Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Do our driver packages actually contain the NVIDIA Virtual GPU Manager?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-418 in Ubuntu.
https://bugs.launchpad.net/bugs/1852315
Title:
CVE‑2019‑5696 5697 5698
Statu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: bluez (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1791405
Title:
bluetooth always in discoverable mode (security issue)
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Olivier,
Did this fix make it to Thunderbird?
Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1801383
Title:
the WifiSyslog apport hook (used in firefox/tb) includes SSID
info
Hi Brian,
Is this bug on your radar?
Thanks!
** Changed in: apport (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: apport (Ubuntu)
Assignee: (unassigned) => Brian Murray (brian-murray)
--
You received this bug not
Hi,
Have you reported this issue to the upstream developers?
Thanks!
** Changed in: linux-signed (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed in Ubuntu.
https://bugs.launchpad.ne
** Changed in: linux-meta (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-meta-hwe (Ubuntu)
Status: New => Fix Released
** Changed in: linux-meta-hwe-edge (Ubuntu)
Status: New => Fix Released
** Changed in: linux-meta-lts-xenial (Ubuntu Xenial)
Status:
WifiSyslog does contain SSID information. While this will be removed
from the thunderbird and firefox packages, I don't think it would be
appropriate to remove it from the linux kernel apport reports.
For linux packages, this information is helpful in debugging wireless
driver issues.
While a lis
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Bionic has nvidia-graphics-drivers-390 which provides transitional
packages for the nvidia-graphics-drivers-384 binary packages.
In other words, the nvidia-graphics-drivers-384 package in bionic isn't
used.
** Changed in: nvidia-graphics-drivers-384 (Ubuntu)
Status: New => Invalid
--
Yo
libvorbisidec is an actual issue, and the bionic version does need a no-
change rebuild.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-384 in Ubuntu.
https://bugs.launchpad.net/bugs/1780681
Title:
Older version
Bionic has nvidia-graphics-drivers-390 which provides transitional
packages for the nvidia-graphics-drivers-384 binary packages.
In other words, the nvidia-graphics-drivers-384 package in bionic isn't
used.
--
You received this bug notification because you are a member of Kernel
Packages, which
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1794169
Title:
AWS ubuntu became unreachable after ssh login
Status in linux pa
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-390 in Ubuntu.
https://bugs.launchpad.net/bugs/1814548
Title:
CVE-2018-6260
Status in nvidia-g
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi,
Could you please attach a screenshot of the slider you are referring to?
I believe you are confusing the slider's purpose. The slider is to make your
bluetooth computer visible to be able to pair new devices, it does not
disconnect existing devices.
** Changed in: linux (Ubuntu)
Stat
Ok, actually the slider is in fact to disable bluetooth completely,
please ignore my previous comment.
** Changed in: bluez (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
There are microcode packages available in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
They will be published today or tomorrow once we get the corresponding
linux-meta packages.
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1696440 ***
https://bugs.launchpad.net/bugs/1696440
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1696650 ***
https://bugs.launchpad.net/bugs/1696650
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1696440 ***
https://bugs.launchpad.net/bugs/1696440
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
We published updates for the issue already:
https://www.ubuntu.com/usn/
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555321
Title:
kernel should support disabling CLONE_NEWUSER via sysctl
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Wouldn't the grub2 package simply be held back if the proper version
required by grub2-signed isn't available?
Why did the grub2-signed binary package get uninstalled during the
update?
2015-12-15 20:26:59 status installed grub-efi-amd64-signed:amd64
1.55+2.02~beta2-29
2015-12-15 20:27:00 remove
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1129184
Title:
CVE-2013-0290
Status in “linux” package
Can someone please test this package so it gets released?
If nobody tests it, it will get superseded by a security update.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1218959
Title:
Public bug reported:
Just upgraded from Saucy to Trusty, and trusty kernel is now panicking
multiple times a day.
Harware is Asus UX32VD with a gigabit USB dongle.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-4-generic 3.13.0-4.19
ProcVersionSignature: Ubuntu 3.13.0-4
** Attachment added: "screenshot of panic"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1270603/+attachment/3952187/+files/IMG_20140119_112131.jpg
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
Looks related to this:
http://www.spinics.net/lists/netdev/msg265993.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1270603
Title:
trusty kernel panicking multiple times a day
Sta
https://lkml.org/lkml/2013/11/19/244
http://www.spinics.net/lists/linux-usb/msg97176.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1270603
Title:
trusty kernel panicking multiple
Supposed fix:
http://thread.gmane.org/gmane.linux.network/299450/focus=299511
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1270603
Title:
trusty kernel panicking multiple times a day
https://git.kernel.org/cgit/linux/kernel/git/next/linux-
next.git/commit/drivers/net/usb/usbnet.c?id=fdc3452cd2c7b2bfe0f378f92123f4f9a98fa2bd
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
Yes, sorry about the screenshot, I should have looked at it before
rebooting :)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1270603
Title:
trusty kernel panicking multiple times a day
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381005
Title:
Long stdin from terminal can result in code execution
Status in “linux” packag
I can confirm that this is still an issue with 3.13 and 3.16.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/814325
Title:
8086:0046 [Lenovo ThinkPad T510] Fuzzy and corrupted display af
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
ACK on the debdiff in comment #20. Uploaded for processing by the SRU
team. Thanks!
** Changed in: rsyslog (Ubuntu Trusty)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
h
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1424231
Title:
A trivial program can exhaust system memory with infini
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
We changed the default sysrq value in procps (1:3.3.3-2ubuntu2) quantal
Closing this bug.
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
I can still reproduce this with 3.19 in vivid.
** Changed in: linux (Ubuntu)
Status: Expired => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1381005
Title:
Long stdin
The good news is I no longer seem to be able to reproduce this with
kernel 3.18 in the current Ubuntu daily.
The bad news is running the test script three times in a row has given
me a headache :)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscri
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1588871
Title:
CVE-2016-1583
Status in linux package in Ubun
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1198294
Title:
CVE-2013-2234
Status in “linu
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux (Ubuntu Quantal)
Status:
** Changed in: linux (Ubuntu Saucy)
Status: New => Invalid
** Changed in: linux (Ubuntu Raring)
Status: New => Fix Committed
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kerne
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1198293
Title:
CVE-2013-2232
Status in “linu
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1188351
Title:
CVE-2013-2140
Status in “linu
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1205078
Title:
CVE-2013-4163
Status in “linu
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
S
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1205070
Title:
CVE-2013-4162
Status in “linu
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1189833
Title:
CVE-2013-2852
Status i
** Changed in: linux-armadaxp (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Quantal)
Status: New => Fix Committed
** Changed in: linux-ti-omap4 (Ubuntu Saucy)
S
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubunt
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Fix Released
** Changed in: linux-ti-omap4 (Ubunt
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1213824
Title:
CVE-2013-1059
Status
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1191463
Title:
CVE-2013-2164
Status
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1213256
Title:
CVE-2013-4247
Status
** Changed in: linux-lts-raring (Ubuntu Precise)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1189832
Title:
CVE-2013-2851
Status
** Changed in: linux (Ubuntu Raring)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1213256
Title:
CVE-2013-4247
Status in “linux”
** Bug watch added: Linux Kernel Bug Tracker #54021
http://bugzilla.kernel.org/show_bug.cgi?id=54021
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi?id=54021
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of K
** Package changed: linux (Ubuntu) => isc-dhcp (Ubuntu)
** Changed in: isc-dhcp (Ubuntu)
Status: Incomplete => Confirmed
** Tags added: apparmor
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
FYI, I just upgraded to bios 1.52 and can still reproduce this this
saucy.
Version: 6MET92WW (1.52 )
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/814325
Title:
fuzzy and corru
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Tags added: rls-t-incoming
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1259570
Title:
kexec shou
Patch v2:
https://lkml.org/lkml/2013/12/9/790
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Quantal)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Trusty)
Importance: Medium
Assignee: Tyler
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
1 - 100 of 152 matches
Mail list logo