[Bug 1884159] Re: Update lockdown patches

2020-08-12 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1065.70 --- linux-oem-osp1 (5.0.0-1065.70) bionic; urgency=medium * bionic/linux-oem-osp1: 5.0.0-1065.70 -proposed tracker (LP: #1887090) [ Ubuntu: 5.0.0-58.62 ] * disco/linux: 5.0.0-58.62 -proposed tracker (LP: #1887094

[Bug 1884159] Re: Update lockdown patches

2020-07-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-42.46 --- linux (5.4.0-42.46) focal; urgency=medium * focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069) * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668) - SAUCE: Revert "netprio_cgroup: Fix unlimi

[Bug 1884159] Re: Update lockdown patches

2020-07-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1065.70 --- linux-oem-osp1 (5.0.0-1065.70) bionic; urgency=medium * bionic/linux-oem-osp1: 5.0.0-1065.70 -proposed tracker (LP: #1887090) [ Ubuntu: 5.0.0-58.62 ] * disco/linux: 5.0.0-58.62 -proposed tracker (LP: #1887094

[Bug 1884159] Re: Update lockdown patches

2020-07-27 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.3.0-64.58 --- linux (5.3.0-64.58) eoan; urgency=medium * eoan/linux: 5.3.0-64.58 -proposed tracker (LP: #1887088) * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668) - SAUCE: Revert "netprio_cgroup: Fix unlimite

[Bug 1884159] Re: Update lockdown patches

2020-07-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-186.216 --- linux (4.4.0-186.216) xenial; urgency=medium * xenial/linux: 4.4.0-186.216 -proposed tracker (LP: #1885514) * Xenial update: v4.4.228 upstream stable release (LP: #1884564) - ipv6: fix IPV6_ADDRFORM operation logic

[Bug 1884159] Re: Update lockdown patches

2020-07-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.15.0-112.113 --- linux (4.15.0-112.113) bionic; urgency=medium * bionic/linux: 4.15.0-112.113 -proposed tracker (LP: #1887048) * Packaging resync (LP: #1786013) - update dkms package versions * CVE-2020-11935 - SAUCE: aufs: d

[Bug 1884159] Re: Update lockdown patches

2020-07-20 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.4.0-42.46 --- linux (5.4.0-42.46) focal; urgency=medium * focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069) * linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668) - SAUCE: Revert "netprio_cgroup: Fix unlimi

[Bug 1884159] Re: Update lockdown patches

2020-07-16 Thread Seth Forshee
Tested against -proposed kernels for xenial, bionic, eoan, and focal. Tested against a suite of tests I wrote to exercise as many of the interfaces as possible which are restricted by kernel lockdown, and also tested against the applicable "American Unsigned Language" exploits [1]. Everything looks

[Bug 1884159] Re: Update lockdown patches

2020-07-06 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- xenial' to 'verification-done-xenial'. If the problem still exists, change the tag 'verifica

[Bug 1884159] Re: Update lockdown patches

2020-07-06 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- bionic' to 'verification-done-bionic'. If the problem still exists, change the tag 'verifica

[Bug 1884159] Re: Update lockdown patches

2020-07-06 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- focal' to 'verification-done-focal'. If the problem still exists, change the tag 'verificati

[Bug 1884159] Re: Update lockdown patches

2020-07-06 Thread AceLan Kao
** Also affects: linux-oem-osp1 (Ubuntu) Importance: Undecided Status: New ** No longer affects: linux-oem-osp1 (Ubuntu Xenial) ** No longer affects: linux-oem-osp1 (Ubuntu Eoan) ** No longer affects: linux-oem-osp1 (Ubuntu Focal) ** Changed in: linux-oem-osp1 (Ubuntu) Status:

[Bug 1884159] Re: Update lockdown patches

2020-07-03 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed- eoan' to 'verification-done-eoan'. If the problem still exists, change the tag 'verification

[Bug 1884159] Re: Update lockdown patches

2020-06-29 Thread Khaled El Mously
** Changed in: linux (Ubuntu Eoan) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Focal) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Bionic) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: In P

[Bug 1884159] Re: Update lockdown patches

2020-06-19 Thread Seth Forshee
** Description changed: Impact: The lockdown patches have evolved over time, and part of this was restricting more areas of the kernel. Not all of these additions were backported, and some can lead to lockdown bypasses, see [1] and [2]. Fix: Backport newer lockdown restrictions to old