Troy, the Realtek engineer, found a locking problem today that may be
the cause. Pull a new copy from GitHub.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239578
Title:
No wireless su
With 3.17-rc6, the VM recognises the video device again, but guvcview
segfaults.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1362358
Title:
uvcvideo doesn't work with USB webcam with
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1362967
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
Hibernate issue is very hardware specific. Could you provide more
information to this bug by running 'apport-collect 1362967' ?
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is
ping itself shows up no packet loss ...
64 bytes from 192.168.2.11: icmp_seq=51761 ttl=64 time=0.344 ms
64 bytes from 192.168.2.11: icmp_seq=51762 ttl=64 time=0.269 ms
64 bytes from 192.168.2.11: icmp_seq=51763 ttl=64 time=0.269 ms
64 bytes from 192.168.2.11: icmp_seq=51764 ttl=64 time=0.270 ms
^C
Additional information:
An overnight ping test to both interfaces (with dedicated ip's and
network) whows up a light packet loss.
root@cpsvs3:~ # ifconfig
eth0 Link encap:Ethernet Hardware Adresse 90:1b:0e:31:32:72
inet Adresse:172.22.1.81 Bcast:172.22.1.255 Maske:255.255.255.
New informations, see below
** Package changed: linux (Ubuntu) => autofs (Ubuntu)
** Changed in: autofs (Ubuntu)
Status: Confirmed => New
** Summary changed:
- Reboot hangs with Dell computers on 64 bits
+ Reboot hangs when two mounts with autofs
--
You received this bug notification b
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1372684
Title:
linux-armadaxp: 3.2.0-16
3.12 final: clean
3.12.14: clean
3.12.21: clean
3.12.25: clean
...
3.13.0-031300rc1-generic: bug
3.13.0-031300rc2-generic: bug
3.13.0-031300rc3-generic: bug
3.13.0-031300rc5-generic: bug
3.13.0-031300rc6-generic: bug
3.13 final: bug
--
You received this bug notification because you are a member o
+1, same issues. Experiencing freezes as well with the latest firmware.
Must REISUB.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1239578
Title:
No wireless support for Realtek RTL8192
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372749
Title:
[Dell Inc. XPS M1530] suspend/
I exactly face the same problem as @Clive Cox in #181. Following is what
I am using
Machine: Lenovo L440
OS: Ubuntu 14.04 LTS
OS type: 64bit
Kernel Version: 3.13.0-35-generic
Drivers: rtlwifi_linux_mac80211_0019.0320.2014V62
Most of the times it works and connects properly but periodically it
fai
** Tags added: 201202-10546
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1199217
Title:
Dell laptops' ST Microelectronics Free Fall Sensor (accelerometer)
[pnp:8810] cannot be detect
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372749
Title:
[Dell Inc. XPS M1530] suspend/resume failure
Status in “linux” package in Ubuntu:
N
Public bug reported:
two error reports is poped up during startup
ProblemType: KernelOops
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-17-generic 3.16.0-17.23
ProcVersionSignature: Ubuntu 3.16.0-17.23-generic 3.16.3
Uname: Linux 3.16.0-17-generic i686
Annotation: This occured during a
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Hardware Enablement ARM Kernel
(canonical-hwe-arm-kernel) => Ike Panhc (ikepanhc)
** Changed in: kernel-sru-workflow/verification-testing
Assignee: Canonical Hardware Enablement ARM Kernel
(canonical-hwe-arm-ke
** Description changed:
This bug is for tracking the 3.2.0-1639.56 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
All builds are complete, packages in this bug can be copied to
-proposed.
Derivative packages from packages here can be worked on, the following tracking
bugs were opened for them:
linux-keystone - bug 1372746
Backport packages from packages here can be worked on, the following tracking
bugs we
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Hardware Enablement ARM Kernel
(canonical-hwe-arm-kernel) => Ike Panhc (ikepanhc)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https:
** Changed in: kernel-sru-workflow
Assignee: (unassigned) => Ike Panhc (ikepanhc)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1372684
Title:
linux-armadaxp: 3.2.0-1639.5
** Changed in: hwe-next/trusty
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1361086
Title:
No card reader support for Realtek RTL8402 [ff00
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372740
Title:
Bug #1245226
Status in “linux
** Summary changed:
- linux-armadaxp: -proposed tracker
+ linux-armadaxp: 3.2.0-1639.56 -proposed tracker
** Description changed:
- This bug is for tracking the upload package. This
- bug will contain status and testing results related to that upload.
+ This bug is for tracking the 3.2.0-1639.
Guys, could you please reopen this issue?
I have a Dell notebook Latitude E6440 and it have exactly same issue (fast
audio playback).
I tried to add a bug report but looks it created a new one under Bug#1372740.
--
You received this bug notification because you are a member of Kernel
Packages, w
Public bug reported:
I have a notebook Dell Latitude 6446 and have same problem as described on Bug
#1245226 which the audio playback is too fast.
I'm sending a bug report. Hope it could help you guys to figure it out.
Thanks
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.1
This bug was fixed in the package linux-flo - 3.4.0-3.15
---
linux-flo (3.4.0-3.15) utopic; urgency=low
[ John Johansen ]
* SAUCE: (no-up) apparmor: Sync to apparmor3 - RC1 snapshot
- LP: #1362199
[ Tim Gardner ]
* Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3 - a
This bug was fixed in the package linux-mako - 3.4.0-5.34
---
linux-mako (3.4.0-5.34) utopic; urgency=low
[ John Johansen ]
* SAUCE: (no-up) apparmor: Sync to apparmor3 - RC1 snapshot
- LP: #1362199
[ Tyler Hicks ]
* Revert "SAUCE: (no-up) apparmor: fix disconnected bin
This bug was fixed in the package linux-manta - 3.4.0-6.29
---
linux-manta (3.4.0-6.29) utopic; urgency=low
[ John Johansen ]
* SAUCE: (no-up) apparmor: Sync to apparmor3 - RC1 snapshot
- LP: #1362199
[ Tim Gardner ]
* Revert "SAUCE: (no-up) apparmor: Sync to apparmor 3
This bug was fixed in the package linux-goldfish - 3.4.0-4.23
---
linux-goldfish (3.4.0-4.23) utopic; urgency=low
[ Andy Whitcroft ]
* SAUCE: ensure that if the first firmware is top level the firmware
directory is made.
Fixes FTBS
-- Tim GardnerMon, 22 Sep 2014 11:5
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-1638.55 upload package. This bug will
contain status and testing results related t
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: New => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Assignee: Canonical Kernel Team (canonical-kernel-team) => Joseph
Salisbury (jsalisbury)
--
You received this bug notification because you
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 2.6.32-66.132 upload package. This bug will
contain status and testing results related t
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-69.103 upload package. This bug will
contain status and testing results related to
** Changed in: linux (Ubuntu)
Assignee: TienFu Chen (ctf) => (unassigned)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1086724
Title:
system crashed with firmware bug error
Statu
Sunil V S, just to clarify, I'm inquiring about a live environment, not
during or after an install.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1344500
Title:
[Samsung NP305E5Z-S01IN]
Hi Brad, my Ubuntu Utopic net installation failed in the middle of the
installation process, and due to the fact that linux-generic
installation failed, I can't even boot into the installed system.
So I am unable to run the above command, and will change the bug status
to 'Confirmed' instead.
**
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-development-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.16.0-17.23 upload package. This bug will
contain status and testing results re
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.13.0-36.63 upload package. This bug will
contain status and testing results related to
Though the required logs is missing, there *IS* a screenshot of the log
posted at http://imagebin.ca/v/1bEECBkFkbnp
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372557
Title:
Ubuntu U
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1283101
Title:
CVE-2014-0069: CIFS -- add hardening patch
Status in
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328088
Title:
Kernel network namespace performance regression during rcu dev
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1349804
Title:
CVE-2014-5077
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359514
Title:
pci-xgene-msi: fixed deadlock in irq_set_affinity
Status in “
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1359489
Title:
Fix the csr-mask for APM X-Gene SoC AHCI SATA PHY clock DTS no
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1362447
Title:
CVE-2014-5471
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1362443
Title:
CVE-2014-3601
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1361086
Title:
No card reader support for Realtek RTL8402 [ff00:5286]
Status
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1362448
Title:
CVE-2014-5472
Status in “linux” package in Ubuntu:
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1365052
Title:
linux: 3.13.0-36.63 -proposed tracker
Status in Kernel SRU Wo
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
All builds are complete, packages in this bug can be copied to
-proposed.
Derivative packages from packages here can be worked on, the following tracking
bugs were opened for them:
linux-ti-omap4 - bug 1372683
linux-armadaxp - bug 1372684
linux-lowlatency - bug 1372685
** Changed in: kernel-sru-
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Mond
** Description changed:
This bug is for tracking the 2.6.32-66.132 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
This tracking bug was opened to be worked from linux-3.2.0-70.104 update
(bug 1372522)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1372683
Title:
linux-ti-omap4: -proposed t
This bug was fixed in the package linux - 2.6.32-66.132
---
linux (2.6.32-66.132) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364092
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP: #1362447
** Description changed:
This bug is for tracking the 3.2.0-1638.55 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
This bug was fixed in the package linux - 2.6.32-66.132
---
linux (2.6.32-66.132) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364092
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP: #1362447
This bug was fixed in the package linux - 2.6.32-66.132
---
linux (2.6.32-66.132) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364092
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP: #1362447
This bug was fixed in the package linux-ec2 - 2.6.32-370.86
---
linux-ec2 (2.6.32-370.86) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364189
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP:
** Changed in: kernel-sru-workflow/prepare-package-lbm
Status: New => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-lbm
Assignee: Canonical Kernel Team (canonical-kernel-team) => Joseph
Salisbury (jsalisbury)
--
You received this bug notification because you are a
This bug was fixed in the package linux-ec2 - 2.6.32-370.86
---
linux-ec2 (2.6.32-370.86) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364189
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP:
This tracking bug was opened to be worked from linux-3.2.0-70.104 update
(bug 1372522)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1372684
Title:
linux-armadaxp: -proposed t
This bug was fixed in the package linux - 2.6.32-66.132
---
linux (2.6.32-66.132) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364092
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP: #1362447
** Description changed:
This bug is for tracking the 3.2.0-69.103 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-package-start:Mond
This bug was fixed in the package linux-ec2 - 2.6.32-370.86
---
linux-ec2 (2.6.32-370.86) lucid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364189
[ Upstream Kernel Changes ]
* isofs: Fix unbounded recursion when processing relocated directories
- LP:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1453.73
---
linux-ti-omap4 (3.2.0-1453.73) precise; urgency=low
* Release Tracking Bug
- LP: #1364290
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-armadaxp - 3.2.0-1638.55
---
linux-armadaxp (3.2.0-1638.55) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1364291
* Rebase to Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP: #1364
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1453.73
---
linux-ti-omap4 (3.2.0-1453.73) precise; urgency=low
* Release Tracking Bug
- LP: #1364290
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1453.73
---
linux-ti-omap4 (3.2.0-1453.73) precise; urgency=low
* Release Tracking Bug
- LP: #1364290
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-armadaxp - 3.2.0-1638.55
---
linux-armadaxp (3.2.0-1638.55) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1364291
* Rebase to Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP: #1364
This bug was fixed in the package linux - 3.2.0-69.103
---
linux (3.2.0-69.103) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364208
[ Upstream Kernel Changes ]
* kvm: iommu: fix the third parameter of kvm_iommu_put_pages
(CVE-2014-3601)
- LP
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1453.73
---
linux-ti-omap4 (3.2.0-1453.73) precise; urgency=low
* Release Tracking Bug
- LP: #1364290
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.2.0-69.103
---
linux (3.2.0-69.103) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364208
[ Upstream Kernel Changes ]
* kvm: iommu: fix the third parameter of kvm_iommu_put_pages
(CVE-2014-3601)
- LP
This bug was fixed in the package linux - 3.2.0-69.103
---
linux (3.2.0-69.103) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364208
[ Upstream Kernel Changes ]
* kvm: iommu: fix the third parameter of kvm_iommu_put_pages
(CVE-2014-3601)
- LP
This bug was fixed in the package linux - 3.2.0-69.103
---
linux (3.2.0-69.103) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364208
[ Upstream Kernel Changes ]
* kvm: iommu: fix the third parameter of kvm_iommu_put_pages
(CVE-2014-3601)
- LP
This bug was fixed in the package linux-armadaxp - 3.2.0-1638.55
---
linux-armadaxp (3.2.0-1638.55) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1364291
* Rebase to Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP: #1364
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1453.73
---
linux-ti-omap4 (3.2.0-1453.73) precise; urgency=low
* Release Tracking Bug
- LP: #1364290
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-armadaxp - 3.2.0-1638.55
---
linux-armadaxp (3.2.0-1638.55) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1364291
* Rebase to Ubuntu-3.2.0-69.103
[ Ubuntu: 3.2.0-69.103 ]
* Release Tracking Bug
- LP: #1364
** Description changed:
This bug is for tracking the 3.13.0-36.63 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
This bug was fixed in the package linux - 3.2.0-69.103
---
linux (3.2.0-69.103) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1364208
[ Upstream Kernel Changes ]
* kvm: iommu: fix the third parameter of kvm_iommu_put_pages
(CVE-2014-3601)
- LP
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1372671
Title:
WiFi Intel Centrino Wireless-N
** Changed in: kernel-development-workflow/package-testing
Status: Confirmed => Won't Fix
** Description changed:
This bug is for tracking the 3.16.0-17.23 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
This bug was fixed in the package linux - 3.13.0-36.63
---
linux (3.13.0-36.63) trusty; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1365052
[ Feng Kan ]
* SAUCE: (no-up) irqchip:gic: change access of gicc_ctrl register to read
modify write.
-
1 - 100 of 246 matches
Mail list logo