apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1462108/+attachment/4410096/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1462108/+attachment/4410088/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1462108
Ti
I tried to perform a cherry-pick of 4cfe87853. However, it looks like
it will also need the following commits backported or cherry-picked:
7c2ce6e
b6e97c1
a145df2
8e09134
14747cd
4cfe8785
I'll try to build a test kernel with these commits, but it may be too
many changes for an SRU.
In the mean
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1462108/+attachment/4410098/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1462108/+attachment/4410093/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1462108
Probably a duplicate of bug 90508. Could you give the patch referenced
there a try?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1409133
Title:
Heavy black flickering with Intel graphi
Verified with a trusty and vivid base.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451593
Title:
[S
** Tags removed: verification-verified-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1455121
Title:
[SRU trusty] net/mlx4_core: Adjust com
Verified with both a trusty and vivid base.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1455105
Title:
The Utopic kernel does not work for us, it crashes. Continuing with
Vivid testing.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1445195
Title:
[Hyper-V] Kernel patches for storvsc
Sta
Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ
Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ
Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ
Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ Øæ¾šŸÐ
** Description changed:
- [btrfs: non-atomic xattr replace operation]
+ The Btrfs implementation in the Linux kernel before 3.19 does not ensure
+ that the visible xattr state is consistent with a requested replacement,
+ which allows local users to bypass intended ACL settings and gain
+ privileg
** Description changed:
- [DoS -- OOPS NULL pointer dereference in nf_nat_setup_info+0x471]
+ include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem
+ in the Linux kernel before 3.14.5 uses an insufficiently large data type
+ for certain extension data, which allows local users to
** Description changed:
- Linux mishandles int80 fork from 64-bit tasks
+ arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not
+ prevent the TS_COMPAT flag from reaching a user-mode task, which might
+ allow local users to bypass the seccomp or audit protection mechanism
+ via a c
** Description changed:
- [IPv6 Hop limit lowering via RA messages]
+ The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor
+ Discovery (ND) protocol implementation in the IPv6 stack in the Linux
+ kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit
+ setting
** Description changed:
- [chown() was racy relative to execve()]
+ Race condition in the prepare_binprm function in fs/exec.c in the Linux
+ kernel before 3.19.6 allows local users to gain privileges by executing
+ a setuid program at a time instant when a chown to root is in progress,
+ and the
** Changed in: linux (Ubuntu Vivid)
Importance: Undecided => High
** Changed in: linux (Ubuntu Utopic)
Importance: Undecided => High
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided => High
--
You received this bug notification because you are a member of Kernel
Packages, whi
The touchpad of Dell XPS 13 (2015) in I2C mode never works with trusty 3.13
kernel.
However the touchpad of Dell XPS 13 (2015) in PS/2 mode does work with trusty
3.13 kernel by default.
I need to use osi_acpi="Windows 2013" to make it function in I2C mode with
trusty 3.13 kernel.
--
You receiv
Arnaud LE CAM, just to clarify, how long would you go without
interruption before the WORKAROUND?
>"Can I downgrade back to kernel 3.19.0-18 (setting ips and fwlps options to 0)
>to keep a "regular" Ubuntu install ?"
Feel free to test and advise if it changes anything.
>"Should I do nothing else
Arvin Razavi, this bug report is being closed due to your last comment
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1459365/comments/23
regarding this being fixed with a BIOS update. For future reference you
can manage the status of your own bugs by clicking on the current status
in the yel
This was fixed in bug #1326199
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1416548
Title:
IBM Power8 requires rootdelay= in order to boot
Status in linux package in Ubuntu:
Confirm
i don't think it's the kernel after all. i just tested the previous
3.13.0-48 kernel and the issue is still present. any ideas on what to
check?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Changed in: hwe-next
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1459937
Title:
Support bluetooth device 0cf3:e007
Status in HWE Next P
** Changed in: hwe-next
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1459934
Title:
Support bluetooth device 0cf3:e006
Status in HWE Next P
** Tags added: cherry-pick
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1460313
Title:
webcam indicator LED remains l
ishbalai, please do not adjust the Status from Triaged. For more on
this, please see https://wiki.ubuntu.com/Bugs/Status .
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to l
rob loranger, could you please provide the missing information following
https://wiki.ubuntu.com/DebuggingKernelSuspend ?
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
** Tags added: needs-bisect regression-release
--
You received this bug notification because you are a m
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1446724
Title:
server is stable under older kernel (3.2.0-29.46), but
Carl Englund, could you please test the latest mainline kernel (4.1-rc6)
and advise to the results?
** Tags removed: kernel-bug-exists-upstream-4.1.0-040100rc5
** Tags added: kernel-bug-exists-upstream-4.1-rc5
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received
*** This bug is a security vulnerability ***
Public security bug reported:
A UDF filesystem image with malicious lengths specified in multiple
datastructures could cause crashes or other undesired behaviours.
Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
Break-Fix: - e237ec37ec154564f869
CVE-2014-9728
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[iinfo->i_lenAlloc != inode->i_size]
Break-Fix: - e159332b9af4b04d882dbcfe1bb0117f0a6d4b58
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Med
CVE-2014-9729
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[properly ignore component length for component types that do not use
it]
Break-Fix: - e237ec37ec154564f8690c5bd1795339955eeef9
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-a
CVE-2014-9730
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[udf: information leakage when reading symlink]
Break-Fix: - 0e5cc9a40ada6046e6bc3bdfcd0c0d7e4b706b14
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Impo
CVE-2014-9731
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
A flaw was found in the way pipe_iov_copy_from_user() and
pipe_iov_copy_to_user() functions handled iovecs remaining len
accounting on failed atomic access. An unprivileged local user could
this flaw to crash the system or
CVE-2015-1805
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[fs: udf kernel oops]
Break-Fix: - 23b133bdc452aa441fcb9b82cbf6dd05cfd342d0
** Affects: linux (Ubuntu)
Importance: Medium
Status: New
** Affects: linux-armadaxp (Ubuntu)
Importance: Medium
St
CVE-2015-4167
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
[vulnerability in the kernel tty subsystem]
Break-Fix: - 4898e640caf03fdbaf2122d5a33949bf3e4a5b34
Break-Fix: - cf872776fc84128bb779ce2b83a37c884c3203ae
** Affects: linux (Ubuntu)
Importance: Medium
Status:
CVE-2015-4170
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
Public bug reported:
I have received very similar bugs on 3.13.0-53, 3.13-0.52, 3.13.0-51 and
3.13.0-49. I will be falling back to 3.13.0-45, which is the last kernel
where I believe I didn't have this problem.
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-49-generic 3.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1462180
Title:
Bad pag
** Description changed:
+ [Impact]
+
+ * The move to dev_printk has sufficiently modified the scsi error
+ output that it confuses some automated log monitoring. This causes some
+ errors to not be definitively connected to a disk. Context does help,
+ but separate line context is difficult to
The touchpad of Dell XPS 13 (2015) in I2C mode doesn't work at all.
So there is no regression that I can tell.
It doesn't work worse.
It doesn't work better either.
Maybe it does work on some platform, however I don't know.
** Tags removed: verification-failed-trusty
** Tags added: verification-ne
@Shih-Yuan, How about this kernel, which contains all the patches we
might need? http://kernel.ubuntu.com/~adamlee/lp1456881_all_patches/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1456
101 - 152 of 152 matches
Mail list logo