** Also affects: linux via
https://bugs.freedesktop.org/show_bug.cgi?id=93782
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1685442
Title:
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142717/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142716/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142713/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772575
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142711/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142714/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772575
apport information
** Attachment added: "HookError_generic.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142712/+files/HookError_generic.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.lau
apport information
** Description changed:
This is a hardware specific issue with Ubuntu 18.04 and kernel
4.15.0-20-generic. The driver for the Intel AC 9560 wireless chip causes
the problem. Driver location:
https://www.intel.com/content/www/us/en/support/articles/05511
/network-an
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142715/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
The latest upstream 4.15.18 kernel solves stability. I can now finish
downloads with git fetch. But download speed still is very slow.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1772467
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1772575/+attachment/5142719/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages,
apport information
** Tags added: apport-collected xenial
** Description changed:
Release 16.04, kernel 4.4.0-124-generic
There's an issue in kernel's NBD module which prevents some larger images to
be
correctly "connected" , largely described here:
https://github.com/NetworkBlockDev
--- Comment From pavsu...@in.ibm.com 2018-05-22 01:57 EDT---
I have installed the Bionic test kernel with the patches provided on the
machine.
root@ltc-wspoon11:~# uname -a
Linux ltc-wspoon11 4.15.0-20-generic #22~lp1771780 SMP Mon May 21 17:43:29 UTC
2018 ppc64le ppc64le ppc64le GNU/Lin
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1772575
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
Release 16.04, kernel 4.4.0-124-generic
There's an issue in kernel's NBD module which prevents some larger images to be
correctly "connected" , largely described here:
https://github.com/NetworkBlockDevice/nbd/issues/44
There is a small patch here that was accepted into main
I finally managed to have a working 4.16.10 kernel (touchpad, gesture,
buttons, sdcard, sound, etc...).
I reverted this patch 0759e80b84e34a84e7e46e2b1adb528c83d84a47 (applied
cleanly) and applied manually 0cc2b4e5a020fc7f4d1795741c116c983e9467d7.
I'll attach a full diff later.
So that's the proo
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1772573
Title:
package linux-image-4.15.0-20-generic 4.15.0-20.21 failed to
install/upgrade:
Public bug reported:
Upgrade to newer kernel failed via command line, I used Synaptic and
there were 2 broken packages according to it. I removed/unmarked all
but the current kernel "linux-image" files and that seems to have
resolved the broken packages. I'm submitting this BEFORE I reboot just
i
[Expired for bluez (Ubuntu) because there has been no activity for 60
days.]
** Changed in: bluez (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bu
--- Comment From kamale...@in.ibm.com 2018-05-22 00:13 EDT---
(In reply to comment #5)
> I built a test kernel with commit df78d3f6148092d33a9a24c7a9cfac3d0220b484.
> The test kernel can be downloaded from:
> http://kernel.ubuntu.com/~jsalisbury/lp1771844
>
> Can you test this kernel and se
Hi Colin,
did you successfully have this issue reproduced on your side?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1751213
Title:
kernel security test report that the lttng_probe_wri
** Changed in: oem-priority
Status: New => Confirmed
** Changed in: oem-priority
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1762385
Title:
*** This bug is a duplicate of bug 1751213 ***
https://bugs.launchpad.net/bugs/1751213
** This bug has been marked a duplicate of bug 1751213
kernel security test report that the lttng_probe_writeback module is tainted
on Bionic s390x
--
You received this bug notification because you are
*** This bug is a duplicate of bug 1751243 ***
https://bugs.launchpad.net/bugs/1751243
** This bug has been marked a duplicate of bug 1751243
ubuntu_unionmount_overlayfs_suite failed with Bionic kernel
--
You received this bug notification because you are a member of Kernel
Packages, whic
*** This bug is a duplicate of bug 1711299 ***
https://bugs.launchpad.net/bugs/1711299
** This bug has been marked a duplicate of bug 1711299
ubuntu_bpf test failed to build on s390x system
--
You received this bug notification because you are a member of Kernel
Packages, which is subscri
*** This bug is a duplicate of bug 1689240 ***
https://bugs.launchpad.net/bugs/1689240
** This bug has been marked a duplicate of bug 1689240
scrashme failed to build on s390x
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
** Summary changed:
- scrashme failed to build on LPAR Ubuntu
+ scrashme failed to build on s390x
** Tags added: artful boinic xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/168924
*** This bug is a duplicate of bug 1753941 ***
https://bugs.launchpad.net/bugs/1753941
** This bug has been marked a duplicate of bug 1753941
ubuntu_bpf_jit test failed on Bionic s390x systems
--
You received this bug notification because you are a member of Kernel
Packages, which is subs
** Tags added: artful bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1768435
Title:
aio-dio-extend-stat test in aio_dio_bugs failed on s390x
Status in linux package in Ubuntu:
** Tags added: bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1768430
Title:
aio-dio-subblock-eof-read test in aio_dio_bugs failed on s390x
Status in linux package in Ubuntu:
T
** Tags added: bionix
** Tags removed: bionix
** Tags added: bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1730895
Title:
aio-dio-invalidate-failure test failed with event res -
*** This bug is a duplicate of bug 1768430 ***
https://bugs.launchpad.net/bugs/1768430
Duplicate of
bug 1730895
bug 1768430
bug 1768435
** This bug has been marked a duplicate of bug 1730895
aio-dio-invalidate-failure test failed with event res -22 on s390x
** This bug is no longer a dup
** Tags added: s390x
** Summary changed:
- Unable to build libghugetlbfs test on 4.15 Bionic
+ Unable to build libhugetlbfs test on 4.15 Bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-kvm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/17652
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Ubuntu Kernel Team (ubuntu-kernel-team)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1765279
Title:
Unable to build libhuge
*** This bug is a duplicate of bug 1765279 ***
https://bugs.launchpad.net/bugs/1765279
** This bug has been marked a duplicate of bug 1765279
Unable to build libghugetlbfs test on 4.15 Bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subsc
** Description changed:
Description:
A dax mounted filesystem redirects the read/write system calls through the
dax paths as an optimization, but the dax path is unable to clear media errors.
With per inode fs-dax, userspace can turn off dax using an ioctl, and clear
errors using writes. W
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1758255
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1758255
Title:
lxc-tests package is not available in Bionic
St
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Ubuntu Kernel Team (ubuntu-kernel-team)
** Tags added: bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1758255
Title:
*** This bug is a duplicate of bug 1758255 ***
https://bugs.launchpad.net/bugs/1758255
** This bug has been marked a duplicate of bug 1758255
lxc-tests package is not available in Bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
Hi, we still encounter this error in the latest 4.4.0 kernel. Our kernel
version is
```
$ uname -r
4.4.0-122
$ dpkg -l|grep linux-image-4.4.0-122-generic
ii linux-image-4.4.0-122-generic 4.4.0-122.146
amd64Linux kernel image for version 4.4.0 on 64 bit
** Tags removed: kernel-bug-exists-upstream-4.17-rc4 needs-filing-upstream
** Tags added: kernel-bug-exists-upstream-4.17-rc6
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1087010
Title:
** Attachment added: "grep-thermal.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1769236/+attachment/5142653/+files/grep-thermal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
I will attach acpi.out, and also the output of "grep -r .
/sys/class/thermal/*" in grep-thermal.txt.
As for editing /var/run/thermald/thermal-conf.xml.auto ... that file is
regenerated at boot. How do I make persistent changes? I tried copying
the edited file to /etc/thermald/thermal-conf.xml, b
I tracked it down to https://patchwork.kernel.org/patch/10027157/ just
before 4.15-rc1. This appears to affect all DL360/DL380 Gen9 I've
encountered so far. Opened
https://bugzilla.kernel.org/show_bug.cgi?id=199779 and currently working
with Sinan Kaya to disagnose.
** Tags added: kernel-bug-exi
This bug was fixed in the package linux-oem - 4.13.0-1028.31
---
linux-oem (4.13.0-1028.31) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_charac
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux-oem - 4.15.0-1006.9
---
linux-oem (4.15.0-1006.9) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
[
This bug was fixed in the package linux-oem - 4.15.0-1006.9
---
linux-oem (4.15.0-1006.9) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
[
This bug was fixed in the package linux-azure - 4.13.0-1018.21
---
linux-azure (4.13.0-1018.21) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_ch
This bug was fixed in the package linux - 3.13.0-149.199
---
linux (3.13.0-149.199) trusty; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstr
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux-kvm - 4.15.0-1010.10
---
linux-kvm (4.15.0-1010.10) bionic; urgency=medium
[ Ubuntu: 4.15.0-22.24 ]
* CVE-2018-3639 (powerpc)
- powerpc/64s: Add support for a store forwarding barrier at kernel
entry/exit
- stf-barrier: set eieio i
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux-oem - 4.15.0-1006.9
---
linux-oem (4.15.0-1006.9) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
[
This bug was fixed in the package linux-kvm - 4.15.0-1010.10
---
linux-kvm (4.15.0-1010.10) bionic; urgency=medium
[ Ubuntu: 4.15.0-22.24 ]
* CVE-2018-3639 (powerpc)
- powerpc/64s: Add support for a store forwarding barrier at kernel
entry/exit
- stf-barrier: set eieio i
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux-azure - 4.13.0-1018.21
---
linux-azure (4.13.0-1018.21) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_ch
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 3.13.0-149.199
---
linux (3.13.0-149.199) trusty; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstr
This bug was fixed in the package linux - 4.15.0-22.24
---
linux (4.15.0-22.24) bionic; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/64s: Add support for a store forwarding barrier at kernel
entry/exit
- stf-barrier: set eieio instruction bit 6 for future optimisation
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux-oem - 4.15.0-1006.9
---
linux-oem (4.15.0-1006.9) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
[
This bug was fixed in the package linux-oem - 4.13.0-1028.31
---
linux-oem (4.13.0-1028.31) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_charac
This bug was fixed in the package linux-oem - 4.13.0-1028.31
---
linux-oem (4.13.0-1028.31) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_charac
This bug was fixed in the package linux-azure-edge -
4.15.0-1012.12~16.04.2
---
linux-azure-edge (4.15.0-1012.12~16.04.2) xenial; urgency=medium
* linux-azure-edge headers are broken after change to support scripted
rebases (LP: #1772058)
- [Packaging]: azure-edge: Fix heade
This bug was fixed in the package linux-azure-edge -
4.15.0-1012.12~16.04.2
---
linux-azure-edge (4.15.0-1012.12~16.04.2) xenial; urgency=medium
* linux-azure-edge headers are broken after change to support scripted
rebases (LP: #1772058)
- [Packaging]: azure-edge: Fix heade
This bug was fixed in the package linux-oem - 4.13.0-1028.31
---
linux-oem (4.13.0-1028.31) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_charac
This bug was fixed in the package linux-azure - 4.15.0-1012.12
---
linux-azure (4.15.0-1012.12) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Add versioned dependency for linux-base
[ Ubuntu: 4.
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux-azure - 4.13.0-1018.21
---
linux-azure (4.13.0-1018.21) xenial; urgency=medium
[ Ubuntu: 4.13.0-43.48 ]
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_ch
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux-oem - 4.15.0-1006.9
---
linux-oem (4.15.0-1006.9) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Depends on linux-base that provides the necessary tools
[
This bug was fixed in the package linux - 4.13.0-43.48
---
linux (4.13.0-43.48) artful; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstream
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux - 3.13.0-149.199
---
linux (3.13.0-149.199) trusty; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstr
This bug was fixed before the affected kernel was released and,
therefore, it never affected a publicly released kernel.
** Changed in: linux (Ubuntu)
Status: Triaged => Fix Released
** Information type changed from Private Security to Public Security
--
You received this bug notificatio
This bug was fixed in the package linux - 3.13.0-149.199
---
linux (3.13.0-149.199) trusty; urgency=medium
* CVE-2018-3639 (powerpc)
- SAUCE: rfi-flush: update H_CPU_* macro names to upstream
- SAUCE: rfi-flush: update plpar_get_cpu_characteristics() signature to
upstr
This bug was fixed before the affected kernel was released and,
therefore, it never affected a publicly released kernel.
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
** Information type changed from Private Security to Public Security
--
You received this bug notificat
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
This bug was fixed in the package linux-meta-oem - 4.13.0.1028.33
---
linux-meta-oem (4.13.0.1028.33) xenial; urgency=medium
* Bump ABI 4.13.0-1028
linux-meta-oem (4.13.0.1027.32) xenial; urgency=medium
* need to ensure microcode updates are available to all bare-metal installs
This bug was fixed in the package linux-meta-oem - 4.15.0.1006.8
---
linux-meta-oem (4.15.0.1006.8) bionic; urgency=medium
* Bump ABI 4.15.0-1006
linux-meta-oem (4.15.0.1005.7) bionic; urgency=medium
* need to ensure microcode updates are available to all bare-metal installs of
This bug was fixed in the package linux-azure - 4.15.0-1012.12
---
linux-azure (4.15.0-1012.12) bionic; urgency=medium
* linux-image-4.15.0-20-generic install after upgrade from xenial breaks
(LP: #1767133)
- Packaging: Add versioned dependency for linux-base
[ Ubuntu: 4.
This bug was fixed in the package linux - 4.4.0-127.153
---
linux (4.4.0-127.153) xenial; urgency=medium
* CVE-2018-3639 (powerpc)
- powerpc/pseries: Support firmware disable of RFI flush
- powerpc/powernv: Support firmware disable of RFI flush
- powerpc/rfi-flush: Move
1 - 100 of 296 matches
Mail list logo