Hello, Meltdown mitigations are available in:
https://usn.ubuntu.com/usn/usn-3522-3
and related USNs.
Spectre mitigations are in progress.
Thanks
** Information type changed from Private Security to Public Security
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You receive
Yes, I think that would get you to the point of finding out if this
workaround lets you continue or not.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742818
Title:
package lin
Public bug reported:
Hello; networkmanager's applet reports that wifi is not enabled; in
almost five days of uptime my computer has spent over 28 minutes doing
wifi interrupt handling however. Something seems wrong.
$ ip link show wlan0
3: wlan0: mtu 1500 qdisc mq state DOWN mode
DORMANT group
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738949
Title:
kernel BUG at /build/linux-KM2a5S/linux-4.13.0/include/linux/dma
Hello Denys,
Are fixes for this bug available?
Did you discover this bug?
Have you, or someone else, filed for a CVE for this issue yet?
Thanks
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public Security
** Changed in: linu
Thanks Denys, I've asked MITRE for a CVE number for this issue.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1739765
Title:
xt_TCPMSS buffer overflow bug
Status in linux package in Ub
Use CVE-2017-18017.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18017
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1739765
Title:
xt_TCPMSS buffer overfl
John, note that the 'high -> won't fix' comes from importing Red Hat's
bugzilla statuses.
Furthermore, this bug has been such a dumping ground that it's probably
best to ignore this bug entirely and file a new issue if you're still
seeing problems.
Thanks
--
You received this bug notification b
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello havard, do you have a reason for isc-dhcp-server to be installed
on this machine? It feels like a potential mistake.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1699108 ***
https://bugs.launchpad.net/bugs/1699108
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
I suspect nearly no progress has been made as there are higher-priority
tasks that need doing.
This is still a desired feature and is unlikely to be forgotten though
it may be ages before it becomes the top priority.
Thanks
--
You received this bug notification because you are a member of Kerne
Gábor, systemd is well-meaning in providing namespacing features so the
thousands of daemons that are in the world don't have to re-implement
something similar. But of course the kernel hook points used by AppArmor
don't provide sufficient information to know what pathname to
reconstruct when the n
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1717235
Title:
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [needrestart-
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1717589
Title:
package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subproc
*** This bug is a duplicate of bug 1717589 ***
https://bugs.launchpad.net/bugs/1717589
** This bug has been marked a duplicate of bug 1717589
package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subprocess
installed post-installation script returned error exit status 1
** Information
I added linux back due to the uncanny resemblance to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1508737
and
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1586997
Thanks
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notifi
** Also affects: linux-aws (Ubuntu)
Importance: Undecided
Status: New
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bu
Hello, note from your logs:
/bin/sh: 1: gcc: not found
Does this sound familiar? If this is entirely news to you I suggest
seeking assistance on irc at #ubuntu on irc.freenode.net or on
http://askubuntu.com/ .
Thanks
** Changed in: bcmwl (Ubuntu)
Status: New => Invalid
--
You received
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1693394 ***
https://bugs.launchpad.net/bugs/1693394
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1693394 ***
https://bugs.launchpad.net/bugs/1693394
** Also affects: debconf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
http
*** This bug is a duplicate of bug 1693394 ***
https://bugs.launchpad.net/bugs/1693394
The relevant lines from the logs:
Preparing to unpack .../0-linux-image-4.10.0-21-generic_4.10.0-21.23_amd64.deb
...
Use of uninitialized value $reply in scalar chomp at
/usr/share/perl5/Debconf/FrontEnd/
It might be reading too much into the tea leaves but this felt funny:
$ aa-decode 2d5e501d
Decoded: -^P
$ aa-decode 0008
Decoded:
$ aa-decode 2d5b2000
Decoded: -[
$ aa-decode 2d62201d
Decoded: -b
Do any of these sound familiar?
Thanks
--
You received this bug notification becaus
Hello, thanks for the report; can you still reproduce this issue? I
tried from multiple computers from multiple networks and got the
expected file every time.
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a memb
To be clear, the command I used to download the file was:
wget
'https://launchpad.net/ubuntu/+archive/primary/+files/linux_3.13.0-110.157.diff.gz'
How did you attempt your download? With which URL? Does your client
support any "no-cache" headers or options?
Thanks
--
You received this bug noti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hallo, genau dass; ich glaube, man braucht PAE-CPU fuer diese kernel.
Fuer solche rechner, glaube ich, Sie mussen eine eigenene kernel bauen,
from kernel.org.
Danke
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kern
** Changed in: linux (Ubuntu Xenial)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu Yakkety)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchp
Gary, please file questions in
https://answers.launchpad.net/launchpad/+addquestion with urls to spam
-- I've already handled this one
https://answers.launchpad.net/launchpad/+question/610279
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subsc
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This bug may be a duplicate of bug 1692981.
** Information type changed from Private Security to Public
** Also affects: dpkg (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in U
Joao, it's probably best to run ubuntu-bug linux to file a new report;
that should automatically attach what it can from the logs. Your photo
may be useful too. (I know it just reports a "warning" but that might be
useful all the same.)
Thanks
--
You received this bug notification because you ar
*** This bug is a duplicate of bug 1701085 ***
https://bugs.launchpad.net/bugs/1701085
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Is linux-lts-vivid still supported? I'd expect it to be replaced by
linux-lts-xenial by now.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-vivid in Ubuntu.
https://bugs.launchpad.net/bugs/1655580
Title:
package linux
This is likely
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660840 -- it's
possible the kernel in http://people.canonical.com/~jj/linux+jj/ has a
fix for this.
Could you please test and report back?
Thanks
--
You received this bug notification because you are a member of Kernel
Package
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1552713 ***
https://bugs.launchpad.net/bugs/1552713
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1557151
Title:
ZFS: send fails to transmit some holes [corrupti
I'm marking it Confirmed again based on source inspection.
Thanks
** Changed in: linux-lts-wily (Ubuntu Trusty)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu Wily)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ker
Public bug reported:
I just noticed that splat.ko from the SPL upstream is packaged in our
linux-image-* packages:
https://launchpad.net/~canonical-kernel-
team/+archive/ubuntu/ppa/+build/9397038/+files/buildlog_ubuntu-xenial-
amd64.linux_4.4.0-16.32_BUILDING.txt.gz
$ zgrep splat.ko buildlog_ubu
I can understand that but I'd really rather see it someplace that's hard
for users to get to. Every now and then someone finds a bug that allows
loading any kernel module on demand and this module seems likely to have
functionality that should not be exposed to untrusted users.
(I haven't reviewed
** Also affects: apparmor (Ubuntu)
Importance: Undecided
Status: New
** Also affects: apparmor
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
*** This bug is a security vulnerability ***
Public security bug reported:
Brian Gerst discovered the Linux kernel's implementation of SMAP support
is incomplete:
https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=3d44d51bd339766f0178f0cf2e8d048b4a4872aa
Andy Lutomi
No logs needed, Andy's mail suffices. Thanks.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1550517
Title:
missing
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536036/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536045/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
** Attachment added: "version.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1527039/+attachment/4536040/+files/version.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/152
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536042/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527039
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536032/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536033/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/15
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536037/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536038/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536044/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536039/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536043/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527039
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536030/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536029/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/15
Public bug reported:
fatrace is giving me errors because my computer is using large files:
sarnold@hunt:~/trees/linux$ sudo fatrace
[sudo] password for sarnold:
read: Value too large for defined data type
sarnold@hunt:~/trees/linux$ sudo fatrace
squid3(7248): O /var/cache/squid-deb-proxy/06/C7
s
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536041/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536031/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527039
Ti
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536034/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527039
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1527039/+attachment/4536035/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527039
There's no logging if nc fails to exec and there may not be logging if
nc can't bind the port, and thus isn't running when needed. This may be
just be a random error.
Thanks
** Also affects: apparmor (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification beca
(The test in question is in QRT, scripts/test-apparmor.py ; I added
apparmor dep just to make sure this doesn't get lost.)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1528228
Christian, the QRT tests for AppArmor are in http://bazaar.launchpad.net
/~ubuntu-bugcontrol/qa-regression-testing/master/view/head:/scripts
/test-apparmor.py --- it would make sense to have something similar for
openqa, though I don't know how easily that script could be modified or
not. It feels
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1527850
Title:
sudo won't ask password
Status in linux package in Ubuntu:
In
sudo is configured by default to allow running commands without
passwords for 15 minutes after the last successful authentication. You
can configure this via the timestamp_timeout parameter in your
sudoers(5) file. (Please remember to use visudo(8) to edit this file.)
If this isn't the issue, plea
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1535307
Title:
running 'rr' make check causes kernel "hard LOCKUP"
Status in li
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Your filesystem is full; nothing will work well until you've freed some
space. I suggest running:
sudo apt-get clean
Then use apt-get purge to remove some old linux packages. Be sure to
leave at least two kernels installed, preferably the newest and whatever
you're currently running, and if those
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1544809
Title:
kernel security update fails if a 2nd Ubuntu on same machine
St
Public bug reported:
$ uname -a
Linux dean 3.2.0-1466-omap4 #87-Ubuntu SMP PREEMPT Thu Jun 18 14:40:14 UTC 2015
armv7l armv7l armv7l GNU/Linux
I had just run an apt-get update && apt-get -u dist-upgrade ; apt-get
autoremove.
dpkg uninstalled a handful of kernel image and header packages and
p
Will users that have only the -security pocket enabled run into this
issue until we publish a corresponding grub2-signed package into the
-security pocket? Can the packages in -updates in wily, vivid, and
trusty be binarycopied into the -security pocket?
What steps need to be taken to publish futu
I've tested fatrace while grepping huge files: before, it'd die. With
3.13.0-75-generic it survives. Thanks!
Linux hunt 3.13.0-75-generic #119-Ubuntu SMP Mon Jan 11 13:49:34 UTC
2016 x86_64 x86_64 x86_64 GNU/Linux
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trust
Anders, you can try installing the 'thermald' package; it might be a
reasonable bandaid.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/751689
Title:
[Lenovo Thinkpad x201s] Overheat due
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1240940
Title:
Need support for Realtek Wifi card rtl8723be [10ec:b723]
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1311598
Title:
[Lenovo ThinkPad X201 Tablet] Ultrabase x200 Audio doesn't work
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This can be complicated to fix, but it's not impossible.
This AskUbuntu answer provides a good blueprint:
http://askubuntu.com/a/317871/33812
Remove the metapackages that reference the 'newest' kernels, dpkg
--purge some kernels (keeping a known-working kernel, and preferably one
other), re-add t
Kernel stack traces in the dmesg.
** Package changed: xorg (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1321553
Title:
Flash errors when i start ubuntu
Sta
*** This bug is a security vulnerability ***
Public security bug reported:
CONFIG_RANDOMIZE_BASE is not enabled in the utopic kernel; apparently it
does not play nicely with CONFIG_HIBERNATE.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
--
You received this
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1329177
Title:
CONFIG_RANDOMIZE_BASE is not enabled in utopic kernel
** Tags added: kernel-fixed-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1309684
Title:
WARNING in intel_
I just updated to 3.13.0-24-generic and didn't see this warning after a
single suspend/resume cycle. If we're lucky this has already been
addressed.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
And again, no more instances of this warning in my dmesg when resuming
this morning. I suspect this has already been handled.
Thanks
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is s
Public bug reported:
My pandaboard ES runs irssi in a tmux session for me; irssi has died of
segfaults twice recently, and dmesg had these warnings:
[395523.456237] PLL GO bit not set
[395523.456604] omapdss HDMI error: failed to power on device
[395523.458251] [drm] Cannot find any crtc or sizes
Re-assigning to linux, a freeze during suspend feels more likely to be
in linux than ubuntu-release-upgrader. (I might still have the package
incorrect, but this will be a start.)
Please run apport-collect 1313382 -- I suspect more log files will be
needed to debug this, and hopefully it'll recogn
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
My 14.04 LTS laptop no longer plays audio, where earlier releases played
audio fine.
A strace on alsamixer shows several failures:
open("/dev/snd/controlC0", O_RDONLY|O_CLOEXEC) = -1 EACCES (Permission denied)
open("/dev/aloadC0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
I spotted the following warning in my dmesg:
[110593.204346] PM: Syncing filesystems ... done.
[110593.324940] PM: Preparing system for mem sleep
[110593.325213] Freezing user space processes ... (elapsed 0.001 seconds) done.
[110593.327069] Freezing remaining freezable tasks
201 - 300 of 632 matches
Mail list logo