linux-oem-osp1 I mean
** Changed in: linux-oem-osp1 (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1831828
Title:
[SRU][B/B-OEM/C
linux-oem-osp1 has backports in bionic-proposed
** Changed in: linux-oem-osp1 (Ubuntu Bionic)
Status: New => Fix Committed
** Tags added: verification-needed-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
linux-oem-osp1 has this now in bionic-proposed, please test
** Tags added: verification-needed-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1809224
Title:
To support Intel Wire
this is added to linux-oem-osp1 in bionic-proposed, please test
** Tags added: verification-needed-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1826868
Title:
Sound device
this is in bionic-proposed, please test
** Tags added: verification-needed-bionic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1831828
Title:
[SRU][B/B-OEM/C/D/OEM-OSP1] Add RTL88
** Description changed:
+ SRU Justification:
+ ==
+
+ [Impact]
+
+ * 'zkey validate' shows wrong information about master key registers
+
+ * this might lead to unsuccessful usage of pkeys, although the master
+ key and the derived keys are correct
+
+ [Fix]
+
+ * ebb7c695d3bc
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see
Please remove "acpi_osi=".
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832685
Title:
ACPI BIOS Error (bug)
Status in linux package in Ubuntu:
Incomplete
Bug description:
Ubuntu
e.g. checkbox https://bugs.launchpad.net/plainbox-provider-
checkbox/+bug/1830146
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832239
Title:
cosmic kernel (and above) provides two /de
Ok, then a kernel bisection is required. What's the latest kernel that
works and the first kernel that has this issue?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1833018
Title:
After
[Expired for linux-signed (Ubuntu) because there has been no activity
for 60 days.]
** Changed in: linux-signed (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://
** Changed in: ubuntu-z-systems
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832624
Title:
[UBUNTU] kernel: Fix wrong dispatching for control dom
[Expired for lightdm (Ubuntu) because there has been no activity for 60
days.]
** Changed in: lightdm (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
These 4 patches didn't apply cleanly and needed manual merging. Nothing
too hairy though:
synchronize sync(2) against cgroup writeback membership switches
KVM: x86: Skip EFER vs. guest CPUID checks for host-initiated writes
arm64: cpu_ops: fix a leaked reference by adding missing of_node_put
cr
The following patches were NOT applied since they were applied
previously:
tools include: Adopt linux/bits.h
net: create skb_gso_validate_mac_len()
bnx2x: disable GSO where gso_size is too big for hardware
--
You received this bug notification because you are a member of Kernel
Packages, which i
Applied patches:
* x86/speculation/mds: Revert CPU buffer clear on double fault exit
* x86/speculation/mds: Improve CPU buffer clear documentation
* ARM: exynos: Fix a leaked reference by adding missing of_node_put
* crypto: vmx - fix copy-paste error in CTR mode
* crypto: crct10dif-generic - fix
Please test latest mainline kernel:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.2-rc5/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832472
Title:
cdc_ncm floods syslog unneccess
Hmm, please attach dmesg under Linux 5.2.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832087
Title:
Bluetooth not work on INTEL WIRELESS-AC 9260
Status in linux package in Ubuntu:
On 6/17/19 8:50 PM, Kai-Heng Feng wrote:
> This is a quite good reference on how you do it:
> https://askubuntu.com/questions/19486/how-do-i-add-a-kernel-boot-parameter
>
Okay, that information was helpful.
I'm quite sure I did it right this time. I assume the text I add (after
a space at the en
Please attach `journalctl -b -1 -k` to collect last kernel message.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832715
Title:
Black screen after reopening lid.
Status in linux packa
This is a quite good reference on how you do it:
https://askubuntu.com/questions/19486/how-do-i-add-a-kernel-boot-parameter
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1833018
Title:
Can you list some affected apps?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832239
Title:
cosmic kernel (and above) provides two /dev/videoX device but there
should be only one vi
** Changed in: linux (Ubuntu Cosmic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu Bionic)
Assignee: (unassigned) => dann frazier (dannf)
** Changed in: linux (Ubuntu Cosmic)
Assignee: (unassigned)
Alec, any updates here? Did you get any chance to bisect the results?
Priority is updated as the issue isn't in drmtip.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1751268
Title:
bion
Bisecting is a manual process, since it's some option (or combination
thereof) enabled in Fedora's .config that's the problem rather than a
bad commit which git can help with.
You're right in that it's not drm-tip itself. In fact, while the
original weirdness manifested itself in drm, it also tra
Public bug reported:
[Impact]
Asking the driver to restart autonegotiation silently fails when autonegotation
has been disabled. It should report an error.
[Test Case]
sudo ethtool -s ethX autoneg off
sudo ethtool -r ethX
[Fix]
ed29ca8b95925 net: hns: Restart autoneg need return failed when aut
I'll do my best to provide a test kernel by tomorrow, for impacted user
to test, and confirm it works before I submit it to the Ubuntu kernel
team.
Stay tuned.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
*** This bug is a duplicate of bug 1832468 ***
https://bugs.launchpad.net/bugs/1832468
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion)
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
*** This bug is a duplicate of bug 1832468 ***
https://bugs.launchpad.net/bugs/1832468
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion)
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(o
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflo
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(o
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(o
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
**
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Ch
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
**
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(o
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
**
Public bug reported:
[Impact]
When the SMMU is enabled, removal of the hns_enet_drv module will trip a
WARNING.
[Test Case]
sudo modprobe -r hns_enet_drv
[Fix]
8601a99d7c025 net: hns: Fix WARNING when remove HNS driver with SMMU enabled
[Regression Risk]
Fix is restricted to the hns driver, wh
Public bug reported:
[Impact]
ICMP6 neighbor solicitation messages are discarded.
[Test Case]
Regression tested only
[Fix]
ea401685a20b5 net: hns: fix unsigned comparison to less than zero
f058e46855dcb net: hns: fix ICMP6 neighbor solicitation messages discard problem
[Regression Risk]
Fix is
** Description changed:
[Impact]
The ethtool offline test always fails on HNS devices w/ copper ports.
[Test Case]
sudo ethtool -t enahisic2i1 offline
[Fix]
- 01be367eef9d0 net: hns: Fix loopback test failed at copper ports
+ 2e1f164861e50 net: hns: Fix loopback test failed at copp
** Description changed:
[Impact]
KASAN detected a use-after-free condition, which could lead to memory
corruption or a crash.
[Test Case]
Rebuild kernel w/ CONFIG_KASAN=y, look for errors in dmesg.
[Fix]
- 7848b9e26cab9 net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw(
-
Public bug reported:
[Impact]
On rare occasions, the hns driver will oops on start-up
[Test Case]
Reboot, watch for oops
[Fix]
c0b0984426814 net: hns: Fix probabilistic memory overwrite when HNS driver
initialized
[Regression Risk]
Fix is restricted to the hns driver, which is the driver for t
904efd9e3f4c8f288b1279a316eed8e177190c8f^ (AKA
ac3069e67f5659131d7ac5f54d966005bbc40af8) have the problem, but
904efd9e3f4c8f288b1279a316eed8e177190c8f doesn't.
So the kernel bisection is completed and found the right good commit
which is:
https://github.com/torvalds/linux/commit/904efd9e3f4c8f288
904efd9e3f4c8f288b1279a316eed8e177190c8f^ (AKA
ac3069e67f5659131d7ac5f54d966005bbc40af8) have the problem, but
ac3069e67f5659131d7ac5f54d966005bbc40af8 doesn't.
So the kernel bisection is completed and found the right good commit
which is:
https://github.com/torvalds/linux/commit/904efd9e3f4c8f288
https://github.com/torvalds/linux/commit/904efd9e3f4c8f288b1279a316eed8e177190c8f
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832138
Title:
Login screen never appears on vmwgfx but i
Public bug reported:
[Impact]
KASAN detected a use-after-free condition, which could lead to memory
corruption or a crash.
[Test Case]
Rebuild kernel w/ CONFIG_KASAN=y, look for errors in dmesg.
[Fix]
3a39a12ad364a net: hns: fix KASAN: use-after-free in hns_nic_net_xmit_hw()
[Regression Risk]
F
This bug report represents CVE-2019-11479
** Summary changed:
- placeholder bug
+ Remote denial of service (resource exhaustion) caused by low Maximum Segment
Size values
** Description changed:
- placeholder bug
+ Jonathan Looney discovered that a remote attacker could cause a denial
+ of ser
This bug report represents CVE-2019-11477
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11477
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1831637
Title:
Remote de
This bug report represents CVE-2019-11478
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11478
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1831638
Title:
Remote de
** Description changed:
[Impact]
Several bugs for the hns driver have recently been fixed, including a number
of crashes and a memory corruption issue.
[Test Case]
Boot on D05.
Verify that the hns modules can be removed w/o error.
Verify that the loopback test succeeds on a copper
I spoke too soon, it's back again this morning when I accidentally
clicked and dragged a hyperlink in Chrome:
Jun 18 07:43:22 bxps /usr/lib/gdm3/gdm-x-session[3594]: nvLock: client timed
out, taking the lock
Jun 18 07:43:27 bxps /usr/lib/gdm3/gdm-x-session[3594]: nvLock: client timed
out, taking
** Changed in: linux (Ubuntu Disco)
Assignee: (unassigned) => dann frazier (dannf)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1833132
Title:
hns bug fixes
Status in linux packa
Public bug reported:
[Impact]
Several bugs for the hns driver have recently been fixed, including a number of
crashes and a memory corruption issue.
[Test Case]
Boot on D05.
Verify that the hns modules can be removed w/o error.
Verify that the loopback test succeeds on a copper port: sudo ethtoo
wbug: With Bug
wnbug: With No Bug
git bisect start '--term-old=wbug' '--term-new=wnbug' '--'
'drivers/gpu/drm/vmwgfx'
# wbug: [62e9ccfaaedffd057e921fca976f9f7f71c9b254] Linux 4.16.18
git bisect wbug 62e9ccfaaedffd057e921fca976f9f7f71c9b254
# wnbug: [37efe80ce85f76b3b30d7b4ea40550e6a5a5b71a] dr
This bug was fixed in the package linux-azure - 5.0.0-1008.8
---
linux-azure (5.0.0-1008.8) disco; urgency=medium
[ Ubuntu: 5.0.0-17.18 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragment(
** Changed in: linux (Ubuntu Bionic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1832138
Title:
Login screen never appears on vmwgfx but instal
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1831638
Title:
Remote denial of service (resource exhaustion) caused b
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1831637
Title:
Remote denial of service (system crash) caused by integ
On 6/16/19 10:08 PM, Kai-Heng Feng wrote:
> Does kernel parameter "nopti" help?
>
If, in the GRUB menu, instead of selecting "Ubuntu" (the default at the
top of the list), I instead select "advanced options for Ubuntu", and
then specify the prior kernel, it works fine, in several tries, without
This bug was fixed in the package linux-meta-raspi2 - 4.4.0..111
---
linux-meta-raspi2 (4.4.0..111) xenial; urgency=medium
* Bump ABI 4.4.0-
* Is Vcs-Git line correct? (LP: #1824474)
- Vcs-Git: Fix raspi2 branch checkout
-- Stefan Bader Thu, 06 Jun 2019 17:41:
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
This bug was fixed in the package linux-oem - 4.15.0-1043.48
---
linux-oem (4.15.0-1043.48) bionic; urgency=medium
[ Ubuntu: 4.15.0-52.56 ]
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638)
- SAUCE: tcp: tcp_fragmen
1 - 100 of 169 matches
Mail list logo