I upgraded my Dell 5520 laptop from Zesty to Artful over a month ago
now, and I'm seeing behavior pretty much exactly as described by Max,
starting immediately after the upgrade. I've been stuck either plugging
into my wired ethernet adapter, tethering with my phone, or just living
without connecti
Public bug reported:
Release:17.10
bluetooth:
Installed: (none)
Candidate: 5.46-0ubuntu3
Version table:
5.46-0ubuntu3 500
500 http://bd.archive.ubuntu.com/ubuntu artful/universe amd64 Packages
500 http://bd.archive.ubuntu.com/ubuntu artful/universe i386 Packages
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for pulseaudio (Ubuntu) because there has been no activity for
60 days.]
** Changed in: pulseaudio (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
Good to know, thanks!
We do have some ceph related change from 4.4.0-101 to 4.4.0-103
https://launchpad.net/ubuntu/+source/linux/4.4.0-103.126
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
4.4.0-101 is the one they upgraded from. I'm not seeing 4.4.0.102
anywhere. It's not in the available package list of the machine I'm in
front of right now.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
Hello,
for the "previous kernel", do you mean 4.4.0-102 or 4.4.0-101?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737033
Title:
upgrading linux-image package to 4.4.0-103.126
--- Comment From y...@cn.ibm.com 2017-12-07 20:44 EDT---
(In reply to comment #7)
> The kernel in use (4.4.0.45) is quite outdated and roughly a year old:
> https://launchpad.net/ubuntu/xenial/s390x/linux-generic
> Please check if the problem also exists with latest kernel 4.4
> (like today
Hitting this with 4.13.0-17-generic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1724232
Title:
sysfs: cannot create duplicate filename
'/devices/pci:00/:00:14.0/usb1/1-7/1-7
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019915/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019910/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019914/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019919/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737060
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019911/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737060
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019912/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019920/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019917/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019907/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737060
Ti
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019916/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019913/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019918/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737060
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019908/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1737060/+attachment/5019909/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/17
apport information
** Tags added: apport-collected xenial
** Description changed:
Hello,
I am having issues with my touch pad. The touch pad in general works but it
will not allow me drag windows or highlight items as well as I cannot right
click. My Lenovo Ideapad320 is dual booted wi
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1737060
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
Hello,
I am having issues with my touch pad. The touch pad in general works but it
will not allow me drag windows or highlight items as well as I cannot right
click. My Lenovo Ideapad320 is dual booted with Ubuntu 16.04.3 LTS & I believe
my kernel version is 4.10.0-40-gen
** Also affects: ceph (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737033
Title:
upgrading linux-image package to 4.4.0-103.126 br
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019861/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019866/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019868/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019863/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737033
apport information
** Tags added: apport-collected xenial
** Description changed:
After clients have upgraded to 4.4.0-103.126 they can no longer connect
to the Ceph network.
Using the Grub menu to boot the previous kernel fixes the issue.
The error in dmesg is:
[ 46.811897]
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019862/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019864/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
Please note that while the apport report is from a virtualbox VM, this
is happening across my entire network. All my workstation are having the
same issue, and all are 'fixed' by booting with the previous kernel.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You receive
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019867/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737033
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019865/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1737033/+attachment/5019860/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1737033
Ti
i did a fresh install of ubuntu 17.10 . No , i did not do any system update
.
On Dec 8, 2017 2:30 AM, "Joseph Salisbury"
wrote:
> Did this issue start happening after an update/upgrade? Was there a
> prior kernel version where you were not having this particular problem?
>
> Would it be possibl
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1737033
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
After clients have upgraded to 4.4.0-103.126 they can no longer connect
to the Ceph network.
Using the Grub menu to boot the previous kernel fixes the issue.
The error in dmesg is:
[ 46.811897] FS-Cache: Loaded
[ 46.843670] Key type ceph registered
[ 46.844177] libcep
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.15 kernel[
** Tags added: kernel-da-key
** Tags added: artful bionic
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: Confirmed
** Also affects: linux (Ubuntu Artful)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Artful)
Status: New => Triage
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736947
** No longer affects: linux-mako (Ubuntu Precise)
** No longer affects: linux-lts-quantal (Ubuntu Vivid)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1314762
Title:
CVE-2014-
SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088684.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1694485
Title:
Ubuntu17.04: CAPI: call trace
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification becaus
simpler reproducer for this using LXD instead of Docker:
1. install/setup LXD
$ sudo apt install lxd
$ sudo lxd init
2. create two containers
$ lxc launch ubuntu:xenial server
$ lxc launch ubuntu:xenial client
3. make the client privileged (so it can mount smb/cifs)
$ lxc config set client secur
Confirmed bionic works as expected.
I suspect you can send that upstream with my SoB faster than I can.
Definitely interested in seeing if they'll take something like that.
On Thu, Dec 7, 2017 at 1:21 PM, Joseph Salisbury <
joseph.salisb...@canonical.com> wrote:
> Thanks for testing and the patc
Submitted SRU requests:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088680.html
https://lists.ubuntu.com/archives/kernel-team/2017-December/088682.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-development-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736168
Title:
linux: 4.14.0-11.13 -
The package has been published and the bug is being set to Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification becaus
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workfl
Thanks for testing and the patch, Ryan. I can submit and SRU request.
We should also send this upstream for inclusion in the mainline kernel.
Is that something you think you can do? If not, I can do it for you.
--
You received this bug notification because you are a member of Kernel
Packages,
The Ubuntu mainline kernel build unfortunately currently does not have
apparmor set as the default LSM. This is due to some config changes done
when adding the LSM stacking patches (Ubuntu tries to keep the configs
as close as possible). Addressing this is wip and should land with the
next revision
Tested the xenial update. I had one boot where the links didn't get
created, but I cannot recreate that issue now.
On Thu, Dec 7, 2017 at 9:56 AM, Ryan Harper
wrote:
> Here's the Zesty test; all looks good.
>
> ubuntu@ubuntu:~$ cat /etc/cloud/build.info
> build_name: ser
I built one more test kernel. This one only has commit 4ae2508
reverted.
The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1734327/revert-test
Can you test that kernel and report back if it has the bug or not?
--
You received this bug notification because you are a
** Tags removed: verification-needed-artful
** Tags added: verification-done-artful
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1481347
Title:
Power8 Nest PMU Instrumentation support
> In both of our reproducers, we added "ip route flush table all;
that won't help
> ifconfig down;
that's not a valid cmdline
> sleep 10" before existing from containers.
sleeping without closing existing open sockets doesn't help
what are you using for container mgmt? docker? lxc? lxd?
-
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1728098
Title:
[kernel] tty/hvc: Use opal irqchip inter
SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088677.html
** Description changed:
+
+ == SRU Justification ==
+ The bug reporter was trying to enable IMA appraisal with signatures for
executable
+ files on Xenial. However, when enabling IMA appriasl the sy
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
This bug was fixed in the package linux-meta-aws - 4.4.0.1005.5
---
linux-meta-aws (4.4.0.1005.5) trusty; urgency=medium
* Bump ABI 4.4.0-1005
-- Kamal Mostafa Mon, 04 Dec 2017 12:20:48 -0800
--
You received this bug notification because you are a member of Kernel
Packages, wh
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associ
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associ
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1737005
and then change the status of the bug to 'Confirmed'.
If, due to the nature
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
*** This bug is a duplicate of bug 1736187 ***
https://bugs.launchpad.net/bugs/1736187
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu: 4.4.0-10
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
Hi,
Just to update that I've tried to install and boot mainline kernel 4.14.
Unfortunately boot always fails right after "Dec 08 00:17:39 g2
systemd[1]: dev-disk-
by\x2duuid-e9031178\x2d42d7\x2d46bf\x2db1b2\x2d979dc2b54c08.device: Job
dev-disk-
by\x2duuid-e9031178\x2d42d7\x2d46bf\x2db1b2\x2d979dc
Public bug reported:
With Ubuntu 16.04.3 LTS (Xenial Xerus), and Ubuntu mainline kernel
4.14.3 or 4.14.4 systemd fails allways starting apparmor.service and
ureadahead.service. Sometimes udisks2.service fails too.
$ uname -a
Linux lieselotte 4.14.4-041404-generic #201712050630 SMP Tue Dec 5 12:07
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
You have been subscribed to a public bug:
With Ubuntu 16.04.3 LTS (Xenial Xerus), and Ubuntu mainline kernel
4.14.3 or 4.14.4 systemd fails allways starting apparmor.service and
ureadahead.service. Sometimes udisks2.service fails too.
$ systemctl --failed
UNIT LOAD ACTIVE SUB
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
- ips
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
- ips
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
1 - 100 of 199 matches
Mail list logo