*** This bug is a duplicate of bug 1450415 ***
https://bugs.launchpad.net/bugs/1450415
Public bug reported:
This bug is for tracking the 3.19.0-16.16 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated wo
** Summary changed:
- linux-lts-utopic: 3.16.0-37.50~14.04.1 -proposed tracker
+ linux-lts-utopic: 3.16.0-37.51~14.04.1 -proposed tracker
** Description changed:
- This bug is for tracking the 3.16.0-37.50~14.04.1 upload package. This
+ This bug is for tracking the 3.16.0-37.51~14.04.1 upload pa
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: Invalid => New
** Changed in: kernel-sru-workflow
Status: Invalid => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bug
Public bug reported:
This bug is for tracking the 3.16.0-38.52 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
** Changed in: linux (Ubuntu Utopic)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1414930
Title:
[Lenovo ThinkPad 2015 models] Buttons of Syna
** Changed in: linux (Ubuntu Utopic)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1434581
Title:
Console extremely slow with 3.13 and newer ke
** Changed in: linux (Ubuntu Utopic)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1436745
Title:
Audio can not output via system internal spea
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
Public bug reported:
This bug is for tracking the 3.13.0-53.87 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
Since this fix came in through upstream stable updates (3.16 for utopic
and 3.19 for vivid), I'm tagging this bug as verified for these 2
series.
** Tags added: verification-done-utopic verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, whi
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
l shows this warning.
[Fix]
A patch with the following should fix it:
- trace_open_exec(name);
+ trace_open_exec(name->name);
** Affects: linux (Ubuntu)
Importance: Low
Assignee: Luis Henriques (henrix)
Status: Triaged
** Affects: linux (Ubuntu Utopic)
Imp
** Patch added:
"0001-UBUNTU-SAUCE-no-up-trace-fix-trace_open_exec-invocat.patch"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1453848/+attachment/4395516/+files/0001-UBUNTU-SAUCE-no-up-trace-fix-trace_open_exec-invocat.patch
--
You received this bug notification because you are a me
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Description changed:
-
- SRU Justification
-
- Impact:
-The upstream process for stable tree updates is quite similar
-in scope to the Ubuntu SRU process, e.g., each patch has to
-demonstrably fix a bug, and each patch is vetted by upstream
-by originat
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: linux (Ubuntu Utopic)
Assignee: (unassigned) => Luis Henriques (henrix)
--
You received this bug notification because you are a
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
prm for set[ug]id executables
+ net:socket: set msg_namelen to 0 if msg_name is passed as NULL in msghdr
struct from userland.
+ NFSv4: Minor cleanups for nfs4_handle_exception and nfs4_async_handle_error
** Changed in: linux (Ubuntu Precise)
Assignee: (unassigned) => Luis Henriques (henrix
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1454300
Title:
Precise update to 3.2.69 stable release
Status in
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
ve frag_max_size between PRE and POST_ROUTING
+ Linux 3.19.7
+
+ The following patch from 3.19.7 was already applied in the Vivid kernel:
+
+ powerpc/perf: Cap 64bit userspace backtraces to PERF_MAX_STACK_DEPTH
** Changed in: linux (Ubuntu Vivid)
Assignee: (unassigned) => Luis Henriques (henr
_node_init() in ping_unhash().
+ clk: at91: usb: fix determine_rate prototype
+ Linux 3.19.8
** Changed in: linux (Ubuntu Vivid)
Assignee: (unassigned) => Luis Henriques (henrix)
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1454702
Title:
Vivid update to 3.19.8 stable release
Status in lin
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1454699
Title:
Vivid update to 3.19.7 stable release
Status in lin
owing patches are in the 3.13.11-ckt20 stable release:
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Invalid
** Affects: linux (Ubuntu Trusty)
Importance: Undecided
Assignee: Luis Henriques (henrix)
Status: New
** Tags: kernel-stable-tracking-bug
** Tags
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1451900
Title:
Trusty update to v3.13.11-ckt19 stable release
Status in linux
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1436001
Title:
Trusty update to v3.13.11-ckt17 stable release
Stat
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1454746
Title:
Trusty update to 3.13.11-ckt20 stable release
Stat
I took a quick look at recent commits that affect
drivers/thermal/int340x_thermal/acpi_thermal_rel.c and the following
commit caught my attention:
commit 7b09406390e76df97c9f5f29c23a4f56d982f22c
Author: Ilkka Koskinen
Date: Tue Dec 9 12:34:03 2014 -0800
Thermal/int340x: Handle properly the
> Question: should I install all four debs, so also the linux-image-
extra?
Yes. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1418286
Title:
kernel BUG at /build/buildd/linux
>From the above, it looks like you are not running the test kernel. I
don't think 'uname -a' would show the "lp1418286v1" string, but the
build date should be Feb 17, not 6. (BTW, running something like
'dmesg|grep "Linux version"' should show that "~lp1418286v1" string).
So, it looks like the i
Awesome, thanks for testing. The kernel currently in -proposed is
3.18.0-14.15 and it's likely the last 3.18 kernel for Vivid -- the next
one should already be a 3.19 kernel. Since 3.19 kernel already contains
the fix for this bug, I don't think there's a need to actually SRU the
fix as it will n
Thank you for the report. It looks like the next SRU cycle (which
starts next week) will already contain the fixes for all the relevant
kernels as the relevant stable kernels already include it:
- 3.2.67 for Precise
- 3.13.11-ckt16 for Trusty
- 3.16.7-ckt5 for Utopic
Judging from the commit text
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
CVE-2014-9715
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects:
*** This bug is a security vulnerability ***
Public security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance:
*** This bug is a security vulnerability ***
Public security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance:
CVE-2015-4003
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance:
CVE-2015-4002
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
*** This bug is a security vulnerability ***
Public security bug reported:
Placeholder
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-ec2 (Ubuntu)
Importance: Undecided
Status: New
** Affects: linux-fsl-imx51 (Ubuntu)
Importance:
CVE-2015-4001
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-fsl-imx51 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux-mvl-dove (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: li
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465613
** Description changed:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating eit
** Changed in: linux (Ubuntu Utopic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465653
Title:
Utopic update to 3.16.7-ckt13 stable release
Statu
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly
** Description changed:
+ SRU Justification
- SRU Justification
+ Impact:
+ The upstream process for stable tree updates is quite similar
+ in scope to the Ubuntu SRU process, e.g., each patch has to
+ demonstrably fix a bug, and each patch is vetted by upstream
+
** Changed in: linux (Ubuntu Vivid)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1465696
Title:
Vivid update to 3.19.8-ckt1 stable release
Status i
I can confirm that reverting df438afe2d93 ("debugfs: leave freeing a
symlink body until inode eviction") fixes the issue on an i386 VM. But
it would be great to have the original bug reporter to test that too.
--
You received this bug notification because you are a member of Kernel
Packages, whi
Here's some more detail:
running 'strace df' shows the following:
statfs64("/sys/kernel/debug", 84, 0xbfddc6bc) = -1 ENOSYS (Function
not implemented)
A quick test shows that adding '.statfs = simple_statfs' in the
debugfs_super_operations struct fixes the problem, but I'm not sure
that's the
** Summary changed:
- linux: 3.16.0-41.56 -proposed tracker
+ linux: 3.16.0-41.57 -proposed tracker
** Description changed:
- This bug is for tracking the 3.16.0-41.56 upload package. This bug will
+ This bug is for tracking the 3.16.0-41.57 upload package. This bug will
contain status and tes
** Changed in: linux-lts-trusty (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466349
Title:
linux-lts-trusty: 3.13.0-55.94~precise1 -p
** Summary changed:
- linux-ti-omap4: -proposed tracker
+ linux-ti-omap4: 3.2.0-1466.87 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => Invalid
** Changed in: linux-ti-omap4 (Ubuntu)
Status: New => Invalid
--
You received this bug notific
Public bug reported:
This bug is for tracking the 3.2.0-87.125 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.la
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1416503
Title:
CVE-2015-1420
Status in linux package in
Public bug reported:
This bug is for tracking the 3.13.0-57.95 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
Public bug reported:
This bug is for tracking the 3.16.0-43.58 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packag
** Changed in: linux-lts-utopic (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1466983
Title:
linux-lts-utopic: 3.16.0-43.58~14.04.1 -pr
** Changed in: linux-lts-trusty (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1466938
Title:
linux-lts-trusty: 3.13.0-57.95~precise1 -p
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from tod
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
utopic' to 'verification-done-utopic'.
If verification is not done by 5 working days from t
701 - 800 of 1649 matches
Mail list logo