** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1547718
Title:
4.4.0-7.22 no longer boots on arm64
Status in linux package in Ubuntu:
Confirmed
Status in l
I can upgrade to Xenial, i will keep trying until i get it to function. I will
go through all the releases i can, i think eventually it will fix, considering
that i can use the touchpad even in this release's live CD.
If a come to an answer myself i will update this bug.
Thanks for all your help
I tested the machine with Ubuntu 16.04 (obtained via
http://cdimage.ubuntu.com/daily-live/current/ ) and while WI-FI worked,
the touchpad (which works with 14.04) did not work.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubun
** Attachment added: "pm test core"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530476/+attachment/4578287/+files/core.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/15304
pm test none failed. The laptop went to sleep and never woke up.
memory48 hash matches when booting up again.
it seems like there is some special thing with lid and power button when
it comes to wakeup
--
You received this bug notification because you are a member of Kernel
Packages, which is s
** Attachment added: "pnm test freezer"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530476/+attachment/4578289/+files/freezer.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
** Attachment added: "pm test platform"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530476/+attachment/4578290/+files/platform.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Attachment added: "pm test processor"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530476/+attachment/4578291/+files/processors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
** Attachment added: "pm test devices"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1530476/+attachment/4578288/+files/devices.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
*** This bug is a duplicate of bug 1543167 ***
https://bugs.launchpad.net/bugs/1543167
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #15
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
Rectification about the hotfix instruction procedure on comment #11.
Instructions
--
# Add the PPA to your system
$ sudo add-apt-repository ppa:slashd/bug1546320-hotfix
# Resynchronize the package index files from their sources
$ sudo apt-get update
# Installing the packages desired for installa
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux-lts-trusty -
3.13.0-79.123~precise1
---
linux-lts-trusty (3.13.0-79.123~precise1) precise; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: over
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux-lts-utopic -
3.16.0-62.82~14.04.1
---
linux-lts-utopic (3.16.0-62.82~14.04.1) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux-lts-trusty -
3.13.0-79.123~precise1
---
linux-lts-trusty (3.13.0-79.123~precise1) precise; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: over
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1535150
Title:
overlayfs over fuse should refuse copy_up of files if u
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
This bug was fixed in the package linux - 3.13.0-79.123
---
linux (3.13.0-79.123) trusty; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials instead
LOL
Ok, i can use the touchpad now, i didn't do anything. It just started working
like that.
I swept my hand trough the notebook to clean some food that i dropped in one
corner and i saw the cursor moving.
I think that with one of the restarts it finally detected it.
Hope it'll last long.
I wonde
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1534961
Title:
insecure overlayfs xattrs handling in copy_up
Status i
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
This bug was fixed in the package linux - 4.2.0-30.35
---
linux (4.2.0-30.35) wily; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials inst
root@piglet:~# acpitool -w
Device S-state Status Sysfs node
---
1. LID S4*enabled platform:PNP0C0D:00
2. SLPB S3*enabled platform:PNP0C0E:00
3. IGBE S4*disabled
4. PXSX S4*disabled
5. E
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux - 3.19.0-51.57
---
linux (3.19.0-51.57) vivid; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1531747, #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: overlayfs: Use mounter's credentials i
This bug was fixed in the package linux-lts-trusty -
3.13.0-79.123~precise1
---
linux-lts-trusty (3.13.0-79.123~precise1) precise; urgency=low
[ Seth Forshee ]
* SAUCE: cred: Add clone_cred() interface
- LP: #1534961, #1535150
- CVE-2016-1575 CVE-2016-1576
* SAUCE: over
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/certification-testing
Status: Fix Released => Invalid
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.2.0-1662.86 upload package. This bug will
contain status and tes
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Description changed:
This bug is for tracking the 3.2.0-1477.100 upload package. This bug
will contain status and te
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1543167
Title:
linux: 4.2.0-29.34 -proposed tracker
Status i
** Changed in: kernel-sru-workflow
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540576
Title:
linux: 3.19.0-50.56 -proposed tracker
Status i
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1541076
Title:
linux-lts-utopic: 3.16.0-61.81~14.0
Mitja, regarding the touchpad issue, it will help immensely if you filed a new
report with 16.04 via a terminal:
ubuntu-bug linux
Please feel free to subscribe me to it.
For more on why this is helpful, please see
https://wiki.ubuntu.com/ReportingBugs.
** Changed in: linux (Ubuntu)
Statu
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540559
Title:
linux: 3.13.0-78.122 -proposed tracker
Status
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1540792
Title:
linux-lts-vivid: 3.19.0-50.56~14.04.
This bug was fixed in the package linux-armadaxp - 3.2.0-1662.86
---
linux-armadaxp (3.2.0-1662.86) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1540721
* Rebase to Ubuntu-3.2.0-99.139
[ Ubuntu: 3.2.0-99.139 ]
* Release Tracking Bug
- LP: #1540
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1540752
Title:
linux-lts-trusty: 3.13.0-78.122~pre
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-armadaxp - 3.2.0-1662.86
---
linux-armadaxp (3.2.0-1662.86) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1540721
* Rebase to Ubuntu-3.2.0-99.139
[ Ubuntu: 3.2.0-99.139 ]
* Release Tracking Bug
- LP: #1540
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1477.100
---
linux-ti-omap4 (3.2.0-1477.100) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1540720
[ Ubuntu: 3.2.0-99.139 ]
* Release Tracking Bug
- LP: #1540538
* Revert "net: add length
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1477.100
---
linux-ti-omap4 (3.2.0-1477.100) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1540720
[ Ubuntu: 3.2.0-99.139 ]
* Release Tracking Bug
- LP: #1540538
* Revert "net: add length
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Chris J Arges
(arges)
** Changed in: kernel-sru-workflow/promote-to-security
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542497
This bug was fixed in the package linux - 3.2.0-99.139
---
linux (3.2.0-99.139) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1540538
[ Upstream Kernel Changes ]
* Revert "net: add length argument to skb_copy_and_csum_datagram_iovec"
- LP: #154051
This bug was fixed in the package linux - 3.2.0-99.139
---
linux (3.2.0-99.139) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1540538
[ Upstream Kernel Changes ]
* Revert "net: add length argument to skb_copy_and_csum_datagram_iovec"
- LP: #154051
This bug was fixed in the package linux - 3.2.0-99.139
---
linux (3.2.0-99.139) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1540538
[ Upstream Kernel Changes ]
* Revert "net: add length argument to skb_copy_and_csum_datagram_iovec"
- LP: #154051
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This kernel (88867e3d0b7eea256c1cd432b0a3c7a21e8edf07) exhibits the bug.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1542188
Title:
Adaptive keyboard breaks with sleep/resume
Status
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/upload-to-ppa
Status: New => Fix Released
** Changed in: linux-ti-omap4 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bug
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1540538
Title:
linux: 3.2.0-99.139 -proposed tracker
Status in Kernel SRU Work
** Tags added: patch
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1535150
Title:
overlayfs over fuse should refuse copy_up of files if uid/gid not
mapped
Status in linux package in
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: New => Fix Committed
** Ch
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: In Progress => Fix Committed
** Also affects: linux-lts-utopic (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-lts-utopic (Ubuntu V
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1536837
Title:
Severe performance regression in Infiniband or IPoIB
Sta
All builds are complete, packages in this bug can be copied to
-proposed.
Derivative packages from packages here can be worked on, the following tracking
bugs were opened for them:
linux-ti-omap4 - bug 1548505
linux-armadaxp - bug 1548506
** Changed in: kernel-sru-workflow/promote-to-proposed
This tracking bug was opened to be worked from linux-3.2.0-99.139 update
(bug 1548504)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1548506
Title:
linux-armadaxp: -proposed t
It also been brought to my attention the following about the hotfix
kernel:
--
Hi Eric,
We have applied the update from your PPA to the controller nodes and
they have been stable over the weekend. We will see if they remain
stable under load over the rest of the week.
Thanks
--
Eric
--
You re
Public bug reported:
This bug is for tracking the 3.2.0-99.139 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
401 - 500 of 583 matches
Mail list logo