I also have a 2014 Razer Blade 14" and am also having problems with the
touchpad.
tpconfig detects the touchpad as Synaptics but no UI shows up in Mouse &
Touchpad and synclient says no Synaptics driver is loaded.
I have a separate problem from the OP, though, in that I only want to
turn off tap-
** Attachment added: "acpi.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1337083/+attachment/4154511/+files/acpi.log
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Assignee: Po-Hsu Lin (cypressyew) => Alex Hung (alexhung)
-
** Changed in: kernel-development-workflow/package-testing
Status: Confirmed => Won't Fix
** Description changed:
This bug is for tracking the 3.16.0-4.9 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and th
** Changed in: kernel-development-workflow/promote-to-release
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341543
Title:
linux: 3.16.0-4.9 -proposed
Thank you Henri D for your solution ! It works fine for me (Philips MCM530,
debian wheezy), it just needs root privileges.
If you haven't already proposed to the alsa dev team to include your code, it
would be really great to do so !
--
You received this bug notification because you are a membe
** Tags added: patch
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548
Title:
[Dell Inspiron 5437] Wireless key does not work on this system
Status in “linux” package in Ubuntu:
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bu
** Attachment added: "diff.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1342548/+attachment/4154486/+files/diff.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548
This issue could be fixed by adding a kernel parameter:
acpi_osi=\"!Windows 2012\"
Verified with the kernel I built:
http://people.canonical.com/~phlin/kernel/bug-1342548-wl-key/
It works with 14.04 on this system.
However, I am not familiar kernel patching workflow and I am not sure if
there is
@Po-Hsu Lin,
Please attach acpi.log from "sudo acpidump > acpi.log"
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
** Changed in: linux (Ubuntu)
Assignee: Alex Hung (alexhung) => Po-Hsu Lin (cypressyew)
--
You received this bug notification because you are a member o
Did some research. That fix is not available in the 3.13 kernel, it is
apparently only in the 3.14 kernel. I've pinned the 3.13 kernel at the
"27" level so I'm good for the time being. I understand Linus and the
WINE team are looking for a way around this issue so SOMETHING should be
coming soon
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1343071
Title:
AMD Radeon APU E2-4000 with R2
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bcmwl (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1342645
Public bug reported:
CID: 201403-14859 Dell Inspiron 3541
The graphic of this APU is very slow when the proprietary driver is not
installed
It took me about 4 seconds to open the dash
ubuntu@201403-14859:~/Desktop$ /usr/lib/nux/unity_support_test -c -p
OpenGL vendor string: VMware, Inc.
OpenG
linux-kernel-bugs #60793 have patch.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1216734
Title:
btrfs continuously crash
Status in The Linux Kernel:
Unknown
Status in “linux” packa
** Package changed: cifs-utils (Debian) => linux (Debian)
** Package changed: cifs-utils (Ubuntu) => linux (Ubuntu)
** Summary changed:
- Cannot mount with 3.0 kernel
+ Cannot mount CIFS filesystem with 3.0 kernel
--
You received this bug notification because you are a member of Kernel
Package
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1185025
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
You have been subscribed to a public bug:
Binary package hint: cifs-utils
Using this command " sudo mount -t cifs -o guest
//XXX.XXX.X.XXX/Volume_1/game-1110-32home/bill/ /media/bills-dns-
game-1110-32home" I cannot mount using the new 3.0 kernel on Ubuntu
10.10. When I go back to the 2.6.39-3 ke
This looks like a bug in the cifsfs kernel module to me.
** Package changed: cifs-utils (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1003813
Title:
Kernel O
You have been subscribed to a public bug:
I'm seeing this only after upgrading from 11.04 to 12.04, after logging
in.
This happens on:
Ubuntu 12.04 LTS
3.2.0-24-generic-pae
cifs-utils version 2:5.1-1ubuntu1 (precise)
/var/log/syslog says:
May 24 09:28:49 jfrantzius-desktop kernel: [ 82.924032
This is a bug in the linux cifsfs kernel module.
** Package changed: cifs-utils (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1116393
Title:
Navigating folde
This is probably a bug in the cifsfs kernel module.
** Package changed: cifs-utils (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1174328
Title:
mount error(
This is probably a bug in the cifsfs kernel module.
** Package changed: cifs-utils (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1185025
Title:
Ubuntu 13.04
You have been subscribed to a public bug:
After upgrading to Ubuntu 13.04 I have experienced some compatibility
issues when mounting CIFS shares on the Ubuntu 13.04 workstation. The
following systems were tested:
* Windows 2003 server CIFS shares: Success
* EMC VNX CIFS shares: Success
* Ubunt
You have been subscribed to a public bug:
The following is from Launchpad Questions:
My CIFS network mount under Ubuntu 11.10 (Oneiric Ocelot) will freeze
without much obvious reason. Idling for an extensive time is the only
thing I can think of. Found many similar reports, eg:
http://www.centos
You have been subscribed to a public bug:
I have an fstab entry on Ubuntu 1204 which works just fine:
//gbabcxyz/share1 /mnt/share1 cifs
users,auto,credentials=/home/me/creds.txt,noexec,noperm 0 0
The share is actually to an IBM iSeries server V540.
I have tried the same today with Ubuntu 1304
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1343032
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Tags added: targetmilestone-inin1404
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-meta in Ubuntu.
https://bugs.launchpad.net/bugs/1341475
Title:
Ubuntu 14.04:linux-crashdump pckg is missing from ubuntu repository
Status in
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1343032
Title:
Ubuntu14.04: /sys/bus/pci/slots show weird numbers as slot_name on
PPC64LE
S
You have been subscribed to a public bug:
---Problem Description---
root@powerio-le21:/sys/bus/pci/slots# ls -l
total 0
drwxr-xr-x 2 root root 0 Jul 15 21:03 1
drwxr-xr-x 2 root root 0 Jul 15 21:03 16
drwxr-xr-x 2 root root 0 Jul 15 21:03 17
drwxr-xr-x 2 root root 0 Jul 15 21:03 8
drwxr-xr-x 2 roo
** Tags added: patch
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1326725
Title:
PS3 Sixaxis controller/joystick usb stopped working, regression in
linux-image-extra-3.13.0-27-generi
I did a manual bisect of the ubuntu trusty kernel tree and the last
"good" (controller working) commit is:
commit 73ffcac5867519fa4b6a54e734ded0fed5b403cc
Author: Jiri Kosina
HID: hidraw: make comment more accurate and nicer
The first sure "bad" (controller not working) commit I found is:
a bot?
>Messaggio originale
>Da: brad.f...@canonical.com
>Data: 14/07/2014 23.30
>A:
>Ogg: [Bug 1341779] Status changed to Confirmed
>
>This change was made by a bot.
>
>** Changed in: linux (Ubuntu)
> Status: New => Confirmed
>
>--
>You received this bug notification because you a
I reported the problem to linux-kernel ML:
https://lkml.org/lkml/2014/7/16/724
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338706
Title:
Samsung SSD 840 failed to get NCQ Send/Recv L
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.13.0-32.56 upload package. This bug will
contain status and testing results related to
apport information
** Attachment added: "UdevLog.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154332/+files/UdevLog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154331/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342703
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154325/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342703
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154333/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154324/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/13
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154323/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154327/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154328/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154329/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154326/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154322/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342703
Ti
apport information
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154321/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1342703/+attachment/4154330/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Tags added: apport-collected
** Description changed:
I attempted to compile backports-20140616 from here: http://drvbp1
.linux-foundation.org/~mcgrof/rel-html/backports/ I was attemting to
propose a solution for a poster on ubuntuforums.org by installing a
possibly
This bug was fixed in the package linux - 3.16.0-4.9
---
linux (3.16.0-4.9) utopic; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1341543
[ Upstream Kernel Changes ]
* rebase to v3.16-rc5
-- Tim GardnerSun, 13 Jul 2014 21:30:27 -0400
** Changed in: lin
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1342703
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 2.6.32-64.127 upload package. This bug will
contain status and testing results related t
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-1636.52 upload package. This bug will
contain status and testing results related t
** Description changed:
This bug is for tracking the 3.13.0-32.56 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.11.0-26.44 upload package. This bug will
contain status and testing results related to
On 07/16/2014 10:24 PM, Serge Hallyn wrote:
> (To be sure - /sys/kernel/mm/ksm/run is in fact set to 0 now right?)
Right.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341195
Title:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the 3.2.0-67.100 upload package. This bug will
contain status and testing results related to
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342703
Title:
Backports doesn't compile against 3.13.0-30
Status in “linux” package in Ubunt
You have been subscribed to a public bug:
I attempted to compile backports-20140616 from here: http://drvbp1
.linux-foundation.org/~mcgrof/rel-html/backports/ I was attemting to
propose a solution for a poster on ubuntuforums.org by installing a
possibly updated rtl8192ce driver. My usual process
Thanks for adding this, now I am able to automatically detect the
version. It would sill be better if this define would be in
include/generated/uapi/linux/version.h and not in
include/generated/utsrelease.h, because utsrelease.h is not there in non
ubuntu kernel and then an include will fail,
but
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1339609
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
Thanks for reporting this bug. However, it sounds like running anything
remotely heavyweight during the scans would have the same result, so
this is not a bug in qemu. I've marked it as affecting the kernel, as
presumably this is a bug in the io scheduler.
** Changed in: qemu-kvm (Ubuntu)
Quoting Tamas Papp (1341...@bugs.launchpad.net):
> On 07/16/2014 09:39 PM, Serge Hallyn wrote
> > I've personally not seen it, and noone on my team, who use a lot of
> > kvm instances, has seen it. Our two current theories are that (a) it
> > has to do with ksm page migration across numa-nodes, or
(Marked invalid against qemu for bookkeeping purposes - please re-set to
open if appropriate)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1339609
Title:
md raid resync causing KVM gue
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1339609
Title:
md raid resync causing KVM guests overload
Stat
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
On 07/16/2014 09:39 PM, Serge Hallyn wrote
> I've personally not seen it, and noone on my team, who use a lot of
> kvm instances, has seen it. Our two current theories are that (a) it
> has to do with ksm page migration across numa-nodes, or (b) it has to
> do with a race with transparent hugepage
** Description changed:
This bug is for tracking the 3.11.0-26.44 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.2.0-67.100 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Description changed:
This bug is for tracking the 3.2.0-1636.52 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the 2.6.32-64.127 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
*** This bug is a duplicate of bug 1338524 ***
https://bugs.launchpad.net/bugs/1338524
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/package-testing
Status: New => Invalid
** Changed in: linux-ppc (Ubuntu Saucy)
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package
Status: New =>
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
*** This bug is a duplicate of bug 1338556 ***
https://bugs.launchpad.net/bugs/1338556
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- L
1 - 100 of 194 matches
Mail list logo