Regression test CMPL, aarch64 skipped as Vivid boot image is not ready
for testing this cycle.
The failure in kernel security test is expected for the CVE issue.
http://kernel.ubuntu.com/testing/tracker-index.html
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed =>
Regression test CMPL, failures in aarch64 was caused by the proxy
setting, still waiting IS to help us on this.
The failure in kernel security test is expected for the CVE issue.
http://kernel.ubuntu.com/testing/tracker-index.html
** Changed in: kernel-sru-workflow/regression-testing
Stat
tests ran: 5, failed: 2;
http://kernel.ubuntu.com/testing/4.9.0-11.12-generic/pepe__4.9.0-11.12__2016-12-19_04-30-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
tests ran: 33, failed: 0;
http://kernel.ubuntu.com/testing/4.4.0-57.78-lowlatency/onibi__4.4.0-57.78__2016-12-19_07-09-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
Hardware Certification have completed testing this -proposed kernel. No
regressions were observed, results are available here:
http://people.canonical.com/~hwcert/sru-testing/yakkety/4.8.0-32.34
/yakkety-proposed-frozen.html
** Tags added: certification-testing-passed
** Changed in: kernel-sru-wo
Hm, I'm currently using 4.7.0-040700rc5-generic on 16.04 with
$ grep acp /etc/default/grub
GRUB_CMDLINE_LINUX="noprompt persistent acpi=noirq"
and have fully working boot, reboot, poweroff (on the Lenovo A740, not
A540).
(For wifi, I use https://github.com/lwfinger/rtl8723au dkms).
nielks, cou
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1649905
Title:
On boot excessive number of kworker thread
tests ran: 10, failed: 1;
http://kernel.ubuntu.com/testing/4.9.0-11.12-generic/michael__4.9.0-11.12__2016-12-19_08-46-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
Public bug reported:
When I undock my thinkpad from the docking station, I get a kernel
Ooops:
```
[...]
Dez 19 10:49:36 PC-SUJ sudo[3675]: pam_unix(sudo:session): session opened for
user root by (uid=0)
Dez 19 10:49:41 PC-SUJ kernel: usb 1-3: USB disconnect, device number 3
Dez 19 10:49:41 PC-S
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1651081
Title:
Kernel Oops when undocking Thi
tests ran: 141, failed: 28;
http://kernel.ubuntu.com/testing/4.4.0-57.78-generic/kernel01__4.4.0-57.78__2016-12-19_10-13-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
I installed the python apport script and ran it.
Al I see is an automated login to Launchpad and the message:
Authorize application to access Launchpad on your behalf
Almost finished ...
The LinuxMint computer called Zeno now has access to your Launchpad account.
Within a few seconds, yo
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793896/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
Ti
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793898/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793897/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793895/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793908/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
Succeeded the second time ;-)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
Title:
ubuntu-bug linux - BUG: unable to handle kernel NULL pointer
dereference at 0248
Test failures for CVE-2016-9793, which is expected as this CVE hasn't
been fixed in this kernel yet.
** CVE added: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9793
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793909/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793906/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793907/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793903/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793902/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793905/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793899/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
Test failures for CVE-2016-9793, which is expected as this CVE hasn't
been fixed in this kernel yet.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-9793
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793901/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793904/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1647713
Title:
linux: 3.2.0-119.162 -propo
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1650899/+attachment/4793900/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid i
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1649358
Title:
linux: 4.8.0-32.34 -propose
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty
Test failures for CVE-2016-9793, which is expected as this CVE hasn't
been fixed in this kernel yet.
** CVE added: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-9793
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Fix Released
--
You received this bug
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1647717
Title:
linux-ti-omap4: 3.
** Changed in: kernel-sru-workflow/upload-to-ppa
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1647717
Title:
linux-ti-omap4: 3.2.0-1497.124 -prop
Hi Christopher,
because I could not get the touchpad to work on my G752 I asked the
dealer for a refund. So unfortunately I could no longer provide any
further information about this bug.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650899
Title:
ubuntu-bug linux - BUG: unable to handle kernel NULL po
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1641569
Title:
Fix resource leak in btusb
Status in li
Tested Zesty daily and the fan started immediately after boot. When I do
nothing the system shuts down shortly after it enters the desktop.
But I found out following: I can reproduce it with Zesty daily and Xenial
4.4.0-57.78 kernel.
The fan is on after boot. As soon as I enter the Desktop, I pre
Bug is fixed in mainline kernel.
With kernel 4.9.0-040900-generic #201612111631 SMP Sun Dec 11 21:33:00 UTC 2016
x86_64 x86_64 x86_64 GNU/Linux bnx2x doesn't crash when vxlans are enabled.
Would it be possible to backport patch for kernels 4.4.x?
** Tags removed: kernel-bug-exists-upstream
** Ta
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-11.12-generic/michael__4.9.0-11.12__2016-12-19_12-54-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
I confirm that with kernel 4.9.0-040900-generic #201612111631 this bug
is fixed.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1643558
Title:
bnx2x driver crash
Status in linux package
Public bug reported:
dkms upstream has become back to life in recent months, and merged many
patches from downstream communities, thus merging with the new release
is worthy to get old bug fixed and new features incorporated.
** Affects: dkms (Ubuntu)
Importance: Undecided
Status: N
Linked a branch for this merge which needs a sponsor.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/1651124
Title:
Please merge dkms 2.3-1 from Debian testing (main)
Status in dkms pa
tests ran: 19, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-11.12-generic/lagalla__4.9.0-11.12__2016-12-19_12-46-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
To keep you updated - I sent the patch to the nfs maintainers,
unfortunately the change is not correct for some other system calls. No
suggestions though on what would be better, so I'm trying to get more
feedback. I will let you know when I have something new to try.
--
You received this bug not
https://lists.ubuntu.com/archives/kernel-team/2016-December/081565.html
** Also affects: linux (Ubuntu Zesty)
Importance: Medium
Status: Confirmed
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Zesty)
Status: Conf
You have been subscribed to a public bug:
#===
The Frobisher Nova nodes which instantiated by Openstack via the
nova-compute-proxy charm does not enable the security group.
By some investigation, I found the this compute node configuration
--- Comment From heinz-werner_se...@de.ibm.com 2016-12-19 08:52 EDT---
Canonical please assign to the right component
Target project nova-compute-proxy charm:
https://bugs.launchpad.net/charm-nova-compute-proxy
Many thanks
** Changed in: ubuntu
Assignee: (unassigned) => Skipper Bug
Public bug reported:
When booting with the 'nomodeset' Linux kernel parameter, Unity launcher
icons can no longer be resized.
** Affects: unity (Ubuntu)
Importance: Undecided
Status: New
** Package changed: linux-firmware (Ubuntu) => unity (Ubuntu)
--
You received this bug notifi
Public bug reported:
If booting without 'nomodeset', Plymouth hangs very ofter right after
the Grub page, before the splash screen, leaving me to a useless black
screen.
(However, when booting with 'nomodeset' Unity icons can't be resized any
longer: see
https://bugs.launchpad.net/ubuntu/+source/
https://lists.ubuntu.com/archives/kernel-team/2016-December/081567.html
** Changed in: linux (Ubuntu Xenial)
Status: Triaged => In Progress
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux-lts-vivid (Ubuntu Yakkety)
Importance:
https://lists.ubuntu.com/archives/kernel-team/2016-December/081568.html
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Yakkety)
Status: New => In Progress
** Changed in: linux (Ubuntu Yakkety)
Assignee: (unassigned) =>
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-11.12-generic/lagalla__4.9.0-11.12__2016-12-19_14-14-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
tests ran: 36, failed: 0;
http://kernel.ubuntu.com/testing/4.4.0-57.78-generic/onza__4.4.0-57.78__2016-12-19_12-34-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bcmwl (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1559391
My make.log from Ubuntu 16.04:
DKMS make.log for bcmwl-6.30.223.248+bdcom for kernel 4.4.0-53-generic (i686)
Mon Dec 19 09:20:31 EST 2016
make: Entering directory '/usr/src/linux-headers-4.4.0-53-generic'
Makefile:691: Cannot use CONFIG_CC_STACKPROTECTOR_STRONG:
-fstack-protector-strong not suppo
Joseph,
I'm sorry, I'd not seen the request for test. This is unfortunately
non-trivial to test.
I agree, the next thing to do is to check and see if the issue is still
present in upstream, the hwe for 16.04 and the current GA for 16.04.
I dont expect that I will haev any time to look at this
Made bug public after brief consulting ...
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1644557
Title:
crypto : tolerate new crypto
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Xenial)
Status: New => Confirmed
** Cha
** Changed in: linux (Ubuntu)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
** Changed in: linux (Ubuntu Xenial)
Assignee: (unass
@Aron,
It looks like there is just one patch delta in Ubuntu right? Would you
mind to include that to Debian unstable too? Then we can sync zesty and
Debian and Ubuntu shouldn't have to carry anything.
--
You received this bug notification because you are a member of Kernel
Packages, which is
** Package changed: linux (Ubuntu) => charms
** Tags added: openstack-ibm
** Tags added: s390x
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1651140
Title:
nova-compute-proxy charm do
commit b3e8652bcbfa04807e44708d4d0c8cdad39c9215 ('s390/zcrypt: Introduce
CEX6 toleration') will be released in v4.10-rc1
** Changed in: linux (Ubuntu Zesty)
Status: Confirmed => Fix Released
** Changed in: linux (Ubuntu Zesty)
Assignee: Canonical Kernel (canonical-kernel) => (unassign
https://lists.ubuntu.com/archives/kernel-team/2016-December/081571.html
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Tim Gardner (timg-tpi)
** Changed in: linux (Ubuntu Yakkety)
Status: Con
@superm1, here are the list of deltas:
* Resynchronize with Debian, remaining changes:
- debian/patches/shim_secureboot_support.patch:
Add shim secureboot support
- debian/patches/apport_name_in_valueerror.diff:
Check the ValueError from apport for the package name too
-
I started a kernel bisect between Ubuntu 4.4.0-54 and Ubuntu 4.4.0-57.
The kernel bisect will require testing of about 4-5 test kernels.
I built the first test kernel, up to the following commit:
0cd611da7d4c01b178144bc17da8cd92cae2b1fa
The test kernel can be downloaded from:
http://kernel.ubuntu
This issue hit me last night after an update. Ubuntu 16, GTX 980 Kernel
4.4.0-53-generic and nvidia-367 drivers.
Nvidia official drivers are on 375.2. Has anyone tried Kernel
4.4.0-53-generic along with latest nvidia drivers to see if it fixes the
issue?
--
You received this bug notification bec
** Changed in: ubuntu-z-systems
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1644557
Title:
crypto : tolerate new crypto hardware for z Systems
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: nvidia-graphics-drivers-367 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
Output of xinput booting from USB. Touchpad works:
↳ SynPS/2 Synaptics TouchPad id=14 [slave pointer
(2)]
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1651005
Titl
Xenial test kernel at http://kernel.ubuntu.com/~rtg/linux-4.4.0-58-hv/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650059
Title:
[Hyper-V] Rebase Hyper-V in 16.04 and 16.10 to the th
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650635
Title:
vmxnet3 driver could causes kernel panic wi
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1647787
Title:
linux: 3.19.0-78.86 -proposed
** Changed in: ubuntu-z-systems
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1647400
Title:
system freeze when swapping to encrypted swap pa
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1647788
Title:
linux-lts-vivid: 3.
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1626371
Title:
cdc_ether fills kernel log
Status in linu
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
*** This bug is a duplicate of bug 1647718 ***
https://bugs.launchpad.net/bugs/1647718
This bug was fixed in the package linux-armadaxp - 3.2.0-1680.107
---
linux-armadaxp (3.2.0-1680.107) precise; urgency=low
* Release Tracking Bug
- LP: #1647718
* Miscellaneous Ubuntu c
This bug was fixed in the package linux-armadaxp - 3.2.0-1680.107
---
linux-armadaxp (3.2.0-1680.107) precise; urgency=low
* Release Tracking Bug
- LP: #1647718
* Miscellaneous Ubuntu changes
- Rebase to Ubuntu-3.2.0-119.162
[ Ubuntu: 3.2.0-119.162 ]
* Release Tracki
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1650895
Title:
Several new Asus laptops are missing touch
This bug was fixed in the package linux - 3.2.0-119.162
---
linux (3.2.0-119.162) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1647713
* CVE-2016-7916
- proc: prevent accessing /proc//environ until it's ready
* [Hyper-V] do not lose pending
This bug was fixed in the package linux - 3.2.0-119.162
---
linux (3.2.0-119.162) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1647713
* CVE-2016-7916
- proc: prevent accessing /proc//environ until it's ready
* [Hyper-V] do not lose pending
*** This bug is a duplicate of bug 1647718 ***
https://bugs.launchpad.net/bugs/1647718
This bug was fixed in the package linux-armadaxp - 3.2.0-1680.107
---
linux-armadaxp (3.2.0-1680.107) precise; urgency=low
* Release Tracking Bug
- LP: #1647718
* Miscellaneous Ubuntu c
This bug was fixed in the package linux - 3.2.0-119.162
---
linux (3.2.0-119.162) precise; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1647713
* CVE-2016-7916
- proc: prevent accessing /proc//environ until it's ready
* [Hyper-V] do not lose pending
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1648867
Title:
linux: 4.4.0-57.78 -proposed
This bug was fixed in the package linux-lts-vivid - 3.19.0-78.86~14.04.1
---
linux-lts-vivid (3.19.0-78.86~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1647788
* CVE-2016-7916
- proc: prevent accessing /proc//environ until it's ready
This bug was fixed in the package linux-lts-vivid - 3.19.0-78.86~14.04.1
---
linux-lts-vivid (3.19.0-78.86~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1647788
* CVE-2016-7916
- proc: prevent accessing /proc//environ until it's ready
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1649358
Title:
linux: 4.8.0-32.34 -proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
1 - 100 of 260 matches
Mail list logo