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  elham  1797 F pulseaudio
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Mar 15 13:24:06 2021
  HibernationDevice: RESUME=UUID=0cd3cd69-2564-4117-a21b-1c28c2a83019
  InstallationDate: Installed on 2018-11-15 (850 days ago)
  InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 
(20180725)
  MachineType: LENOVO 20L8S02D00
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-136-generic 
root=UUID=17a0324e-ead9-4861-bdd0-60ece73973f5 ro quiet splash atkbd.reset 
vt.handoff=1
  RelatedPackageVersions:
   linux-restricted-modules-4.15.0-136-generic N/A
   linux-backports-modules-4.15.0-136-generic  N/A
   linux-firmware  1.173.18
  SourcePackage: linux
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 07/18/2018
  dmi.bios.vendor: LENOVO
  dmi.bios.version: N22ET48W (1.25 )
  dmi.board.asset.tag: Not Available
  dmi.board.name: 20L8S02D00
  dmi.board.vendor: LENOVO
  dmi.board.version: Not Defined
  dmi.chassis.asset.tag: No Asset Information
  dmi.chassis.type: 10
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: None
  dmi.modalias: 
dmi:bvnLENOVO:bvrN22ET48W(1.25):bd07/18/2018:svnLENOVO:pn20L8S02D00:pvrThinkPadT480s:rvnLENOVO:rn20L8S02D00:rvrNotDefined:cvnLENOVO:ct10:cvrNone:
  dmi.product.family: ThinkPad T480s
  dmi.product.name: 20L8S02D00
  dmi.product.version: ThinkPad T480s
  dmi.sys.vendor: LENOVO

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1919150/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 927225] Re: Yukon Optima 88E8059 fails to come up as a network interface when system is powered on without AC or network cable

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/927225

Title:
  Yukon Optima 88E8059 fails to come up as a network interface when
  system is powered on without AC or network cable

Status in Linux:
  Confirmed
Status in linux package in Ubuntu:
  Triaged

Bug description:
  I'm sure I've seen a bug report regarding this before, but I've
  searched and have been unable to find it, and it has occurred in both
  Oneiric and now Precise.

  On my laptop, an HP ProBook 6555b, using a Yukon Optima 88E8059, if I
  do not have the charger or a network cable plugged in when I power the
  machine on, I am unable to use the wired network port; I have to shut
  down the machine and plug AC or a network cable in before powering it
  up again.

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: linux-image-3.2.0-12-generic 3.2.0-12.21
  ProcVersionSignature: Ubuntu 3.2.0-12.21-generic 3.2.2
  Uname: Linux 3.2.0-12-generic x86_64
  NonfreeKernelModules: wl fglrx
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24.
  ApportVersion: 1.91-0ubuntu1
  Architecture: amd64
  ArecordDevices:
    List of CAPTURE Hardware Devices 
   card 0: SB [HDA ATI SB], device 0: STAC92xx Analog [STAC92xx Analog]
     Subdevices: 1/1
     Subdevice #0: subdevice #0
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  dave   2152 F pulseaudio
   /dev/snd/controlC0:  dave   2152 F pulseaudio
  Card0.Amixer.info:
   Card hw:0 'SB'/'HDA ATI SB at 0xd650 irq 16'
     Mixer name : 'IDT 92HD75B3X5'
     Components : 'HDA:111d7603,103c1457,00100202 
HDA:11c11040,103c3066,00100200'
     Controls  : 18
     Simple ctrls  : 9
  Card1.Amixer.info:
   Card hw:1 'HDMI'/'HDA ATI HDMI at 0xd641 irq 19'
     Mixer name : 'ATI RS690/780 HDMI'
     Components : 'HDA:1002791a,00791a00,0010'
     Controls  : 4
     Simple ctrls  : 1
  Card1.Amixer.values:
   Simple mixer control 'IEC958',0
     Capabilities: pswitch pswitch-joined penum
     Playback channels: Mono
     Mono: Playback [on]
  Date: Sun Feb  5 17:07:09 2012
  HibernationDevice: RESUME=UUID=08571619-07bd-4539-aaa1-abf52c468bbe
  InstallationMedia: Ubuntu 11.04 "Natty Narwhal" - Release amd64 (20110426)
  MachineType: Hewlett-Packard HP ProBook 6555b
  ProcEnviron:
   LANGUAGE=en_GB:en
   PATH=(custom, no user)
   LANG=en_GB.UTF-8
   SHELL=/bin/bash
  ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.2.0-12-generic 
root=/dev/mapper/sda1_crypt ro quiet splash acpi_os_name=Linux vt.handoff=7
  PulseSinks:
   Error: command ['pacmd', 'list-sinks'] failed with exit code 1: Home 
directory /home/dave not ours.
   No PulseAudio daemon running, or not running as session daemon.
  PulseSources:
   Error: command ['pacmd', 'list-sources'] failed with exit code 1: Home 
directory /home/dave not ours.
   No PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions:
   linux-restricted-modules-3.2.0-12-generic N/A
   linux-backports-modules-3.2.0-12-generic  N/A
   linux-firmware1.68
  SourcePackage: linux
  UpgradeStatus: Upgraded to precise on 2012-02-05 (0 days ago)
  dmi.bios.date: 01/26/2011
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: 68DTM Ver. F.07
  dmi.board.asset.tag: Base Board Asset Tag
  dmi.board.name: 1455
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 75.11
  dmi.chassis.asset.tag: CNU1072YY7
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvr68DTMVer.F.07:bd01/26/2011:svnHewlett-Packard:pnHPProBook6555b:pvr:rvnHewlett-Packard:rn1455:rvrKBCVersion75.11:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP ProBook 6555b
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/927225/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1696859] Re: package linux-image-4.10.0-22-generic (not installed) failed to install/upgrade: subprocess new pre-installation script returned error exit status 128

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1696859

Title:
  package linux-image-4.10.0-22-generic (not installed) failed to
  install/upgrade: subprocess new pre-installation script returned error
  exit status 128

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  ...

  ProblemType: Package
  DistroRelease: Ubuntu 17.04
  Package: linux-image-4.10.0-22-generic (not installed)
  ProcVersionSignature: Ubuntu 4.10.0-21.23-generic 4.10.11
  Uname: Linux 4.10.0-21-generic x86_64
  ApportVersion: 2.20.4-0ubuntu4.1
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  johnnybegood   1415 F pulseaudio
   /dev/snd/controlC1:  johnnybegood   1415 F pulseaudio
  Date: Wed Jun  7 06:52:02 2017
  ErrorMessage: subprocess new pre-installation script returned error exit 
status 128
  HibernationDevice: RESUME=UUID=8e8fcdb0-767f-4fa7-a8e3-e06bf12ae742
  InstallationDate: Installed on 2017-04-15 (53 days ago)
  InstallationMedia: Ubuntu 17.04 "Zesty Zapus" - Release amd64 (20170412)
  MachineType: Hewlett-Packard HP EliteBook Folio 1020 G1
  ProcFB: 0 inteldrmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.10.0-21-generic.efi.signed 
root=UUID=9056280d-1b43-47b6-b5ed-5b796780a968 ro quiet splash vt.handoff=7
  PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
  RelatedPackageVersions: grub-pc N/A
  SourcePackage: linux
  Title: package linux-image-4.10.0-22-generic (not installed) failed to 
install/upgrade: subprocess new pre-installation script returned error exit 
status 128
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 09/26/2016
  dmi.bios.vendor: Hewlett-Packard
  dmi.bios.version: M77 Ver. 01.14
  dmi.board.name: 2271
  dmi.board.vendor: Hewlett-Packard
  dmi.board.version: KBC Version 91.50
  dmi.chassis.asset.tag: 5CG5517PNY
  dmi.chassis.type: 10
  dmi.chassis.vendor: Hewlett-Packard
  dmi.modalias: 
dmi:bvnHewlett-Packard:bvrM77Ver.01.14:bd09/26/2016:svnHewlett-Packard:pnHPEliteBookFolio1020G1:pvrA3009FD18303:rvnHewlett-Packard:rn2271:rvrKBCVersion91.50:cvnHewlett-Packard:ct10:cvr:
  dmi.product.name: HP EliteBook Folio 1020 G1
  dmi.product.version: A3009FD18303
  dmi.sys.vendor: Hewlett-Packard

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1696859/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1884207] Re: Wifi Enterprice Login Page does not appear at connect

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1884207

Title:
  Wifi Enterprice Login Page does not appear at connect

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Wifi Enterprice Login Page does not appear at connect. Therefore I cannot log 
in into my enterprice.
  Our Enterprice has a wifi where employees can login , after connect to the 
SID a loginpage should appear somewhere , or at least at the first request in a 
browser. Does not workin in Firefox (newest) and not in Chrome (newest)

  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: linux-image-5.4.0-33-generic 5.4.0-33.37
  ProcVersionSignature: Ubuntu 5.4.0-33.37-generic 5.4.34
  Uname: Linux 5.4.0-33-generic x86_64
  NonfreeKernelModules: nvidia_modeset nvidia
  ApportVersion: 2.20.11-0ubuntu27.2
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC0:  mike   4416 F pulseaudio
  CasperMD5CheckResult: skip
  CurrentDesktop: ubuntu:GNOME
  Date: Fri Jun 19 09:51:01 2020
  InstallationDate: Installed on 2019-05-16 (399 days ago)
  InstallationMedia: Ubuntu 19.04 "Disco Dingo" - Release amd64 (20190416)
  MachineType: Dell Inc. XPS 15 9570
  ProcFB: 0 i915drmfb
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.4.0-33-generic 
root=UUID=d4e13886-b582-4019-bf6a-200113126da3 ro mem_sleep_default=deep 
nouveau.modeset=0
  RelatedPackageVersions:
   linux-restricted-modules-5.4.0-33-generic N/A
   linux-backports-modules-5.4.0-33-generic  N/A
   linux-firmware1.187
  SourcePackage: linux
  UpgradeStatus: Upgraded to focal on 2020-06-03 (15 days ago)
  dmi.bios.date: 04/21/2020
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: 1.16.2
  dmi.board.name: 0HWTMH
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 10
  dmi.chassis.vendor: Dell Inc.
  dmi.modalias: 
dmi:bvnDellInc.:bvr1.16.2:bd04/21/2020:svnDellInc.:pnXPS159570:pvr:rvnDellInc.:rn0HWTMH:rvrA00:cvnDellInc.:ct10:cvr:
  dmi.product.family: XPS
  dmi.product.name: XPS 15 9570
  dmi.product.sku: 087C
  dmi.sys.vendor: Dell Inc.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1884207/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1231178] Re: Altec Lansing speakers remote control not working

2024-03-04 Thread Mark Esler
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1231178

Title:
  Altec Lansing speakers remote control not working

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  This has been  ongoing since 2010 ... I initially thought that it was
  a hardware (Altec-Lansing speakers and/or Altec-Lansing remote
  control) issue, but noting the timing of linux header updates (remote
  intermittently working: range ~20 minutes to a couple of weeks or more
  working, interspaced with prolonged periods - up to 6+ months NOT
  working), I believe it is  linux (Ubuntu) problem.

   ==

  From: Altec Lansing Customer Service 
  Subject: Request received: Wireless remote not workling (VS 4221 speakers) 
(ticket #1630)
  Date: Fri, 4 Nov 2011 19:46:44 +

  Request received: Wireless remote not workling (VS 4221 speakers)
  (ticket #1630)

  Hi - Your request (#1630) has been received, and is being reviewed by
  our support staff.

  --

  Hello: I have the VS 4221 speakers and two of the wireless remotes;
  neither of the remotes works, even with new button batteries.  I
  cannot change the treble/bass, etc. Restarting my computer has no
  effect, nor doe unplugging the speakers (electrical outlet), then
  plugging them back in again.

   ==

  - Original Message(s): -
  Date: 2010 Apr 24 (Sat) 14:02
  From: "Altec Lansing Support" 
  Subject: Altec Lansing vs4221 remote does not work [Incident: 100425-06]

  Your question has been received. You should expect a response from us
  within 72 hours. To access your question from our support site, click
  the following  link or paste it into your web browser.

  http://alteclansing.custhelp.com/cgi-
  
bin/alteclansing.cfg/php/enduser/acct_login.php?p_next_page=myq_upd.php&p_iid=477391&p_created=1272142931

  Question Reference #100425-06

  Summary: Altec Lansing VS4221 remote does not work
  Product Level 1: Powered Audio
  Product Level 2: Satellite Speaker System
  Date Created: 04/24/2010 02:02 PM
  Last Updated: 04/24/2010 02:02 PM
  Status: Unresolved
  Date of Purchase: 11/13/2009
  First Name : Victoria
  Region: Canada
  Discussion Thread:

  Customer (Victoria S) - 04/24/2010 02:02 PM

  April 24, 2010

  Hi: I purchased these speakers (VS4221) in Nov. 2009.  This week, the
  remote suddenly stopped working; I thought it was the battery, but a
  fresh (new) battery did nothing: the remote still fails to work, at
  all.  I cannot use the standby function,or more importantly adjust
  bass / treble.

  Please advise.  Thanks, Victoria
   ===

  ProblemType: Bug
  DistroRelease: Ubuntu 12.04
  Package: linux-image-3.2.0-53-generic 3.2.0-53.81
  ProcVersionSignature: Ubuntu 3.2.0-53.81-generic 3.2.50
  Uname: Linux 3.2.0-53-generic x86_64
  NonfreeKernelModules: nvidia
  AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24.
  ApportVersion: 2.0.1-0ubuntu17.4
  Architecture: amd64
  AudioDevicesInUse:
   USERPID ACCESS COMMAND
   /dev/snd/controlC1:  victoria   2169 F pulseaudio
   /dev/snd/controlC0:  victoria   2169 F pulseaudio
   /dev/snd/pcmC0D0p:   victoria   2169 F...m pulseaudio
  CRDA: Error: command ['iw', 'reg', 'get'] failed with exit code 1: nl80211 
not found.
  Card0.Amixer.info:
   Card hw:0 'Intel'/'HDA Intel at 0xeb22 irq 48'
     Mixer name : 'SigmaTel STAC9271D'
     Components : 'HDA:83847627,80863001,00100201'
     Controls  : 44
     Simple ctrls  : 25
  Card1.Amixer.info:
   Card hw:1 'U0x46d0x825'/'USB Device 0x46d:0x825 at usb-:00:1a.7-6.1, 
high speed'
     Mixer name : 'USB Mixer'
     Components : 'USB046d:0825'
     Controls  : 2
     Simple ctrls  : 1
  Card1.Amixer.values:
   Simple mixer control 'Mic',0
     Capabilities: cvolume cvolume-joined cswitch cswitch-joined penum
     Capture channels: Mono
     Limits: Capture 0 - 6144
     Mono: Capture 4608 [75%] [24.00dB] [on]
  Date: Wed Sep 25 15:49:08 2013
  HibernationDevice: RESUME=UUID=91c758d2-001a-4a17-baba-f49fb267dd6f
  InstallationMedia: Ubuntu 12.04 LTS "Precise Pangolin" - Release amd64 
(20120425)
  IwConfig:
   lono wireless extensions.

   eth0  no wireless extensions.
  MarkForUpload: True
  ProcFB:

  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.2.0-53-generic 
root=UUID=7dfce011-0edb-4c59-af1c-88e4f3b85c0e ro quiet splash
  RelatedPackageVersions:
   linux-restricted-modules-3.2.0-53-generic N/A
   linux-backports-modules-3.2.0-53-generic  N/A
   linux-firmware1.79.6
  RfKill:

  SourcePackage: linux
  StagingDrivers: mei
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 05/21/2008
  

[Kernel-packages] [Bug 2045855] Re: package bluez 5.64-0ubuntu1.1 failed to install/upgrade: end of file on stdin at conffile prompt

2023-12-07 Thread Mark Esler
hi @yudamjoo o/

Please check the end of your `DpkgTerminalLog.txt` file.

To fix CVE-2023-45866 [0] a configuration file
(`/etc/bluetooth/input.conf`) was changed. If there had been edits made
to this file before updating BlueZ, apt will ask what you want to do
with the configuration file. "Y" is likely the right option if you do
not intend to have custom changes in `/etc/bluetooth/input.conf`.

Here's an example of me asking apt to show the config differences ("D") before 
accepting the new changes ("Y"):
```
$ sudo apt install bluez
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
The following packages will be upgraded:
  bluez
1 upgraded, 0 newly installed, 0 to remove and 157 not upgraded.
Need to get 1,106 kB of archives.
After this operation, 0 B of additional disk space will be used.
Get:1 https://redacted.launchpadcontent.net/ubuntu-security/ppa/ubuntu 
jammy/main amd64 bluez amd64 5.64-0ubuntu1.1 [1,106 kB]
Fetched 1,106 kB in 1s (884 kB/s)
(Reading database ... 161840 files and directories currently installed.)
Preparing to unpack .../bluez_5.64-0ubuntu1.1_amd64.deb ...
Unpacking bluez (5.64-0ubuntu1.1) over (5.64-0ubuntu1) ...
Setting up bluez (5.64-0ubuntu1.1) ...

Configuration file '/etc/bluetooth/input.conf'
 ==> Modified (by you or by a script) since installation.
 ==> Package distributor has shipped an updated version.
   What would you like to do about it ?  Your options are:
Y or I  : install the package maintainer's version
N or O  : keep your currently-installed version
  D : show the differences between the versions
  Z : start a shell to examine the situation
 The default action is to keep your current version.
*** input.conf (Y/I/N/O/D/Z) [default=N] ? D
--- /etc/bluetooth/input.conf   2023-03-21 08:04:20.023928226 -0500
+++ /etc/bluetooth/input.conf.dpkg-new  2023-11-29 05:31:28.0 -0600
@@ -17,8 +17,8 @@
 # platforms may want to make sure that input connections only come from bonded
 # device connections. Several older mice have been known for not supporting
 # pairing/encryption.
-# Defaults to false to maximize device compatibility.
-ClassicBondedOnly=true
+# Defaults to true for security.
+#ClassicBondedOnly=true
 
 # LE upgrade security
 # Enables upgrades of security automatically if required.

Configuration file '/etc/bluetooth/input.conf'
 ==> Modified (by you or by a script) since installation.
 ==> Package distributor has shipped an updated version.
   What would you like to do about it ?  Your options are:
Y or I  : install the package maintainer's version
N or O  : keep your currently-installed version
  D : show the differences between the versions
  Z : start a shell to examine the situation
 The default action is to keep your current version.
*** input.conf (Y/I/N/O/D/Z) [default=N] ? Y
Installing new version of config file /etc/bluetooth/input.conf ...
Processing triggers for man-db (2.10.2-1) ...
Processing triggers for dbus (1.12.20-2ubuntu4.1) ...
```

[0] https://ubuntu.com/security/notices/USN-6540-1

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-45866

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2045855

Title:
  package bluez 5.64-0ubuntu1.1 failed to install/upgrade: end of file
  on stdin at conffile prompt

Status in bluez package in Ubuntu:
  New

Bug description:
  I did not recognized the error.

  ProblemType: Package
  DistroRelease: Ubuntu 22.04
  Package: bluez 5.64-0ubuntu1.1
  ProcVersionSignature: Ubuntu 6.2.0-37.38~22.04.1-generic 6.2.16
  Uname: Linux 6.2.0-37-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.5
  AptOrdering:
   bluez:amd64: Install
   NULL: ConfigurePending
  Architecture: amd64
  CasperMD5CheckResult: unknown
  Date: Thu Dec  7 15:44:57 2023
  ErrorMessage: end of file on stdin at conffile prompt
  InstallationDate: Installed on 2021-01-30 (1040 days ago)
  InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
  InterestingModules: rfcomm bnep btusb bluetooth
  MachineType: Dell Inc. OptiPlex 7010
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.2.0-37-generic 
root=UUID=1aa27b2f-8d22-4b4e-931f-bd8e304ed0d4 ro quiet splash vt.handoff=7
  Python3Details: /usr/bin/python3.10, Python 3.10.12, unpackaged
  PythonDetails: N/A
  RelatedPackageVersions:
   dpkg 1.21.1ubuntu2.2
   apt  2.4.11
  SourcePackage: bluez
  Title: package bluez 5.64-0ubuntu1.1 failed to install/upgrade: end of file 
on stdin at conffile prompt
  UpgradeStatus: Upgraded to jammy on 2023-03-28 (253 days ago)
  dmi.bios.date: 03/25/2013
  dmi.bios.release: 4.6
  dmi.bios.vendor: Dell Inc.
  dmi.bios.version: A13
  dmi.board.name: 0GY6Y8
  dmi.board.vendor: Dell Inc.
  dmi.board.version: A00
  dmi.chassis.type: 6
  dmi.chassis.vendor: Dell Inc.

[Kernel-packages] [Bug 2045931] Re: ps3 sixasis controller request pin to connect to bt

2023-12-13 Thread Mark Esler
Hello all o/

This is intentional. And easy to reverse.

The patch for CVE-2023-45866 works as intended and is not a regression.
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/input?id=25a471a83e02e1effb15d5a488b3f0085eaeb675

If ClassicBondedOnly is not enforced, a nearby attacker can create a HID
(like a keyboard and mouse) on the victims PC when bluetooth is
discoverable. An HID can be used as a keyloggers or, of course, give
direct control of the session. The CVE reporter has discussed this
further on https://github.com/skysafe/reblog/tree/main/cve-2023-45866
And a talk and PoC release is forthcoming.


Fortunately, it is easy to enable legacy devices by setting 
`ClassicBondedOnly=false` in `/etc/bluetooth/input.conf`, and then running 
`systemctl restart bluetooth`. I ver
ified that a PS3 controller works well after this :)


All other distros *should* be fixing this CVE. I would love it if bloggers in 
the Linux gaming sphere could raise awareness about this CVE and share how to 
enable legacy bluetooth device support.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-45866

** Changed in: bluez (Ubuntu)
   Status: Confirmed => Won't Fix

** Changed in: bluez (Ubuntu)
 Assignee: Nishit Majithia (0xnishit) => Mark Esler (eslerm)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2045931

Title:
  ps3 sixasis controller request pin to connect to bt

Status in bluez package in Ubuntu:
  Won't Fix

Bug description:
  Once my Ubuntu updated bluez package to 5.64-0ubuntu1.1 I was not able
  to connect my PS3 Sixasis controller via bluetooth. It is aking to
  enter a PIN in the device (not possible to enter a pin in the
  gamepad).

  Source pacakge (from "apt list -a bluez"):

  bluez/jammy-updates,jammy-security 5.64-0ubuntu1.1 amd64

  Once downgraded to 5.64-0ubuntu1 version, gamepad connects OK again
  without asking for a connection PIN.

  Ubuntu release:
  Description:  Ubuntu 22.04.3 LTS
  Release:  22.04

  Package version:
  bluez:
Installed: 5.64-0ubuntu1.1

  Expected to happen:
  Connect PS3 Controller by Bluetooth without asking for a PIN code

  Happened instead:
  PS3 Controller cannot connect because PIN code is requested

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2045931/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2046116] Re: bluetooth device connected but not recognised as output device

2023-12-13 Thread Mark Esler
hi @werdem o/

What bluetooth device are you using?

Your version of BlueZ has a security patch for vulnerability
CVE-2023-45866 which disables support for certain legacy bluetooth
devices.

If your device does not support Classic Bonding, you can re-enable it by
setting `ClassicBondedOnly=false` in `/etc/bluetooth/input.conf`, and
then running `systemctl restart bluetooth`. More info in
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2045931/comments/6

Please let me know if that enables your device. Keep in mind that
enabling legacy devices enables the exploit.

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-45866

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/2046116

Title:
  bluetooth device connected but not recognised as output device

Status in bluez package in Ubuntu:
  New

Bug description:
  bluetooth device connected but not recognised as output device

  ProblemType: Bug
  DistroRelease: Ubuntu 22.04
  Package: bluez 5.64-0ubuntu1.1
  ProcVersionSignature: Ubuntu 6.2.0-37.38~22.04.1-generic 6.2.16
  Uname: Linux 6.2.0-37-generic x86_64
  ApportVersion: 2.20.11-0ubuntu82.4
  Architecture: amd64
  CasperMD5CheckResult: unknown
  CurrentDesktop: ubuntu:GNOME
  Date: Mon Dec 11 15:28:00 2023
  InterestingModules: rfcomm bnep btusb bluetooth
  MachineType: LENOVO 81EK
  ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-6.2.0-37-generic 
root=UUID=6f698382-a806-46af-9a4b-472e96795c6f ro quiet splash vt.handoff=7
  SourcePackage: bluez
  UpgradeStatus: No upgrade log present (probably fresh install)
  dmi.bios.date: 08/02/2018
  dmi.bios.release: 1.28
  dmi.bios.vendor: LENOVO
  dmi.bios.version: 7QCN28WW
  dmi.board.asset.tag: NO Asset Tag
  dmi.board.name: LNVNB161216
  dmi.board.vendor: LENOVO
  dmi.board.version: SDK0J40709 WIN
  dmi.chassis.asset.tag: NO Asset Tag
  dmi.chassis.type: 31
  dmi.chassis.vendor: LENOVO
  dmi.chassis.version: Lenovo YOGA 530-14IKB
  dmi.ec.firmware.release: 1.28
  dmi.modalias: 
dmi:bvnLENOVO:bvr7QCN28WW:bd08/02/2018:br1.28:efr1.28:svnLENOVO:pn81EK:pvrLenovoYOGA530-14IKB:rvnLENOVO:rnLNVNB161216:rvrSDK0J40709WIN:cvnLENOVO:ct31:cvrLenovoYOGA530-14IKB:skuLENOVO_MT_81EK_BU_idea_FM_YOGA530-14IKB:
  dmi.product.family: YOGA 530-14IKB
  dmi.product.name: 81EK
  dmi.product.sku: LENOVO_MT_81EK_BU_idea_FM_YOGA 530-14IKB
  dmi.product.version: Lenovo YOGA 530-14IKB
  dmi.sys.vendor: LENOVO
  hciconfig:
   hci0:Type: Primary  Bus: USB
BD Address: 0C:54:15:91:FA:4F  ACL MTU: 1021:5  SCO MTU: 96:6
UP RUNNING PSCAN 
RX bytes:83770 acl:295 sco:0 events:4208 errors:0
TX bytes:879445 acl:1667 sco:0 commands:1184 errors:0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2046116/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2062667] Re: Fails on (and should be removed from) raspi desktop

2024-04-27 Thread Mark Esler
This impacts all arm64 installs, not just raspberry pi.

The MIR for qrtr and protection-domain-mapper [0] was requested late in
the Mantic cycle and was only approved by Security since it was promised
to only be used for x13s hardware enablement. Hopefully Qualcomm IPC is
only enabled for x13s kernels.

As noted in the qrtr MIR:
> We should be cautious of IPC routers running root permissions. Similar code 
> has
> enabled vendor backdoors [1].

Furthermore, qrtr has nearly no documentation and has no inline code
comments [2].

Please remove this from the mantic and noble's ubuntu-meta package.

[0] https://bugs.launchpad.net/ubuntu/+source/qrtr/+bug/2038942
[1] https://redmine.replicant.us/projects/replicant/wiki/samsunggalaxybackdoor
[2] https://github.com/linux-msm/qrtr

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2062667

Title:
  Fails on (and should be removed from) raspi desktop

Status in protection-domain-mapper package in Ubuntu:
  Confirmed
Status in qrtr package in Ubuntu:
  Confirmed
Status in ubuntu-meta package in Ubuntu:
  Confirmed

Bug description:
  The protection-domain-mapper package (and qrtr-tools) are both
  installed by default on the Ubuntu Desktop for Raspberry Pi images,
  thanks to their inclusion in the desktop-minimal seed for arm64.
  However, there's no hardware that they target on these platforms, and
  the result is a permanently failed service (pd-mapper.service).

  It appears these were added to support the X13s laptop [1]. I've
  attempted to work around the issue by excluding these packages in the
  desktop-raspi seed (experimentally in my no-pd-mapper branch [2]) but
  this does not work (the packages still appear in the built images).
  Ideally, these packages should be moved into a hardware-specific seed
  for the X13s (and/or whatever other laptops need these things).
  Alternatively, at a bare minimum, the package should have some
  conditional that causes the service not to attempt to start when it's
  not on Qualcomm hardware.

  [1]: https://git.launchpad.net/~ubuntu-core-dev/ubuntu-
  seeds/+git/ubuntu/commit/desktop-
  minimal?id=afe820cd49514896e96d02303298ed873d8d7f8a

  [2]: https://git.launchpad.net/~waveform/ubuntu-
  seeds/+git/ubuntu/commit/?id=875bddac19675f7e971f56d9c5d39a9912dc6e38

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug/2062667/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2073500] Re: Ubuntu RT2x00 USB Driver Kernel Use-After-Free Vulnerability

2024-08-05 Thread Mark Esler
This issue was reported publicly to https://lore.kernel.org/linux-
wireless/caov16xesck0-smenjfxvwikqogbj4pqwa2dvjbvwq-g+ntv...@mail.gmail.com/T/#u

Therefore, I am making this bug report public as well.

The new report claims that "Debian systems are not affected.".

If Ubuntu is truly the only distro affected, the Canonical CNA can
assign a CVE. Otherwise, CVE assignment should be made by upstream,
MITRE, or a Root CNA like Red Hat.

To restate this, it is not known if Ubuntu is an affected downstream of
this vulnerability or if the issue truly originates in Ubuntu as the
upstream provider. My hunch is the prior.

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2073500

Title:
  Ubuntu RT2x00 USB Driver Kernel  Use-After-Free Vulnerability

Status in linux package in Ubuntu:
  New

Bug description:
  Description:

  While performing USB interface fuzzing tests on a NetGear WNDA4100
  network card (Bus 001 Device 018: ID 0846:9013), I observed a system
  crash on multiple PCs running Ubuntu 22.04. The issue appears to be
  related to the USB drivers or kernel handling of the device, as
  indicated by the kernel logs.

  Impact:

  Affected systems include Ubuntu 22.04 running on different hardware
  configurations with the NetGear WNDA4100 network card. This
  vulnerability may allow an attacker to trigger a system crash through
  the USB interface, leading to denial of service.

  Reproduction Steps:

  Connect the NetGear WNDA4100 network card (ID 0846:9013) to a system running 
Ubuntu 22.04.
  Run the provided fuzzing script to interact with the USB interface of the 
network card.
  Observe the system behavior and check for crashes or instability.
  Logs and Error Messages:

  The following are excerpts from the kernel log during the crash:
  [  +0.351900] [ cut here ]
  [  +0.03] WARNING: CPU: 3 PID: 0 at kernel/time/timer.c:1738 
__run_timers+0x2dd/0x310
  [  +0.07] Modules linked in: veth xt_nat xt_tcpudp xt_conntrack 
nft_chain_nat xt_MASQUERADE nf_nat nf_conntrack_netlink nf_conntrack 
nf_defrag_ipv6 nf_defrag_ipv4 xfrm_user tls xfrm_algo xt_addrtype nft_compat 
nf_tables libcrc32c nfnetlink br_netfilter bridge stp llc ccm 
snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic 
snd_sof_pci_intel_tgl snd_sof_intel_hda_common soundwire_intel 
snd_sof_intel_hda_mlink soundwire_cadence snd_sof_intel_hda snd_sof_pci 
intel_uncore_frequency snd_sof_xtensa_dsp intel_uncore_frequency_common joydev 
overlay snd_sof snd_sof_utils snd_soc_hdac_hda snd_hda_ext_core 
snd_soc_acpi_intel_match snd_soc_acpi soundwire_generic_allocation 
soundwire_bus snd_soc_core snd_compress ac97_bus snd_pcm_dmaengine 
snd_hda_intel snd_intel_dspcfg snd_intel_sdw_acpi x86_pkg_temp_thermal 
snd_hda_codec intel_powerclamp coretemp snd_hda_core snd_hwdep snd_pcm 
kvm_intel snd_seq_midi i915 kvm snd_seq_midi_event rt2800usb snd_rawmidi 
uvcvideo irqbypass iwlmvm rt2x00usb crct10dif_pclmul rt2800lib
  [  +0.34]  polyval_clmulni videobuf2_vmalloc polyval_generic drm_buddy 
uvc ghash_clmulni_intel rt2x00lib videobuf2_memops sha256_ssse3 ttm snd_seq 
videobuf2_v4l2 sha1_ssse3 aesni_intel binfmt_misc mei_hdcp mei_pxp 
drm_display_helper crypto_simd videodev snd_seq_device pmt_telemetry cryptd 
mac80211 iwlwifi pmt_class intel_rapl_msr nls_iso8859_1 cmdlinepart input_leds 
snd_timer cec rapl huawei_wmi videobuf2_common processor_thermal_device_pci 
ledtrig_audio spi_nor rc_core processor_thermal_device intel_cstate wmi_bmof 
sparse_keymap libarc4 serio_raw mc snd cfg80211 drm_kms_helper mei_me mtd 
processor_thermal_rfim hid_multitouch processor_thermal_mbox i2c_algo_bit mei 
soundcore processor_thermal_rapl intel_vsec intel_rapl_common int3400_thermal 
int3403_thermal int340x_thermal_zone acpi_thermal_rel mac_hid acpi_pad 
sch_fq_codel msr parport_pc ppdev lp parport drm efi_pstore ip_tables x_tables 
autofs4 hid_generic nvme crc32_pclmul nvme_core spi_intel_pci intel_lpss_pci 
i2c_i801 spi_intel xhci_pci intel_lpss nvme_common
  [  +0.42]  i2c_smbus xhci_pci_renesas idma64 i2c_hid_acpi i2c_hid video 
hid wmi pinctrl_tigerlake
  [  +0.05] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.5.0-35-generic 
#35~22.04.1-Ubuntu
  [  +0.02] Hardware name: HONOR GLO-GXXX/GLO-GXXX-PCB, BIOS 1.09 06/27/2023
  [  +0.00] RIP: 0010:__run_timers+0x2dd/0x310
  [  +0.03] Code: 3e 02 48 85 c0 74 0c 48 8b 78 08 4c 89 ee e8 ba cf ff ff 
65 ff 0d 2b 1e 44 57 0f 85 38 ff ff ff 0f 1f 44 00 00 e9 2e ff ff ff <0f> 0b e9 
0b ff ff ff 41 0f b6 5f 26 80 fb 01 0f 87 44 da ec 00 83
  [  +0.01] RSP: 0018:aedb4048cea0 EFLAGS: 00010046
  [  +0.01] RAX:  RBX:  RCX: 

  [  +0.01] RDX: aedb4048ced0 RSI: 7618 RDI: 

  [  +0.01] RBP: aedb4

[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-11 Thread Mark Esler
Thank you @superm1 and @juergh! I have not made packages outside of
security patches and I immensely appreciate the advice.

Since not everyone who needs linux-firmware wants amd64-micocode, I believe it 
should be #9: "Reorg: A and B existed; move some files from A to B; new A does 
not require new B".

So linux-firmware needs:
Depends: amd64-microcode (

[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-11 Thread Mark Esler
In the above comment I did not apply rule 9 to linux-firmware properly.

Since the next linux-firmware version number is unknown, the
amd64-microcode relationship to linux-firmware  will use earlier or
equal to (<=) the current linux-firmware version
https://www.debian.org/doc/debian-policy/ch-relationships.html

So linux-firmware needs:
Breaks: amd64-microcode (<< 3.20220411.1ubuntu1) [amd64]

and amd64-microcode needs:
Breaks: linux-firmware (<= 20220711.gitdfa29317-0ubuntu1)
Replaces: linux-firmware (<= 20220711.gitdfa29317-0ubuntu1)

Keeping replaces feels odd.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  In Progress

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-12 Thread Mark Esler
An updated merge is ready for review.
https://launchpad.net/~eslerm/+archive/ubuntu/share2/+sourcepub/13867943/+listing-archive-extra

This package has a d/control with:
```
Source: amd64-microcode
Section: non-free/admin
Priority: standard
Maintainer: Ubuntu Developers 
XSBC-Original-Maintainer: Henrique de Moraes Holschuh 
Uploaders: Giacomo Catenazzi 
Build-Depends: debhelper (>= 9)
Standards-Version: 3.9.8
Vcs-Git: https://salsa.debian.org/hmh/amd64-microcode.git
Vcs-Browser: https://salsa.debian.org/hmh/amd64-microcode
XS-Autobuild: yes

Package: amd64-microcode
Architecture: i386 amd64 x32
Recommends: initramfs-tools (>= 0.113~) | dracut (>= 044) | tiny-initramfs
Depends: ${misc:Depends}
Breaks: intel-microcode (<< 2), linux-firmware (<= 
20220711.gitdfa29317-0ubuntu1)
Replaces: linux-firmware (<= 20220711.gitdfa29317-0ubuntu1)
Description: Processor microcode firmware for AMD CPUs
 This package contains microcode patches for all AMD AMD64
 processors.  AMD releases microcode patches to correct
 processor behavior as documented in the respective processor
 revision guides.  This package includes both AMD CPU microcode
 patches and AMD SEV firmware updates.
 .
 For Intel processors, please refer to the intel-microcode package.
```

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  In Progress

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-12 Thread Mark Esler
@vorlon suggested to use "linux-firmware (<< 20220711.gitdfa29317-0~)"
to make this SRU-proof for the future.

d/control now contains:
```
Breaks: intel-microcode (<< 2), linux-firmware (<< 20220711.gitdfa29317-0~)
Replaces: linux-firmware (<< 20220711.gitdfa29317-0~)
```

Please see the latest proposed merge:
https://launchpad.net/~eslerm/+archive/ubuntu/share3/+sourcepub/13868029/+listing-archive-extra

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  In Progress

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-12 Thread Mark Esler
Please see the proposed diff for the next linux-firmware update:
https://launchpad.net/~eslerm/+archive/ubuntu/share/+sourcepub/13868068/+listing-archive-extra

I was not able to specify [amd64] in the Breaks line, since that broke
build: "error: the Breaks field ... 'linux-firmware' is architecture
all"

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  In Progress

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-15 Thread Mark Esler
** Changed in: amd64-microcode (Ubuntu)
 Assignee: Mark Esler (eslerm) => (unassigned)

** Changed in: linux-firmware (Ubuntu)
 Assignee: Mark Esler (eslerm) => (unassigned)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  In Progress
Status in linux-firmware package in Ubuntu:
  In Progress

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-16 Thread Mark Esler
I am setting this to confirmed and assigning owning teams per
https://wiki.ubuntu.com/UbuntuDevelopment/Merging

Please let me know if I assigned teams incorrectly or if I can do more
work for this merge.

** Changed in: amd64-microcode (Ubuntu)
   Status: In Progress => Confirmed

** Changed in: linux-firmware (Ubuntu)
   Status: In Progress => Confirmed

** Changed in: amd64-microcode (Ubuntu)
 Assignee: (unassigned) => Canonical Foundations Team 
(canonical-foundations)

** Changed in: linux-firmware (Ubuntu)
 Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  Confirmed
Status in linux-firmware package in Ubuntu:
  Confirmed

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1986796] Re: amd64-microcode conflicts with linux-firmware

2022-08-18 Thread Mark Esler
The conflicts are resolved with patches for amd64-microcode and linux-
firmware here:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1986796

Title:
  amd64-microcode conflicts with linux-firmware

Status in amd64-microcode package in Ubuntu:
  Triaged
Status in linux-firmware package in Ubuntu:
  Triaged

Bug description:
  Occurs on kubuntu, gnome and xfce versions of kinetic proposed -- most
  recent updates

  ProblemType: Bug
  DistroRelease: Ubuntu 22.10
  Package: amd64-microcode 3.20191218.1ubuntu2
  ProcVersionSignature: Ubuntu 5.19.0-15.15-generic 5.19.0
  Uname: Linux 5.19.0-15-generic x86_64
  ApportVersion: 2.22.0-0ubuntu4
  Architecture: amd64
  CasperMD5CheckResult: pass
  CurrentDesktop: XFCE
  Date: Wed Aug 17 08:07:09 2022
  InstallationDate: Installed on 2022-06-10 (67 days ago)
  InstallationMedia: Xubuntu 22.10 "Kinetic Kudu" - Alpha amd64 (20220610)
  SourcePackage: amd64-microcode
  UpgradeStatus: No upgrade log present (probably fresh install)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1986796/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-19 Thread Mark Esler
@juergh, the amd64-microcode in kinetic proposed could be fixed by using
the control file in
https://launchpad.net/~eslerm/+archive/ubuntu/share3/+sourcepub/13868029/+listing-
archive-extra

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  Fix Committed
Status in linux-firmware package in Ubuntu:
  Fix Committed

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-20 Thread Mark Esler
The current version of linux-firmware (20220819.git8413c63c-0ubuntu1)
contains a Breaks line with: `amd64-microcode (<= 3.20220411.1ubuntu1)`.

The linux-firmware patch proposed in comment 16 contains a Breaks line
with: `amd64-microcode (<< 3.20220411.1~)`.

The patch in comment 16 works.


Using the Breaks line `amd64-microcode (<< 3.20220411.1~)` in the current 
version of linux-firmware (20220819.git8413c63c-0ubuntu1) I was able to install 
both linux-firmware and amd64-microcode in a fresh kinetic VM with:

sudo apt install linux-firmware
sudo apt --fix-broken install
sudo apt install linux-firmware

eslerm@sec-kinetic-amd64:~$ apt-cache policy linux-firmware
linux-firmware:
  Installed: 20220819.git8413c63c-0ubuntu3
  Candidate: 20220819.git8413c63c-0ubuntu3
  Version table:
 *** 20220819.git8413c63c-0ubuntu3 500
500 http://192.168.122.1/debs/testing kinetic/ Packages
100 /var/lib/dpkg/status
 20220819.git8413c63c-0ubuntu2 500
500 http://archive.ubuntu.com/ubuntu kinetic-proposed/main amd64 
Packages
500 http://archive.ubuntu.com/ubuntu kinetic-proposed/main i386 Packages
 20220711.gitdfa29317-0ubuntu1 500
500 http://archive.ubuntu.com/ubuntu kinetic/main amd64 Packages
500 http://archive.ubuntu.com/ubuntu kinetic/main i386 Packages

eslerm@sec-kinetic-amd64:~$ apt-cache policy amd64-microcode
amd64-microcode:
  Installed: 3.20220411.1ubuntu2
  Candidate: 3.20220411.1ubuntu2
  Version table:
 *** 3.20220411.1ubuntu2 500
500 http://archive.ubuntu.com/ubuntu kinetic-proposed/main amd64 
Packages
100 /var/lib/dpkg/status
 3.20191218.1ubuntu2 500
500 http://archive.ubuntu.com/ubuntu kinetic/main amd64 Packages

** Changed in: amd64-microcode (Ubuntu)
   Importance: Medium => Critical

** Changed in: linux-firmware (Ubuntu)
   Importance: Medium => Critical

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  Triaged
Status in linux-firmware package in Ubuntu:
  Fix Committed

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-20 Thread Mark Esler
\o/ woo!

Thanks everyone who helped get this into Kinetic before feature freeze!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  Triaged
Status in linux-firmware package in Ubuntu:
  Fix Committed

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1983409] Re: Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable (non-free)

2022-08-22 Thread Mark Esler
Juerg, yes.

The Breaks line of comment 15 used the most recently available version
(<< 20220711.gitdfa29317-0~).

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1983409

Title:
  Please merge amd64-microcode 3.20220411.1 (main) from Debian unstable
  (non-free)

Status in amd64-microcode package in Ubuntu:
  Triaged
Status in linux-firmware package in Ubuntu:
  Fix Committed

Bug description:
  Request to update amd64-micrcode in kinetic from 3.20191218.1ubuntu2
  to 3.20220411.1ubuntu1.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/1983409/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2080555] Re: ubunutu 20 has many vulnerability for the package linux-aws-5.15

2024-09-12 Thread Mark Esler
For the 8 non-kernel cves, I matched our internal priority to NVDs CVSS ratings 
when higher.
https://git.launchpad.net/ubuntu-cve-tracker/commit/?id=ef4355cdd0cb2677d21681b42615d7208eb0c187

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/2080555

Title:
  ubunutu 20 has many vulnerability for the package linux-aws-5.15

Status in linux-aws-5.15 package in Ubuntu:
  New

Bug description:
  Hello Team,

  We are testing the ubunutu 20 AMI and it has more than 200+
  vulnerability for the package linux-aws-5.15

  AMI - ubuntu/images/hvm-ssd/ubuntu-focal-20.04-amd64-server-20240821
  AMI-ID - ami-079467ea8dd191734
  Region - us-west-2

  We are reaching out to check if there is any ETA we can expect the
  patched version of this package

  Regards,
  Varun Agarwal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws-5.15/+bug/2080555/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp