apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278355/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
The attachment no-brightness-bar-before-S3.png shows how the brightness
control panel looks like.
** Attachment added: "no-brightness-bar-before-S3.png"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1401415/+attachment/4278368/+files/no-brightness-bar-before-S3.png
--
You received thi
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278351/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
Public bug reported:
Dell Inspiron 2350 (CID 201305-13669) with Ubuntu 14.04.1
Linux 201305-13669 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:08 UTC
2014 x86_64 x86_64 x86_64 GNU/Linux
VGA compatible controller [0300]: Intel Corporation 4th Gen Core Processor
Integrated Graphics Controller
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278349/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278354/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278352/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278348/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278344/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/14
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278353/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278357/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278345/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278350/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278347/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/14
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278358/+files/WifiSyslog.txt
** Description changed:
Dell Inspiron 2350 (CID 201305-13669) with Ubuntu 14.04.1
Linux 201305-13669 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:5
may related to LP: #1218547
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
Title:
[Dell Inspiron 2350] could not control brightness
Status in linux package in Ubuntu:
New
Bug
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278346/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
Ti
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1401415/+attachment/4278356/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1401415
** No longer affects: unity
** Changed in: unity (Ubuntu)
Status: New => Invalid
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1400845
Title:
linux-armadaxp: 3.2.0-1642.61 -propos
** Description changed:
This bug is for tracking the 2.6.32-70.137 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the 3.2.0-1642.61 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the 3.16.0-28.37 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.13.0-43.72 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
Is this still a problem?
** Changed in: unity
Status: New => Incomplete
** Changed in: unity (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
This bug was fixed in the package linux-ec2 - 2.6.32-374.91
---
linux-ec2 (2.6.32-374.91) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-70.137
* XEN: x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 2.6.32-70.137
---
linux (2.6.32-70.137) lucid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400654
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
This bug was fixed in the package linux-ec2 - 2.6.32-374.91
---
linux-ec2 (2.6.32-374.91) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-70.137
* XEN: x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* Release Tracking Bug
- LP:
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
This bug was fixed in the package linux-ec2 - 2.6.32-374.91
---
linux-ec2 (2.6.32-374.91) lucid; urgency=low
[ Stefan Bader ]
* Rebased to Ubuntu-2.6.32-70.137
* XEN: x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 2.6.32-70.137
---
linux (2.6.32-70.137) lucid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400654
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Incomplete => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kerne
This bug was fixed in the package linux - 2.6.32-70.137
---
linux (2.6.32-70.137) lucid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400654
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
This bug was fixed in the package linux - 2.6.32-70.137
---
linux (2.6.32-70.137) lucid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400654
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
*** This bug is a duplicate of bug 1400382 ***
https://bugs.launchpad.net/bugs/1400382
This bug was fixed in the package linux - 3.16.0-28.37
---
linux (3.16.0-28.37) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400382
[ Upstream Kernel Change
** Changed in: kernel-sru-workflow/promote-to-security
Status: Incomplete => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Incomplete => Fix Released
--
You received this bug
This bug was fixed in the package linux - 3.16.0-28.37
---
linux (3.16.0-28.37) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400382
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux - 3.13.0-43.72
---
linux (3.13.0-43.72) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400408
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/package-testing
This bug was fixed in the package linux - 3.13.0-43.72
---
linux (3.13.0-43.72) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400408
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-lts-utopic -
3.16.0-28.37~14.04.1
---
linux-lts-utopic (3.16.0-28.37~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400561
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and
This bug was fixed in the package linux-lts-utopic -
3.16.0-28.37~14.04.1
---
linux-lts-utopic (3.16.0-28.37~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400561
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
*** This bug is a duplicate of bug 1400408 ***
https://bugs.launchpad.net/bugs/1400408
This bug was fixed in the package linux - 3.13.0-43.72
---
linux (3.13.0-43.72) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400408
[ Upstream Kernel Change
This bug was fixed in the package linux - 3.16.0-28.37
---
linux (3.16.0-28.37) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400382
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux - 3.13.0-43.72
---
linux (3.13.0-43.72) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400408
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux - 3.13.0-43.72
---
linux (3.13.0-43.72) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400408
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux - 3.16.0-28.37
---
linux (3.16.0-28.37) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400382
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux-lts-utopic -
3.16.0-28.37~14.04.1
---
linux-lts-utopic (3.16.0-28.37~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400561
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and
This bug was fixed in the package linux - 3.16.0-28.37
---
linux (3.16.0-28.37) utopic; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400382
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup and rewrite it in C
- LP: #1398795
This bug was fixed in the package linux-lts-trusty -
3.13.0-43.72~precise1
---
linux-lts-trusty (3.13.0-43.72~precise1) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1399807
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup
This bug was fixed in the package linux - 3.2.0-74.109
---
linux (3.2.0-74.109) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400709
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-armadaxp - 3.2.0-1642.61
---
linux-armadaxp (3.2.0-1642.61) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1400845
* Rebase to Ubuntu-3.2.0-74.109
[ Ubuntu: 3.2.0-74.109 ]
* Release Tracking Bug
- LP: #1400
This bug was fixed in the package linux - 3.2.0-74.109
---
linux (3.2.0-74.109) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400709
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
This bug was fixed in the package linux-armadaxp - 3.2.0-1642.61
---
linux-armadaxp (3.2.0-1642.61) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1400845
* Rebase to Ubuntu-3.2.0-74.109
[ Ubuntu: 3.2.0-74.109 ]
* Release Tracking Bug
- LP: #1400
** Description changed:
This bug is for tracking the 3.2.0-74.109 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
This bug was fixed in the package linux-lts-trusty -
3.13.0-43.72~precise1
---
linux-lts-trusty (3.13.0-43.72~precise1) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1399807
[ Upstream Kernel Changes ]
* x86_64, traps: Fix the espfix64 #DF fixup
This bug was fixed in the package linux - 3.2.0-74.109
---
linux (3.2.0-74.109) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400709
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
This bug was fixed in the package linux - 3.2.0-74.109
---
linux (3.2.0-74.109) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1400709
[ Upstream Kernel Changes ]
* x86_64, traps: Stop using IST for #SS
- LP: #1398795
- CVE-2014-9090
* x
This bug was fixed in the package linux-armadaxp - 3.2.0-1642.61
---
linux-armadaxp (3.2.0-1642.61) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1400845
* Rebase to Ubuntu-3.2.0-74.109
[ Ubuntu: 3.2.0-74.109 ]
* Release Tracking Bug
- LP: #1400
Wolf Rogner, thank you for reporting this bug to Ubuntu. Maverick reached EOL
on April 10, 2012.
See this document for currently supported Ubuntu releases:
https://wiki.ubuntu.com/Releases
Is this reproducible in a supported release? If so, please execute the
following command, as it will autom
Clément Léger, thank you for reporting this bug to Ubuntu. Intrepid reached EOL
on April 30, 2010.
See this document for currently supported Ubuntu releases:
https://wiki.ubuntu.com/Releases
Is this still and issue in a supported release? If so, could you please execute
the following command, a
Nico, thank you for reporting this bug to Ubuntu. Hardy Desktop reached EOL on
May 12, 2011.
See this document for currently supported Ubuntu releases:
https://wiki.ubuntu.com/Releases
Is this an issue in a supported release? If so, could you please execute the
following command, as it will aut
You have been subscribed to a public bug:
After unmounting my Western Digital portable harddrive, the drive
continues to spin for 10 minutes, even if no data was written to the
drive, resulting in an awful "unsafe removal" noise when it is
unplugged. It seems like the hard drive heads aren't synci
You have been subscribed to a public bug:
Try to dismount a USB external Western digital passport harddrive , it
will be ok but the cylinders will be still rotating , then if you unplug
your hardrrive it'll do a strange noise like a violent hard drive
parking. ( in Microsoft windows the eject the
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.2.0-74.109 upload package. This bug will
contain status and test
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.2.0-1642.61 upload package. This bug will
contain status and tes
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.13.0-43.72 upload package. This bug will
contain status and test
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags added: q
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags added: q
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.16.0-28.37 upload package. This bug will
contain status and test
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Fix Released
** Tags added: q
The following packages ended up in the wrong component in the -proposed
pocket:
linux-backports-modules-alsa-lucid-preempt 2.6.32.70.77 - is in universe
instead of main
linux-backports-modules-headers-lucid-preempt 2.6.32.70.77 - is in universe
instead of main
linux-backports-modules-input-lucid
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workf
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workf
** Changed in: kernel-sru-workflow/verification-testing
Status: New => In Progress
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workf
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1398795
Title:
CVE-2014-9090
Status in linux package in Ubuntu:
Fix
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1400314
Title:
CVE-2014-8134
Status in linux package in Ubuntu:
New
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1400408
Title:
linux: 3.13.0-43.72 -proposed tracker
Status in Kernel SRU Workf
** Changed in: linux-ti-omap4 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1400844
Title:
linux-ti-omap4: -proposed tracker
Status in
** Description changed:
This bug is for tracking the 3.13.0-43.72 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 2.6.32-70.137 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the 3.16.0-28.37 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.2.0-74.109 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
The errors reported in the method test (ex. method: Detected error 'No
return value' when evaluating '\_SB_.PCI0.XHC_.RHUB.HS10._PLD') requires
acpidump file for further analysis.
However, _PLD is used to report "Physical Location of Device" of USB
ports, and it is optional. Failing to evaluate it
klog: HIGH Kernel message: [ 1.880660] [Firmware Bug]: battery:
(dis)charge rate invalid.
The above klog error is quite common when BIOS does not implement ACPI
spec correctly. Please refer to the below analysis copied from previous
analysis:
The below high failure is the result of BIOS reporting
klog: HIGH Kernel message: [ 0.00] ACPI Error: Gpe0Block - 32-bit
FADT register is too long (32 bytes, 256 bits) to convert to GAS struct
- 255 bits max, truncating (20131115/tbfadt-202)
The above klog message will be fixed in new kernel and the severity will
be lower in new version of fwts.
On 12/10/2014 06:47 PM, Christopher M. Penalver wrote:
> James Cobban, 3.18-rc6 is not 3.18.
>
I was explicitly told to try out 3.18-rc6. Prior to that I was told to
try 3.18-rc5, and before that to try 3.16 which I did by migrating to
14.10, which I did not want to do because it is not an LTS r
Copied to -proposed and signed built.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received
Copied to -proposed and signed built.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received
** Changed in: kernel-sru-workflow
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1400845
Title:
linux-armadaxp: 3.2.0-1642.61 -proposed
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1398795
Title:
CVE-2014-9090
Status in linux package in Ubuntu:
F
Copied to -proposed.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
--
You received this bug notifica
1 - 100 of 328 matches
Mail list logo