** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => Fix Released
** Changed in: linux (Ubuntu Yakkety)
Status: New
I believe I faced this bug too on Xenial with kernel 4.10.0-26-generic
on amd64. We use multiple multiqueue virtual adapters per VM so only
partial connectivity loss occurs.
With systemtap I can see that on host last_used_event from patch equals
to 0x0 on one of the queues, and guest receiving 0x1
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1709303
Title:
linux: 4.10.0-33.37 -propos
I have tested the kernel provided. The issue still occurs.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1701222
Title:
[Hyper-V] LIS daemons fail to start after disable/re-enable VM
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-zesty
** Tags removed: block-proposed
--
You received this bug notification because you a
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1709300
Title:
linux-aws: 4.4.0-1032.4
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1709296
Title:
linux: 4.4.0-93.116 -propos
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Thanks, I agree that 18.04 would be good.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1713017
Title:
Enable MIDI support
Status in bluez package in Ubuntu:
Triaged
Bug description
Public bug reported:
Out and over.
I tried whatever I could think of, but whatever I send there, anything will
make the printer blink, 'processing', forever, until I cancel the job.
The printer, however, prints the same files from okular, and from all other
applications that I have tried so far
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 3.13.0-129.178
---
linux (3.13.0-129.178) trusty; urgency=low
* linux: 3.13.0-129.178 -proposed tracker (LP: #1709292)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 3.13.0-129.178
---
linux (3.13.0-129.178) trusty; urgency=low
* linux: 3.13.0-129.178 -proposed tracker (LP: #1709292)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fra
This bug was fixed in the package linux - 3.13.0-129.178
---
linux (3.13.0-129.178) trusty; urgency=low
* linux: 3.13.0-129.178 -proposed tracker (LP: #1709292)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1713448
and then change the status of the bug to 'Confirmed'.
If, due to the nature
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-lts-xenial -
4.4.0-93.116~14.04.1
---
linux-lts-xenial (4.4.0-93.116~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-93.116~14.04.1 -proposed tracker (LP:
#1709297)
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating
This bug was fixed in the package linux - 4.4.0-93.116
---
linux (4.4.0-93.116) xenial; urgency=low
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntra
This bug was fixed in the package linux-lts-xenial -
4.4.0-93.116~14.04.1
---
linux-lts-xenial (4.4.0-93.116~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-93.116~14.04.1 -proposed tracker (LP:
#1709297)
* linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)
* Creating
This bug was fixed in the package linux-hwe - 4.10.0-33.37~16.04.1
---
linux-hwe (4.10.0-33.37~16.04.1) xenial; urgency=low
* linux-hwe: 4.10.0-33.37~16.04.1 -proposed tracker (LP: #1709304)
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert
This bug was fixed in the package linux - 4.10.0-33.37
---
linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)
* CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentat
This bug was fixed in the package linux-gke - 4.4.0-1028.28
---
linux-gke (4.4.0-1028.28) xenial; urgency=low
* linux-gke: 4.4.0-1028.28 -proposed tracker (LP: #1709301)
* include scsi_debug module on linux-image package (LP: #1707663)
- [config] GKE: scsi_debug.ko moved to l
This bug was fixed in the package linux-gke - 4.4.0-1028.28
---
linux-gke (4.4.0-1028.28) xenial; urgency=low
* linux-gke: 4.4.0-1028.28 -proposed tracker (LP: #1709301)
* include scsi_debug module on linux-image package (LP: #1707663)
- [config] GKE: scsi_debug.ko moved to l
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
This bug was fixed in the package linux-aws - 4.4.0-1032.41
---
linux-aws (4.4.0-1032.41) xenial; urgency=low
* linux-aws: 4.4.0-1032.41 -proposed tracker (LP: #1709300)
* include scsi_debug module on linux-image package (LP: #1707663)
- [config] AWS: scsi_debug.ko moved to l
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
This bug was fixed in the package linux-aws - 4.4.0-1032.41
---
linux-aws (4.4.0-1032.41) xenial; urgency=low
* linux-aws: 4.4.0-1032.41 -proposed tracker (LP: #1709300)
* include scsi_debug module on linux-image package (LP: #1707663)
- [config] AWS: scsi_debug.ko moved to l
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-maste
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Affects: kernel-sru-workflow
Imp
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: 1713461
derivatives:
** Affe
apport has a bug in itself:
$ apport-collect 1713448
The authorization page:
(https://launchpad.net/+authorize-token?oauth_token=j6m80p6PW5dzx4v5SJQp&allow_permission=DESKTOP_INTEGRATION)
should be opening in your browser. Use your browser to authorize
this program to access Launchpad on your be
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: 1713458
derivatives:
** Affe
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-maste
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivatives:
** Affects: ke
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-stable-maste
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
+
+ backports: 1713463
+ de
Public bug reported:
In my Lenovo ideapad 700, the touchpad is not working anymore, It's
completely unresponsive. I've last used it a couple of days ago
(2017/08/26).
Today when I checked the system settings, all settings related to the
touchpad have vanished. External mouse works properly though
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
Public bug reported:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: 1713471,1713472
derivatives:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
1 - 100 of 206 matches
Mail list logo