Comment 3 for bug 1852667

Revision history for this message
Nobuto Murata (nobuto) wrote :

$ canonical-livepatch status --verbose
client-version: 9.4.6
machine-id: b7a6c33062c9427ab25dd5a95c9353bf
machine-token: XYZ
architecture: x86_64
cpu-model: QEMU Virtual CPU version 2.5+
last-check: 2019-11-15T02:01:34Z
boot-time: 2019-11-15T01:47:14Z
uptime: 38m28s
status:
- kernel: 4.15.0-58.64-generic
  running: true
  livepatch:
    checkState: check-failed
    checkInfo: 'cannot send status to server: bad server status 403 (URL: https://livepatch.canonical.com/api/machine/b7a6c33062c9427ab25dd5a95c9353bf):
      {"error": "Not checking for new patches based on reported livepatch state. State:
      kernel-upgrade-required"}'
    patchState: kernel-upgrade-required
    version: "59.1"
    fixes: |-
      * CVE-2011-1079
        The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux
        kernel before 2.6.39 does not ensure that a certain device field ends
        with a '\0' character, which allows local users to obtain potentially
        sensitive information from kernel stack memory, or cause a denial of
        service (BUG and system crash), via a BNEPCONNADD command.
...