This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring (3
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring (3
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring (3
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-quantal
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1
---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1
---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-
*** This bug is a duplicate of bug 1338870 ***
https://bugs.launchpad.net/bugs/1338870
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
This bug was fixed in the package linux - 3.2.0-67.101
---
linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.2.0-67.100) precise; urgency=low
[ Luis Henri
This bug was fixed in the package linux-ec2 - 2.6.32-368.84
---
linux-ec2 (2.6.32-368.84) lucid; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* Ubuntu-2.6.32-368.84
[ Ubuntu: 2.6.32-64.128 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP:
This bug was fixed in the package linux - 3.2.0-67.101
---
linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.2.0-67.100) precise; urgency=low
[ Luis Henri
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis Henriq
This bug was fixed in the package linux-ec2 - 2.6.32-368.84
---
linux-ec2 (2.6.32-368.84) lucid; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* Ubuntu-2.6.32-368.84
[ Ubuntu: 2.6.32-64.128 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP:
Quoting Tamas Papp (1341...@bugs.launchpad.net):
> On 07/16/2014 06:35 PM, Serge Hallyn wrote:
>
>
> > To be clear, you have not yet gotten the bug since you've set
> > KSM_ENABLED to 0, or have you?
>
> I just did it, so no, not yet.
>
> This happened by time:
>
> Saucy (everything is fine) -
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis Henriq
*** This bug is a duplicate of bug 1338946 ***
https://bugs.launchpad.net/bugs/1338946
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis Henriq
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis Henriq
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => John Johansen
(jjohansen)
--
You received this bug notification because you are a member
** Summary changed:
- linux: 3.13.0-32.56 -proposed tracker
+ linux: 3.13.0-32.57 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338524
Title:
linux: 3.13.0-32.57 -pr
** Summary changed:
- linux-ti-omap4: 3.2.0-1451.70 -proposed tracker
+ linux-ti-omap4: 3.2.0-1451.71 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1336143
Tit
** Summary changed:
- linux: 3.11.0-26.44 -proposed tracker
+ linux: 3.11.0-26.45 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338556
Title:
linux: 3.11.0-26.45 -pr
** Summary changed:
- linux: 3.2.0-67.100 -proposed tracker
+ linux: 3.2.0-67.101 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654
Title:
linux: 3.2.0-67.101 -pr
** Summary changed:
- linux-armadaxp: 3.2.0-1636.52 -proposed tracker
+ linux-armadaxp: 3.2.0-1636.53 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1338870
Tit
** Summary changed:
- linux: 2.6.32-64.127 -proposed tracker
+ linux: 2.6.32-64.128 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338946
Title:
linux: 2.6.32-64.128
** Summary changed:
- Samsung SSD 840 Series failed to set xfermode (err_mask=0x40) on Trusty with
upstream kernel
+ Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set
xfermode (err_mask=0x40) on Trusty with upstream kernel
** Summary changed:
- Samsung SSD 840 failed to g
On 07/16/2014 06:35 PM, Serge Hallyn wrote:
> To be clear, you have not yet gotten the bug since you've set
> KSM_ENABLED to 0, or have you?
I just did it, so no, not yet.
This happened by time:
Saucy (everything is fine) -> Trusty (issue happened) -> Trusty with
Saucy kernel 3 weeks ago (no
same happens with 3.15.0 on Ubuntu 14.04 64 bit
Jul 11 12:43:41 localhost kernel: [42049.462542] [drm] stuck on render ring
Jul 11 12:43:41 localhost kernel: [42049.463330] [drm] GPU HANG: ecode
0:0x00ff, in chrome [2172], reason: Ring hung, action: reset
Jul 11 12:43:41 localhost kernel: [42
Hi Tamas,
To be clear, you have not yet gotten the bug since you've set
KSM_ENABLED to 0, or have you?
Interesting about the saucy kernel. Ideally we could reproduce this
reliably enough to really bisect.
I wonder if we can reproduce without qemu.
--
You received this bug notification because
Solution to my problem - (Thank you Rick Forberg!)
Linux Mint 17 Qiana won't install - keeps rebooting. It doesn't matter if the
installation medium is a flash drive or CD. Once the live version loads it
immediately reboots. There isn't enough time to install it. Once I managed to
actually insta
Realtek has never been good at writing clear module parameter
descriptions. My current working version has the following:
MODULE_PARM_DESC(swenc, "Set to 1 for software crypto (default 0)\n");
MODULE_PARM_DESC(ips, "Set to 0 to not use link power save (default 1)\n");
MODULE_PARM_DESC(swlps, "Set
All builds are complete, packages in this bug are available in
-proposed.
** Changed in: kernel-development-workflow/prepare-package-signed
Status: New => Fix Released
** Changed in: kernel-development-workflow/prepare-package-signed
Assignee: Canonical Kernel Team (canonical-kernel-t
Nils' workaround also works for me, as does setting the
link_power_management_policy to "medium_power".
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1318218
Title:
SATA problems on Mac
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342776
Title:
[3.16.0.4][nvidia 340.24] ERRO
On 07/14/2014 05:13 PM, Serge Hallyn wrote:
> Since "switching to saucy kernel is a good workaround", marking this as
> affecting the kernel.
>
> Could you try disabling KSM and see if that avoids the issue?
I set KSM_ENABLED=0 in /etc/default/qemu-kvm and restarted the server.
Also today after 3
Public bug reported:
Installing the latest kernel, i've got:
run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic
/boot/vmlinuz-3.16.0-4-generic
Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686)
Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for mo
** Changed in: kernel-development-workflow/prepare-package
Status: New => Fix Released
** Changed in: kernel-development-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-team) => Tim Gardner
(timg-tpi)
--
You received this bug notification because you are a
To add a bit of debugging I did (using two VMs):
- There server side kernel version does not matter (tested trusty and utopic)
- A client with a 3.13 kernel will have the delay, while the 3.16 kernel is ok
Enabling NFS debugging on both clients (as root "echo 32767
>/proc/sys/sunrpc/nfs_debug") s
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: Confirmed
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (
Closing as Invalid since the issue is reportedly solve, but we don't
know why/how the other mouse does not work.
Sorry for the delay in responding.
** Changed in: bluez (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, whic
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717
Title:
package linux-image-3.16.0-3-g
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717
Title:
package linux-image-3.16.0-3-generic (not installed) failed to
install/upgrade: subp
Public bug reported:
System failure while running Software Updater.
ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-3-generic (not installed)
ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
Uname: Linux 3.15.0-6-generic x86_64
ApportVersion: 2.14.4-0ubuntu2
Ar
** Attachment added: "dmesg-3.16.0-031600rc5-generic.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153950/+files/dmesg-3.16.0-031600rc5-generic.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
dmesg > dmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979
Title:
8086:0162 [System76 Sable Complete] backlight stops working after
suspend
Status in “linux” package in
Same results.
** Attachment added: "cat /proc/acpi/wakeup > wakeup"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153949/+files/wakeup-3.16.0-031600rc5-generic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
@jesus
Do
# sudo service i8kmon stop
That will allow you to regain control of the fans with i8kfan.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251
Title:
[Dell Studio 1558] ker
Verified by both me and Victor Tapia (vtapia) - with
3.11.0-26.44~precise1 kernel the MS HCK Offload LSO test passes.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328973
Title:
GSO se
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?
Please provide a direct URL to your e-mail to the mailing list once you
have m
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?
Please provide a direct URL to your e-mail to the mailing list once you
have m
TEN, using the nvidia drivers narrows the scope of people who may help
you on graphics driver issues to nvidia only.
As well, please do not mix two different drivers (nvidia and nouveau)
into one report. Instead, please create one per driver, not per symptom.
** Description changed:
- Generating
Traxtopel, could you please provide the information with the latest
mainline kernel via http://kernel.ubuntu.com/~kernel-
ppa/mainline/v3.16-rc5-utopic/ ?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launch
** This bug is no longer a duplicate of bug 1341275
[Gigabyte GB-BXi7-4470R] Kernel panic in rtl8821ae
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327741
Title:
Kernel panic on dr
** Tags added: targetmilestone-inin1410
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338666
Title:
ppc64le kernel module nx_crypto blocks loading other kernel modules
Status in “linu
** Tags added: targetmilestone-inin1410
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340789
Title:
Kernel BUG @of/base.c:251 during attach-device operation on Ubuntu
14.10 LE guest
** Tags added: targetmilestone-inin1404
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1340200
Title:
Backport EEH patches to 14.04
Status in “linux” package in Ubuntu:
Fix Released
S
Public bug reported:
The latest version from broadcom is 6.30.223.248
http://www.broadcom.com/support/802.11/linux_sta.php
Release notes:
WHAT'S NEW IN RELEASE 6.30.223.23X
-
+ Upgraded to Support 3.11 kernels
+ Added cfg80211 wowlan support for Magic Packets and D
I am experiencing this as well; same macbook pro (11,1) as Julien.
I experience many occurrences of this in /var/log/syslog:
ERROR @wl_cfg80211_get_station : Wrong Mac address
Eventually, the card disassociates, and fails repeatedly to reconnect to
the AP. Sometimes it succeeds, but will fail a
Another log using different BT-dongle on host.
** Attachment added: "bluetooth2.log"
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153834/+files/bluetooth2.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
Enabled debugging by adding -d to /etc/init/bluetooth.conf
But I don't understand what exactly is going on and why it fails.
I stripped pid, date (except secs) and hostname from log.
** Attachment added: "debug log"
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153
Yes, moving the drive that was on the PCI-X controller to the main board
solved the problem. Does this mean that a driver disappeared between
the -60 and -64 kernels? Or is it that somehow the driver is just not
available on boot?
Any thoughts on how to correct this?
--
You received this bug n
apport-collect failed when run over ssh on the server so I am changing
the bug status to confirmed.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
http
#28 works for me too.
Linux Mint 17 3.13.0-24-generic with MSI Z97-43 Gaming motherboard.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1321421
Title:
8086:8ca0 Sound output distorted/
** Changed in: linux (Ubuntu)
Status: Expired => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1296066
Title:
[Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure
S
oh nvm. fan shuts off repeatedly after i8kfan 2 2
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251
Title:
[Dell Studio 1558] kernel is missing support for i8k module
Status in “li
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1342570
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
** Attachment added: "Xorg.0.log"
https://bugs.launchpad.net/hwe-next/+bug/1342573/+attachment/4153758/+files/Xorg.0.log
** Tags added: 201307-14038 taipei-lab
** Package changed: linux (Ubuntu) => nvidia-graphics-drivers-331
(Ubuntu)
--
You received this bug notification because you are a
Public bug reported:
CID: 201305-13673 Dell Inspiron 5437
CID: 201307-14038 Dell Vostro 5470
The graphic card NVIDIA Corporation GK208M [GeForce GT 740M]
does not work well with the proprietary driver
Before installing the proprietary driver, there are 4 resolutions available:
1366 x 768
1360 x
Public bug reported:
Ubuntu 12.04's "Hardware Enablement Stack (HWE)" check forced me to upgrade to
trusty's kernel:
* Install a newer HWE version by running:
sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty
Since then bluetooth communication fails with "Transport end
I think this solves the problem for me, at least temporarily on my
Studio 1558. I am now able to compile a scientific library (from Julia
REPL) and not have too many issues...will repost if I find problems.
--
You received this bug notification because you are a member of Kernel
Packages, which i
Public bug reported:
I want to connect to a BT-serial adapter. Always get the error "Unknown
command complete for opcode 37".
If I supply the correct pin, connection is reported successful, but the
device immediately disappears.
I tried three different host BT hardware and two different PCs. alw
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342561
Title:
Touchpad not recognized + Fn K
Public bug reported:
The touchpad is not recognized.
The "psmouse.proto=bare" hotfix does not work.
The "i8042.noaux i8042.reset" does not work, even though the touchpad would
work in PS2 compat mode (under Win7).
The FN keys are not working at all, probably due to some strange ACPI
decode error
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548
Title:
[Dell Inspiron 5437] Wireless
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Liming Wang (wangliming)
** Changed in: linux (Ubuntu Trusty)
Importance: Medium => High
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.
101 - 194 of 194 matches
Mail list logo