Installed 5.17.0-1009-oem unsigned kernel image on Ubuntu 22.04 and
tested the fix. The fix works. My phone can connect to the wifi hotspot
and browse the internet.
** Attachment added: "dmesg.txt"
https://bugs.launchpad.net/ubuntu/jammy/+source/linux-oem-5.17/+bug/1969326/+attachment/5594782/
[Expired for linux-hwe-5.13 (Ubuntu) because there has been no activity
for 60 days.]
** Changed in: linux-hwe-5.13 (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-5.13 in Ubuntu.
ht
Same problem with latest official 5.15.0-35-generic. I am willing to
test any patched 5.15 kernel build that also includes the linux-headers
package. Thanks for your efforts.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubunt
Public bug reported:
My Thinkpad X13 has 1 USB-C port that is usually used by the battery
charger, and 2 USB ports.
Sometime in the past 2-4 weeks, the 2 USB ports have stopped working.
Nothing I plug into them causes any change in the output of `usb-
devices`.
It isn't a hardware fault because
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Need to revert this patch as it introduces a new issue for IPSec.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bugs/1974096
Title:
cls_flower: Fix inability to match GRE/IPIP pack
Public bug reported:
Install failure after ubuntu upgrade to 22.04
ProblemType: Package
DistroRelease: Ubuntu 22.04
Package: nvidia-dkms-510 510.73.05-0ubuntu0.22.04.1
ProcVersionSignature: Ubuntu 5.15.0-35.36-generic 5.15.35
Uname: Linux 5.15.0-35-generic x86_64
NonfreeKernelModules: nvidia_uvm
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594744/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977476
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594746/+files/acpidump.txt
** Changed in: ubuntu-mate
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subsc
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594745/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594735/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977476
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594742/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594743/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594737/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594734/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/19
apport information
** Attachment added: "PaInfo.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594738/+files/PaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977476
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594741/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594739/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594740/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594736/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594730/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977476
Ti
apport information
** Attachment added: "Dependencies.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594732/+files/Dependencies.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594733/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977476
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1977476/+attachment/5594731/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Tags added: apport-collected
** Description changed:
powersave governor frequency and gets higher after resume from
suspension, getting worse performance than ondemand governor with the
computer on "idle state". powersave seems to lock on the smaller cpu
frequency
Public bug reported:
After restart the labtop the system raise an error alert.
I've just upgrade system (sudo apt-get upgrade) using terminal due
graphic assistant did not work.
Audio in youtube doesn't work but using system test does.
Video is working well.
Thank you very much,
ProblemType:
Sorry to Bother, Do you order from Amazon?
John Sonderegger
json...@yahoo.com
Propelled by Penguin Power
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/406728
Title:
[Dell Inc. MM061] su
Sorry to Bother, Do you order from Amazon?
John Sonderegger
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/406728
Title:
[Dell Inc. MM061] suspend/resume failure
Status in linux packag
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: nvidia-graphics-drivers-435 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-435 in Ubunt
My internal display doesn't wake up after sleep on 22.04. There was a
bug report but I can't see it any longer.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-435 in Ubuntu.
https://bugs.launchpad.net/bugs/1860934
All autopkgtests for the newly accepted linux-meta-raspi (5.4.0.1063.97) for
focal have finished running.
The following regressions have been reported in tests triggered by the package:
systemd/unknown (arm64)
nvidia-graphics-drivers-390/390.151-0ubuntu0.20.04.1 (armhf)
Please visit the excuses
** Changed in: linux (Ubuntu Focal)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1976116
Title:
Focal update: v5.4.191 upstream stable relea
*** This bug is a duplicate of bug 1958267 ***
https://bugs.launchpad.net/bugs/1958267
In fact a duplicate, sorry for the noise
** This bug has been marked a duplicate of bug 1958267
wpa can't connect to servers using TLS 1.1 or older
--
You received this bug notification because you are
@kaihengfeng, the first test with unloading a limited amount of modules
(due to rmmod -f limitations) did not result in 0% battery drain. So the
next step would be a modified kernel that allows unloading all modules
(see #56). Do you maybe have another suggestion of how to find out which
module nee
How can I test the fix?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1969326
Title:
Enable hotspot feature for Realtek 8821CE
Status in HWE Next:
New
Status in OEM Priority
All autopkgtests for the newly accepted linux-meta-raspi-5.4 (5.4.0.1063.64)
for bionic have finished running.
The following regressions have been reported in tests triggered by the package:
bbswitch/0.8-4ubuntu1 (arm64)
acpi-call/1.1.0-4 (arm64)
Please visit the excuses page listed below and i
as no activity for quite some time (same in the external bug), mark
incomplete in oem-priority
** Changed in: oem-priority
Status: New => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977526
Title:
Regression: upgrade to ubuntu
Public bug reported:
Today I have updated from 20.04 to 22.04. Now it is impossible to
connect to ALMAWIFI that is my university wifi network. Being this part
of EDUROAM, I strongly suspect that EDUROAM has been broken as well.
The system seems to be able to connect to regular wifi networks, such
** Also affects: ubuntu-z-systems
Importance: Undecided
Status: New
** Changed in: ubuntu-z-systems
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: ubuntu-z-systems
Assignee: (unassigned) => Skipper Bug Screeners (
Public bug reported:
Description: hypfs: fix listing z/VM guests with access control group
set
Symptom: hypfs/hyptop info doesn't include z/VM guests with access
control group set
Problem: Currently if z/VM guest is allowed to retrieve hypervisor
perfo
I am also affected by this issue. Thinkpad X260 / Ubuntu 22.04. Previous
versions were working fine. On 22.04, kernel 5.13 did not have the issue
but the Wifi was not working.
Is there anything I could do to help diagnose the issue?
--
You received this bug notification because you are a member
You have been subscribed to a public bug:
Description: hypfs: fix listing z/VM guests with access control group
set
Symptom: hypfs/hyptop info doesn't include z/VM guests with access
control group set
Problem: Currently if z/VM guest is allowed to retrieve hypervisor
Going to wontfix for bionic since there doesn't seem to be a need for it
at this point
** Changed in: bluez (Ubuntu Bionic)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://b
** Also affects: ubuntu-z-systems
Importance: Undecided
Status: New
** Changed in: ubuntu-z-systems
Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: ubuntu-z-systems
Importance:
** Also affects: bluez (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: snappy-hwe-snaps
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1973835
Title:
Ubuntu 2
Public bug reported:
Description: zfcp: fix failed recovery on gone remote port, non-NPIV
FCP dev
Symptom: With non-NPIV FCP devices, failed recovery on gone remote port.
As follow-on error, failed paths after storage target NPIV
failover with IBM FCP storage
You have been subscribed to a public bug:
Description: zfcp: fix failed recovery on gone remote port, non-NPIV
FCP dev
Symptom: With non-NPIV FCP devices, failed recovery on gone remote port.
As follow-on error, failed paths after storage target NPIV
failover
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
This bug is awaiting verification that the linux/5.15.0-36.37 kernel in
-proposed solves the problem. Please test the kernel and update this bug
with the results. If the problem is solved, change the tag
'verification-needed-jammy' to 'verification-done-jammy'. If the problem
still exists, change t
** Package changed: linux (Ubuntu) => pam (Ubuntu)
** Also affects: ubuntu-z-systems
Importance: Undecided
Status: New
** Changed in: ubuntu-z-systems
Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)
--
You received this bug notification because you are a mem
** Tags added: kern-3468
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1976613
Title:
Enable Asus USB-BT500 Bluetooth dongle(0b05:190e)
Status in HWE Next:
New
Status in lin
Default Comment by Bridge
** Attachment added: "apt log"
https://bugs.launchpad.net/bugs/1977493/+attachment/5594578/+files/term.log
** Changed in: ubuntu
Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)
** Package changed: ubuntu => linux (Ubuntu)
--
You received
You have been subscribed to a public bug:
---Problem Description---
Upgrade from Ubuntu 21.10 to 22.4 fails
I run do-release-upgrade and I got a message upgrade completed with
errors. I rebooted the server and it is now in an undefined state
between 21.10 and 22.04. Not all packages have been ins
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-settings in Ubuntu.
https://bugs.launchpad.net/bugs/1957094
Title:
on-demand mode doesn't work with nvidia-390
Status
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1890130
Title:
Add support for Intel Bluetooth Device Typhoon Peak
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1908366
Title:
Failed to load DMC firmware i915/tgl_dmc_ver2_08.bin
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.10 in Ubuntu.
https://bugs.launchpad.net/bugs/1912676
Title:
Fix regression introduced by codec PM change
Statu
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1967274
Title:
Screen sometimes can't update [Failed to post KMS update: CRT
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1892288
Title:
Comet Lake PCH-H RAID not support on Ubuntu20.04
Sta
** Changed in: oem-priority
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1887910
Title:
[bionic]blutoothd segfault when you cancel the keyboa
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1902848
Title:
Support Intel AX210 wifi [8086:2725] Subsystem [8086
** Changed in: oem-priority
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.6 in Ubuntu.
https://bugs.launchpad.net/bugs/1904225
Title:
Use ACPI S5 for reboot
Status in HWE Next:
New
Sta
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.13.0-1026.30
---
linux-azure (5.13.0-1026.30) impish; urgency=medium
* impish/linux-azure: 5.13.0-1026.30 -proposed tracker (LP: #1974334)
* [Azure] WARNING: CPU: 0 PID: 499 at include/linux/dma-mapping.h:555
netvsc_probe+0x3c
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux-azure - 5.13.0-1026.30
---
linux-azure (5.13.0-1026.30) impish; urgency=medium
* impish/linux-azure: 5.13.0-1026.30 -proposed tracker (LP: #1974334)
* [Azure] WARNING: CPU: 0 PID: 499 at include/linux/dma-mapping.h:555
netvsc_probe+0x3c
This bug was fixed in the package linux-azure - 5.13.0-1026.30
---
linux-azure (5.13.0-1026.30) impish; urgency=medium
* impish/linux-azure: 5.13.0-1026.30 -proposed tracker (LP: #1974334)
* [Azure] WARNING: CPU: 0 PID: 499 at include/linux/dma-mapping.h:555
netvsc_probe+0x3c
This bug was fixed in the package linux-azure - 5.15.0-1008.9
---
linux-azure (5.15.0-1008.9) jammy; urgency=medium
* jammy/linux-azure: 5.15.0-1008.9 -proposed tracker (LP: #1974294)
* Packaging resync (LP: #1786013)
- debian/dkms-versions -- update from kernel-versions (mai
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux-azure - 5.13.0-1026.30
---
linux-azure (5.13.0-1026.30) impish; urgency=medium
* impish/linux-azure: 5.13.0-1026.30 -proposed tracker (LP: #1974334)
* [Azure] WARNING: CPU: 0 PID: 499 at include/linux/dma-mapping.h:555
netvsc_probe+0x3c
This bug was fixed in the package linux - 5.13.0-46.51
---
linux (5.13.0-46.51) impish; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.13.0-45.50) impish; urgency=medium
* impish/linux: 5.13.0-45.50 -proposed tracker (LP: #1974347)
* CVE-2022-1158
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
This bug was fixed in the package linux - 5.15.0-35.36
---
linux (5.15.0-35.36) jammy; urgency=medium
* CVE-2022-21499
- SAUCE: debug: Lock down kgdb
linux (5.15.0-34.35) jammy; urgency=medium
* jammy/linux: 5.15.0-34.35 -proposed tracker (LP: #1974322)
* AMD APU s2idle i
1 - 100 of 119 matches
Mail list logo