This bug was fixed in the package linux - 3.13.0-96.143 --------------- linux (3.13.0-96.143) trusty; urgency=low
[ Tim Gardner ] * Release Tracking Bug - LP: #1618083 * CVE-2015-8767 - sctp: Prevent soft lockup when sctp_accept() is called during a timeout event * MacBookPro11,4 fails to poweroff or suspend (LP: #1587714) - SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11 * 3.13: libvirtd: page allocation failure: order:4, mode:0x1040d0 (LP: #1616193) - vhost-net: extend device allocation to vmalloc - vhost-net: don't open-code kvfree * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854) - Revert "UBUNTU: [Config] CONFIG_EFI=n for arm64" - Revert "UBUNTU: SAUCE: UEFI: Set EFI_SECURE_BOOT bit in x86_efi_facility" - Revert "UBUNTU: SAUCE: UEFI: Add secure boot and MOK SB State disabled sysctl" - Revert "UBUNTU: SAUCE: UEFI: Display MOKSBState when disabled" - Revert "UBUNTU: SAUCE: UEFI: efi: Disable secure boot if shim is in insecure mode" - Revert "UBUNTU: SAUCE: UEFI MODSIGN: Import certificates from UEFI Secure Boot" - Revert "UBUNTU: SAUCE: UEFI: efi: Make EFI_SECURE_BOOT_SIG_ENFORCE depend on EFI" - Revert "UBUNTU: SAUCE: UEFI: Add option to automatically enforce module signatures when in Secure Boot mode" - Revert "UBUNTU: [Config] CONFIG_EFI_SECURE_BOOT_SIG_ENFORCE=y" - Revert "UBUNTU: SAUCE: UEFI: x86: Restrict MSR access when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: kexec: Disable at runtime if the kernel enforces module loading restrictions" - Revert "UBUNTU: SAUCE: UEFI: acpi: Ignore acpi_rsdp kernel parameter when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: Restrict /dev/mem and /dev/kmem when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: asus-wmi: Restrict debugfs interface when module loading is restricted" - Revert "UBUNTU: SAUCE: UEFI: ACPI: Limit access to custom_method" - Revert "UBUNTU: SAUCE: UEFI: x86: Lock down IO port access when module security is enabled" - Revert "UBUNTU: SAUCE: UEFI: PCI: Lock down BAR access when module security is enabled" - Revert "UBUNTU: SAUCE: UEFI: Add secure_modules() call" - Revert "x86/efi: Build our own EFI services pointer table" - Revert "efi: Add separate 32-bit/64-bit definitions" * [Hyper-V] storvsc messages for CD-ROM medium not present tray closed (LP: #1590655) - scsi: storvsc: Filter out storvsc messages CD-ROM medium not present * CVE-2016-3841 - ipv6: add complete rcu protection around np->opt -- Kamal Mostafa <ka...@canonical.com> Tue, 16 Aug 2016 10:20:51 -0700 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-8767 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-3841 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1590655 Title: [Hyper-V] storvsc messages for CD-ROM medium not present tray closed Status in linux package in Ubuntu: Fix Released Status in linux source package in Trusty: Fix Released Status in linux source package in Vivid: Won't Fix Status in linux source package in Wily: Won't Fix Status in linux source package in Xenial: Fix Released Status in linux source package in Yakkety: Fix Released Bug description: The below can be seen with any distribution running on a Generation 2 VM. There is a verified patch for this, however it has been scheduled only for the 4.8 scsi-queue. As it a small patch which has been verified by KY and also accepted in the patch queue, will you be able to include this as part of the 16.04 rebase to 4.6, and as well for 14.04 and 15.10? Patch can be found at https://patchwork.kernel.org/patch/9131929/ Description of problem: When starting and shutting down a Gen2 VM, at least 20-30 messages are recorded for storvsc with the below sample: [storvsc] Sense Key : Not Ready [current] [storvsc] Add. Sense: Medium not present - tray closed Steps to Reproduce: 1. create a Generation2 VM 2. start VM and observe the system logs 3. multiple messages for the cd-rom are recorded from storvsc Actual results: even without a CD-ROM unit attached, the messages would appear. Having an ISO attached or not would still produce the same messages. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1590655/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp