I've backport the driver to Xenial and gonna send the patch set shortly,
hopefully it will be available in next kernel release.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1590590
Title
tests ran: 7, failed: 4;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/pepe__4.9.0-3.4__2016-11-30_05-32-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16420
I was running the latest kernel and the issue went away.
But it returned after updating to 4.8.0-28-generic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1530405
Title:
NMI watchdog: B
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/gonzo__4.9.0-3.4__2016-11-30_07-28-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642
tests ran: 2, failed: 2;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/gonzo__4.9.0-3.4__2016-11-30_07-01-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642
New kernel 4.9 checks and fixes correct MTU in a minute after a request
time out only.
After each suspend or reboot this happens again.
Please make MTU fix on wifi network handshake.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
tests ran: 64, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/gonzo__4.9.0-3.4__2016-11-30_06-13-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1642
Thanks Viktor.
Following my post #65...
I've been running kernel 4.4.0-47-generic for a week now and the problem has
not come up once.
So for my part, the kernel update has fixed it.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
*** This bug is a duplicate of bug 1633321 ***
https://bugs.launchpad.net/bugs/1633321
** This bug has been marked a duplicate of bug 1633321
Fix alps driver for multitouch function.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
tests ran: 64, failed: 64;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/gonzo__4.9.0-3.4__2016-11-30_02-48-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/164
> Linux up 4.9.0-997-generic #201611212212 SMP Tue Nov 22 03:14:21 UTC 2016
> x86_64 x86_64 x86_64 GNU/Linux
#90 fixed the issue, as well as "air plane mode"
thanks a lot!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
tests ran: 2, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/michael__4.9.0-3.4__2016-11-30_05-20-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1640549
Title:
linux: 3.2.0-116.158 -pr
should the apport command be run AFTER installing the offending
1404_HWE_EOL update?
I/m guessing so.. but please confirm.
thanks
rich
On Tue, Nov 29, 2016 at 10:01 PM, Brad Figg wrote:
> This bug is missing log files that will aid in diagnosing the problem.
> >From a terminal window please ru
tests ran: 5, failed: 3;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/pepe__4.9.0-3.4__2016-11-30_02-52-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16420
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1645985
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
I think this issue was there earlier also.
Installed kernel 4.9 rc7
First few pages in browser of websites mentioned above get request time out.
Try economictimes.indiatimes.com first in browser.
MTU probe now is earlier than previous kernels.
It will help users if MTU is probed and fixed at wi
The new kernel 4.9 rc7 probes and fixes correct MTU in a minute.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Tags added: kernel-bug-exists-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
--- Comment From cdead...@us.ibm.com 2016-11-29 23:36 EDT---
Historical context: State: Assigned by: cde00 on 29 November 2016 22:36:16
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/beketov__4.9.0-3.4__2016-11-30_04-34-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
tests ran: 2, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/rumford__4.9.0-3.4__2016-11-30_04-31-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
Debian kernel package with genwqe-bad-page.patch applied.
** Attachment added: "linux-image-4.4.0-33.52+_4.4.0-33.52+-6_s390x.deb"
https://bugs.launchpad.net/bugs/1559194/+attachment/4785022/+files/linux-image-4.4.0-33.52+_4.4.0-33.52+-6_s390x.deb
--
You received this bug notification becaus
Public bug reported:
System: Lenovo Thinkpad T530 laptop
OS: ubuntu 14.04 LTS, kernel 3.19.0-66-generic 64bit
lsb_release -rd
Description:Ubuntu 14.04.5 LTS
Release:14.04
With the above configuration the keyboard backlights and screen-top
illuminator work as they are supposed to.
In
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
Digging around the thinkpad_acpi.c code, I see there is some code
already for tablet and laptop modes, but for X41t, X60 and others.
Namely tpacpi_input_send_tabletsw(void)
that seems to send SW_TABLET_MODE
(which makes more sense to me than KEY_ROTATE_DISPLAY)
Not sure of this has to do with thi
tests ran: 19, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/fozzie__4.9.0-3.4__2016-11-30_02-51-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/164
tests ran: 2, failed: 0;
http://kernel.ubuntu.com/testing/4.9.0-3.4-generic/beketov__4.9.0-3.4__2016-11-30_02-59-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
without that thinkpad_acpi patch:
~ $> $sudo acpi_listen
[sudo] password for lorn-potter:
ibm/hotkey LEN0068:00 0080 60c0
PNP0C14:04 00b0
ibm/hotkey LEN0068:00 0080 60c0
PNP0C14:04 00b0
ibm/hotkey LEN0068:00 0080 60c0
with the patch:
~ $> $sudo ac
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1640621
Title:
linux-lts-vivi
The verification of the Stable Release Update for linux-lts-xenial has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you en
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
*** This bug is a duplicate of bug 1644611 ***
https://bugs.launchpad.net/bugs/1644611
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #4
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux-lts-xenial has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you en
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
tests ran: 18, failed: 0;
http://kernel.ubuntu.com/testing/3.13.0-103.150~precise1-generic/onza__3.13.0-103.150~precise1__2016-11-30_01-07-00/results-index.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: hwe-next
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
*** This bug is a duplicate of bug 1644611 ***
https://bugs.launchpad.net/bugs/1644611
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #4
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
*** This bug is a duplicate of bug 1644611 ***
https://bugs.launchpad.net/bugs/1644611
The verification of the Stable Release Update for linux-lts-xenial has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
*** This bug is a duplicate of bug 1644611 ***
https://bugs.launchpad.net/bugs/1644611
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #4
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: hwe-next
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.4.0-51.72
---
linux (4.4.0-51.72) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1644611
* 4.4.0-1037-snapdragon #41: kernel panic on boot (LP: #1644596)
- Revert "dma-mapping: introduce the DMA_ATTR_NO_
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are a
*** This bug is a duplicate of bug 1644611 ***
https://bugs.launchpad.net/bugs/1644611
The verification of the Stable Release Update for linux-lts-xenial has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
This bug was fixed in the package linux - 3.19.0-75.83
---
linux (3.19.0-75.83) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1640613
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: ptrace: being capable
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a re
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
This bug was fixed in the package linux - 4.8.0-28.30
---
linux (4.8.0-28.30) yakkety; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1641083
* lxc-attach to malicious container allows access to host (LP: #1639345)
- Revert "UBUNTU: SAUCE: (noup) ptrace:
1 - 100 of 375 matches
Mail list logo