This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
- CVE-201
No crashes so far with 3.13.0-38-generic, looks like it's fixed.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/13778
We installed 3.13.0-38-generic from proposed during a maintenance today on one
of the initially affected server.
We'll provide an update soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Ti
This patch fixes an issue with a currently applied patch to the ubuntu-
trusty kernel. If the patch was applied to 3.13.11.y, I would suggest it
go through the stable process and be applied there (and in fact it is
applied to other stables). Overall it would be best if the original
reporter could v
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from t
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
To manage notifications about this bug g
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
To manage notifications about this bu
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
To manage notificati
I strongly suspect this patch:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c3caf1192f904de2f1381211f564537235d50de3
And regardless this patch should be applied to 3.13.y, so I'll send an
email to include it.
--
You received this bug notification because you are a me
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: High
Status: Confirmed
** Changed in: linux (Ubuntu Trusty)
Status: New => Confirmed
** Changed in: linux (Ubuntu Trusty)
Importance: Undecide
Can't test with the 3.13 mainline as these are productive servers and we can't
risk another outage at this time.
As mentioned in the first post it in appears to be fixed in the 3.16 mainline
kernel.
** Tags added: kernel-unable-to-test-upstream
** Changed in: linux (Ubuntu)
Status: Inco
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel
backtrace already posted
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
To m
13 matches
Mail list logo