Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bluez (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1278615
Upgrade to Ubuntu 3.13.0-30.55-generic 3.13.11.2 does not solve the
problem.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338063
Title:
Brightness control lost after suspend screen di
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
"sudo hidd --search" doesn't list the device, either, so I add that
package to this ticket
** Also affects: bluez (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https:
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338177
Title:
BUG: soft lockup - CPU#0 stuck
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338177
Title:
BUG: soft lockup - CPU#0 stuck for 23s! [Xorg:1295]
Status in “linux” package in Ubun
Public bug reported:
I've just installed Utopic, and my machine is really slow to boot.
ProblemType: KernelOops
DistroRelease: Ubuntu 14.10
Package: linux-image-3.15.0-6-generic 3.15.0-6.11 [modified:
boot/vmlinuz-3.15.0-6-generic]
ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
Uname: L
Try latest upstream kernel. If issue still occurs, then you can continue
with the kernel bugzilla report.
https://wiki.ubuntu.com/Kernel/MainlineBuilds#Installing_upstream_kernels
http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.16-rc3-utopic/
** Changed in: linux (Ubuntu)
Status: Confirme
I was also affected by this bug, it is related to some FM2 motherboards , MSI
being one of them.
The fix for this bug is to edit your GRUB file BEFORE you restart your system
after updating.
If you did a clean install from a live cd you will have to use f6 during boot
and select "noapic" and if
#28 worked for me as well, on Xubuntu 14.04 using a MSI Z97 Gaming 5.
Have tried various other stuff like Alsa overrides, Realtek drivers
built from scratch, disabling pulseaudio and so on until I stumbled over
this thread.
--
You received this bug notification because you are a member of Kernel
No, it's not supposed to be there by default. Just create a new file :)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1307674
Title:
[MacBookPro10,2] Broadcom BCM57765/57785 SDXC/MMC Ca
Magnus, I have the same issue with my MBP and went to modify sdhci in
modprobe.d but I'm missing that file. Did you do anything special to get
that file in there or was it there by default? Any idea how to load
sdhci? I'm stuck at that point and would really like to use my SD cards
without a clunky
Thank you Ekimia for your answer. Regards
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1320070
Title:
Realtek Wifi card RTL8723BE drops connection with MSI enabled
Status in “linux” p
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338161
Title:
SD Card not recognised
Status
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338159
Title:
Soft lo
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338160
Title:
SD Card not recognised
Status
Public bug reported:
Ubuntu 14.04 does not recognise the SD Card, but the USB stick is fine.
Booting with the card makes no difference.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-30-generic 3.13.0-30.54
ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2
Una
Public bug reported:
Soft lockup happened resulting in a need to reboot. Debug information
was collect after reboot. syslog contains the backtrace information.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-24-generic 3.13.0-24.47
ProcVersionSignature: Ubuntu 3.13.0-24.
** Attachment added: "syslog"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1338159/+attachment/4146299/+files/syslog
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338159
Titl
Public bug reported:
Ubuntu 14.04 does not recognise the SD Card, but the USB stick is fine.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-30-generic 3.13.0-30.54
ProcVersionSignature: Ubuntu 3.13.0-30.54-generic 3.13.11.2
Uname: Linux 3.13.0-30-generic x86_64
ApportVer
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338148
Title:
[Acer Aspire V5-122P] suspend/
I kept seeing it and eventually built v3.8.0 and it 'appeared' to not
show the error. I thought I had found it and started another bisect
between the commits for v3.8.0 and v3.8.1, but when I tried to boot back
to v3.8.0, the error in the log showed up. It was not there previously.
Now if I reboot
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338148
Title:
[Acer Aspire V5-122P] suspend/resume failure
Status in “linux” package in Ubuntu:
N
Public bug reported:
using ubuntu 14.10
ProblemType: KernelOops
DistroRelease: Ubuntu 14.10
Package: linux-image-3.15.0-6-generic 3.15.0-6.11
ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
Uname: Linux 3.15.0-6-generic x86_64
Annotation: This occured during a previous suspend and prevent
Happened again during latest update.
"Examining /etc/kernel/header_postinst.d.
run-parts: executing /etc/kernel/header-postinst.d/dkms 3.13.0-30-generic
/boot/vmlinuz-3.13.0-30-generic
Error! The
... Build Exclusive"
Didn't allow me to copy and paste and it stopped the update software.
--
You r
** Tags removed: latest-bios-a08
** Tags added: latest-bios-a10
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1301601
Title:
[Dell Latitude E7440] suspend sometimes freezes when lock sc
Upgraded host kernel from mainline ppa.
https://wiki.ubuntu.com/Kernel/MainlineBuilds
[64-Bit hosts]
wget
http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.14.1-trusty/linux-headers-3.14.1-031401-generic_3.14.1-031401.201404141220_amd64.deb
http://kernel.ubuntu.com/~kernel-ppa/mainline/v3.14.1-
** Branch linked: lp:ubuntu/precise-security/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Changed in: linux (Ubuntu Lucid)
Status: New => Fix Released
** Changed in: linux (Ubuntu Saucy)
Status: New => Fix Released
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages
** Changed in: linux (Ubuntu Precise)
Status: Fix Released => New
** Changed in: linux (Ubuntu Saucy)
Status: Fix Released => New
** Changed in: linux (Ubuntu Trusty)
Status: Fix Released => New
** Changed in: linux (Ubuntu Lucid)
Status: Fix Released => New
--
You
This bug was fixed in the package linux - 3.2.0-65.99
---
linux (3.2.0-65.99) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 11:24:43
+01
This bug was fixed in the package linux - 3.13.0-30.55
---
linux (3.13.0-30.55) trusty; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesThu, 03 Jul 2014 16:15:57
+0
This bug was fixed in the package linux - 3.11.0-24.42
---
linux (3.11.0-24.42) saucy; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 09:20:33
+01
This bug was fixed in the package linux-lts-quantal -
3.5.0-52.79~precise1
---
linux-lts-quantal (3.5.0-52.79~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis H
This bug was fixed in the package linux - 2.6.32-62.126
---
linux (2.6.32-62.126) lucid; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 11:45:45
+
This bug was fixed in the package linux - 3.11.0-24.42
---
linux (3.11.0-24.42) saucy; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 09:20:33
+01
This bug was fixed in the package linux-ec2 - 2.6.32-366.81
---
linux-ec2 (2.6.32-366.81) lucid; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-2.6.32-62.126
[ Ubuntu: 2.6.32-62.126 ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
-
This bug was fixed in the package linux-lts-raring -
3.8.0-42.63~precise1
---
linux-lts-raring (3.8.0-42.63~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Hen
This bug was fixed in the package linux - 3.2.0-65.99
---
linux (3.2.0-65.99) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 11:24:43
+01
This bug was fixed in the package linux-lts-saucy -
3.11.0-24.42~precise1
---
linux-lts-saucy (3.11.0-24.42~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Hen
This bug was fixed in the package linux-lts-saucy -
3.11.0-24.42~precise1
---
linux-lts-saucy (3.11.0-24.42~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis Hen
This bug was fixed in the package linux - 2.6.32-62.126
---
linux (2.6.32-62.126) lucid; urgency=low
[ Upstream Kernel Changes ]
* x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
- LP: #1337339
- CVE-2014-4699
-- Luis HenriquesFri, 04 Jul 2014 11:45:45
+
** Tags added: kernel-cve-tracking-bug
** No longer affects: linux-armadaxp (Ubuntu)
** No longer affects: linux-ec2 (Ubuntu)
** No longer affects: linux-ec2 (Ubuntu Lucid)
** No longer affects: linux-lowlatency (Ubuntu Precise)
** No longer affects: linux-lowlatency (Ubuntu Saucy)
** No long
** No longer affects: linux-armadaxp (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
x86_64,ptrace: Enforce RIP <= TASK_SIZE_MAX (CVE-2014-4699)
Status i
** Information type changed from Private Security to Public Security
** No longer affects: linux-armadaxp (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1337339
Title:
** Description changed:
- [sctp: sk_ack_backlog wrap-around problem]
+ [sctp: sk_ack_backlog wrap-around problem] DOS
- Break-Fix: - d3217b15a19a4779c39b212358a5c71d725822ee
+ Break-Fix: de76e695a5ce19c121ba7e246b45f258be678a75
+ d3217b15a19a4779c39b212358a5c71d725822ee
--
You received this b
I can confirm the issue still exists on the new BIOS; it just happened
again. Closed laptop lid, screen turned off, laptop didn't go into
sleep, fan spins up, laptop is frozen.
output of sudo dmidecode -s bios-version && sudo dmidecode -s bios-
release-date:
GNET65WW (2.13 )
06/20/2014
I don't r
Clarification:
Screen does not always come up dimmed after suspend. Screen comes up
with setting prior to suspend.
If the computer has gone into suspend itself after being unused for a
certain amount of time it comes up dimmed, even if not deliberately set
to this by the user. In these circumst
Hi Adam,
thanks for putting so much efforts into solving this annoying bug. With
respect to your comment #31, how can on toogle the msi parameter?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338063
Title:
Brightness control lost after
Public bug reported:
Using Ubuntu 14.04. Recently updated to kernel version Ubuntu
3.13.0-30.54-generic 3.13.11.2
I expect brightness of my LCD screen to remain the same and be
controllable after waking from suspend. It doesn't and isn't.
This seems to have only started recently - presumably a
I was having this same problem on Ubuntu 14.04 and after a couple of days of
trying to fix it, I found a file inside /etc/pm/sleep.d/ which is called
99dw1704.
This file handles disabling and enabling the wl module on hibernate and
suspend. All I had to do to fix it is to run:
sudo chmod -x /et
*** This bug is a duplicate of bug 1286552 ***
https://bugs.launchpad.net/bugs/1286552
I was having this same problem on Ubuntu 14.04 and after a couple of days of
trying to fix it, I found a file inside /etc/pm/sleep.d/ which is called
99dw1704.
This file handles disabling and enabling the
This bug also affects me on an E540 with model number 20C6CTO1WW and
Bios 2.07. A workaround for me is disabling usb 3.0 in the bios - after
that suspend and resume work fine. Should I still open a new bug report
with my exact hardware details?
--
You received this bug notification because you ar
#14: Vanilla kernel or from ubuntu git?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1325560
Title:
kvm virtio netdevs lose network connectivity under "enough" load
Status in libvirt
#14: Upgraded host or virtual machine or both?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1325560
Title:
kvm virtio netdevs lose network connectivity under "enough" load
Status in l
Bug still present in 3.16 RC3
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1229591
Title:
8086:0116 [Dell Inspiron 14z (N411z)] Display brightness keys don't
generate evdev events af
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338035
Title:
RT3090
Public bug reported:
I've upgraded from 12.04 (actually Mint 13) to 14.04 (actually Mint 17)
(64bit), and my Wifi reception with my Ralink RT3090 is now very bad. I
only get good connectivity if I'm in the same room as my wifi router,
whereas previously or in Windows 7 I could connect to the route
I've since upgraded to the 3.14.1 kernel that will be in ubuntu 14.04.01
which has fixed the problem for me.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1325560
Title:
kvm virtio netd
I click on the "Activate" button from the previous dialog but it seems
it isn't activated.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to b43-fwcutter in Ubuntu.
https://bugs.launchpad.net/bugs/1338029
Title:
HP Pavilion zd7000 : bluet
Public bug reported:
The blueman-manager shows a dialog window which tells the bluetooth
isn't activated altough the Wifi/bluetooth button properly enabled the
wifi (and I achieved to communicate with the Internet through wifi with
this Lubuntu release).
ProblemType: Bug
DistroRelease: Ubuntu 14.
*** This bug is a duplicate of bug 790015 ***
https://bugs.launchpad.net/bugs/790015
I'm not able to reproduce it anymore. It used to happen very frequently,
then it stopped. It may be related to a kernel update.
** This bug has been marked a duplicate of bug 790015
subtle graphics corrupt
67 matches
Mail list logo