** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1544978
Title:
PCI Call Traces hw csum failure in dmesg with
Public bug reported:
[Steps]
1. Plug in a PS/2 mouse to PS/2 mouse jack
2. Boot system (note that PS/2 does not support hotplug so device must be cold
booted)
3. Check if PS/2 mouse works
[Expected result]
PS/2 mouse should work
[Actual]
PS/2 mouse does not work in Ubuntu.
* Note that:
- PS/2
This needs a similar fix in kernel like this one -
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/737482
** Attachment added: "dmidecode.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1591053/+attachment/4680780/+files/dmidecode.log
** Tags added: originate-from-1538965 somer
@adubinsky
Make sure you have efivarfs mounted read-write and the mokutil command is run
with root permission.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1571691
Title:
linux: MokSB
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591044
Title:
Thunderbolt hotplug causes sys
Public bug reported:
Hotplugging either Apple's USB-C thunderbolt -> HDMI adapter or Dell's
TB15 Thunderbolt cause a system panic. This is fixed upstream in v4.6.0
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: linux-image-4.4.0-24-generic 4.4.0-24.43
ProcVersionSignature: Ubuntu 4.4.0-2
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1589886
Title:
Wireless hotkey fails on Dell XPS 15 9550
Status in linux package in Ubuntu:
Firmware is missing:
[3.479417] bluetooth hci0: Direct firmware load for brcm/BCM-0a5c-6410.hcd
failed with error -2
[3.479421] Bluetooth: hci0: BCM: Patch brcm/BCM-0a5c-6410.hcd not found
--
You received this bug notification because you are a member of Kernel
Packages, which is subscr
I was experiencing this same issue in 4.4.0-22. Confirmed fixed in
4.4.0-24
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1581005
Title:
Dell XPS 15 9550 Freezes when HDMI is plugged i
You have been subscribed to a public bug:
Title: Wireless hotkey fails on Dell XPS 15 9550
Summary:
Wireless key does nothing on Dell XPS 15 9550.
Observing "watch -n1 rfkill list", nothing changes when pressing wireless
hotkey (Fn + PrtScr)
Only message in /var/log/kern.log:
kernel: [10909.979
I have not had a repeat of this issue after disabling USB 3 (it disables
3.1 not 3) in my bios. A bug has been raised with asus re the X99 deluxe
v3101 of their bios. Hope this helps someone.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
git://kernel.ubuntu.com/rtg/ubuntu-trusty.git lp1572624
** Attachment added: "Trusty compile error log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1572624/+attachment/4680734/+files/log.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is
I'm also getting this problem on my Compaq Presario CQ60. Fn+F7/Fn+F8
don't work to set brightness (though other Fn keycodes generally work),
and in fact I can't seem to find anything to set any value of brightness
at all, and the computer seems to be stuck on the setting of "blindingly
bright." /s
v4.7-rc2 kernel (http://kernel.ubuntu.com/~kernel-
ppa/mainline/v4.7-rc2-yakkety/) sees the same issue:
[ 70.064983] kernel BUG at
/home/kernel/COD/linux/drivers/md/bcache/super.c:1822!
[ 70.065214] invalid opcode: [#1] SMP
[ 70.065355] Modules linked in: fuse ppdev input_leds lpc_ich
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1591030
Title:
package linux-image-3.13.0-71-
Public bug reported:
this presents several minutes after I have logged in.
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-71-generic 3.13.0-71.114
ProcVersionSignature: Ubuntu 3.13.0-87.133-generic 3.13.11-ckt39
Uname: Linux 3.13.0-87-generic x86_64
ApportVersion: 2.
In case anyone else hits this on their laptop and would like to disable
the auto-suspend, I installed dconf-editor, and changed critical-
battery-action to nothing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://b
** Attachment added: "dmesg-after-core.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680681/+files/dmesg-after-core.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Attachment added: "dmesg-after-none.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680678/+files/dmesg-after-none.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Attachment added: "suspend_stats"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680670/+files/suspend_stats
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
** Attachment added: "dmesg-after-processors.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680671/+files/dmesg-after-processors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https
** Attachment added: "dmesg-after-platform.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680677/+files/dmesg-after-platform.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://b
Both the suspension test after using core and platform commands
reproduced the problem
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1576909
Title:
Suspend not working on Ubuntu 16.04
** Attachment added: "dmesg-after-freezer.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680679/+files/dmesg-after-freezer.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
Hello.
Tested with Kernel 4.6.2-040602-generic. The problem happens when
closing the laptop lid. As mentioned, the screen goes black, but disks
and fans keep working and power led does not go off.
I am attaching the trace files according the debugging guide
** Attachment added: "wakeup"
http
** Attachment added: "dmesg-after-devices.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1576909/+attachment/4680680/+files/dmesg-after-devices.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
Jan Stutzki, to clarify, did you test hibernate (not suspend) with
4.7-rc2?
** Tags removed: latest-bios-1.2.13
** Tags added: latest-bios-1.2.14
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/
Showed up when I tested with Wily, which I know did not previously have
the issue. Will consider it a hardware fault. Sorry for the
inconvenience.
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu)
Importance: High => Undecided
--
You received thi
** Tags added: xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/830915
Title:
[Oneiric] Error during kernel upgrade: Could not locate dkms.conf file
Status in dkms package in Ubuntu
Setting governor to performance did not help. Problem also evident with
Xenial installation media (kernel 4.4.0.21 I believe). Going to try with
Wily installation media to ensure it is not there and it is not a newly
found hardware issue (like if I bumped my laptop touchpad cable loose).
--
You r
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1590985
Title:
Wifi non-functional after susp
I completed the bisection and googling the resulting commit ID revealed
that this bug has already been reported upstream.
** Bug watch added: Linux Kernel Bug Tracker #107151
http://bugzilla.kernel.org/show_bug.cgi?id=107151
** Also affects: linux via
http://bugzilla.kernel.org/show_bug.cgi
I'm also facing the kswap0 99% CPU issue. Typically, I notice it start
minutes after boot time, but restarting the MongoDB process on the
server will temporarily fix it, however the process will usually pop up
again randomly.
I used to run test instances of MongoDB on AWS t2.micros with no issues
Also looking at https://lists.launchpad.net/kernel-
packages/msg17719.html, my governor is set to powersave. And I can
confirm that scaling is actively happening in the background when I see
this issue of the sync bytes lost (well at least /proc/cpuinfo shows
different MHz before and after I see th
Public bug reported:
Often, but not always, on resume from suspend my wifi does not connect.
Usually in the networking tray drop-down I can see one wifi network
listed (out of dozens).
I clear it with the hammer of:
sudo rmmod iwldvm && sudo modprobe iwldvm
I'm not sure what would be more a
Nope, just in xenial. Did not happen in wily.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1587594
Title:
mouse lo
Guntbert Reiter, to clarify, what was the most recent release of Ubuntu
this last worked in?
** Tags added: kernel-bug-exists-upstream kernel-bug-exists-
upstream-4.7-rc2
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18
---
linux-snapdragon (4.4.0-1015.18) xenial; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.4.0-24.42 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent sta
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-raspi2 - 4.4.0-1012.16
---
linux-raspi2 (4.4.0-1012.16) xenial; urgency=low
[ Andy Whitcroft ]
* Rebase against Ubuntu-4.4.0-23.41
[ Ubuntu: 4.4.0-24.43 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory openin
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-raspi2 - 4.2.0-1031.41
---
linux-raspi2 (4.2.0-1031.41) wily; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.2.0-38.45 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking file
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18
---
linux-snapdragon (4.4.0-1015.18) xenial; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.4.0-24.42 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent sta
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-raspi2 - 4.4.0-1012.16
---
linux-raspi2 (4.4.0-1012.16) xenial; urgency=low
[ Andy Whitcroft ]
* Rebase against Ubuntu-4.4.0-23.41
[ Ubuntu: 4.4.0-24.43 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory openin
This bug was fixed in the package linux-lts-vivid - 3.19.0-61.69~14.04.1
---
linux-lts-vivid (3.19.0-61.69~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-lts-trusty -
3.13.0-88.135~precise1
---
linux-lts-trusty (3.13.0-88.135~precise1) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking fi
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92
---
linux-armadaxp (3.2.0-1667.92) precise; urgency=low
[ Andy Whitcroft ]
* rebase to 3.2.0-104.145
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux-lts-wily - 4.2.0-38.45~14.04.1
---
linux-lts-wily (4.2.0-38.45~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems o
This bug was fixed in the package linux - 4.2.0-38.45
---
linux (4.2.0-38.45) wily; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbid
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92
---
linux-armadaxp (3.2.0-1667.92) precise; urgency=low
[ Andy Whitcroft ]
* rebase to 3.2.0-104.145
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on
This bug was fixed in the package linux - 4.4.0-24.43
---
linux (4.4.0-24.43) xenial; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forbi
This bug was fixed in the package linux - 3.19.0-61.69
---
linux (3.19.0-61.69) vivid; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesystems on top
- SAUCE: ecryptfs: forb
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1482.109
---
linux-ti-omap4 (3.2.0-1482.109) precise; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix hand
This bug was fixed in the package linux-snapdragon - 4.4.0-1015.18
---
linux-snapdragon (4.4.0-1015.18) xenial; urgency=low
[ Kamal Mostafa ]
[ Ubuntu: 4.4.0-24.42 ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent sta
This bug was fixed in the package linux - 3.2.0-104.145
---
linux (3.2.0-104.145) precise; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on top
- ecryptfs: fix handling of directory opening
- ecryptfs: don't r
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92
---
linux-armadaxp (3.2.0-1667.92) precise; urgency=low
[ Andy Whitcroft ]
* rebase to 3.2.0-104.145
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on
This bug was fixed in the package linux-armadaxp - 3.2.0-1667.92
---
linux-armadaxp (3.2.0-1667.92) precise; urgency=low
[ Andy Whitcroft ]
* rebase to 3.2.0-104.145
[ Ubuntu: 3.2.0-104.145 ]
* CVE-2016-1583 (LP: #1588871)
- SAUCE: proc: prevent stacking filesystems on
This bug was fixed in the package linux-lts-utopic -
3.16.0-73.95~14.04.1
---
linux-lts-utopic (3.16.0-73.95~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesys
This bug was fixed in the package linux-lts-xenial - 4.4.0-24.43~14.04.1
---
linux-lts-xenial (4.4.0-24.43~14.04.1) trusty; urgency=low
[ Kamal Mostafa ]
* CVE-2016-1583 (LP: #1588871)
- ecryptfs: fix handling of directory opening
- SAUCE: proc: prevent stacking filesyste
1 - 100 of 328 matches
Mail list logo