** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1855958
Title:
scsi: hisi_sas: Return directly if
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1855952
Title:
scsi: hisi_sas: Check sas_port
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854550
Title:
[scsi-1130]scsi: scsi_transport_sas:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
Is the same change still present in the current focal-proposed alsa-lib
1.2.1.2-2 ?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to alsa-lib in Ubuntu.
https://bugs.launchpad.net/bugs/1859754
Title:
add ucm to make alsa/sof driver work
** Changed in: kernel-sru-workflow/stakeholder-signoff
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1858534
Title:
disco/linux-azure:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1853999
Title:
[sas-1126]scsi: hisi_sas: use
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854549
Title:
[acc-1130]sync mainline kernel
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1850117
Title:
[hpre-1017]sync mainline kernel
** Changed in: kunpeng920/upstream-kernel
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1854000
Title:
[sas-1126]scsi: hisi_sas: Replace
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This bug was fixed in the package linux-gcp - 5.0.0-1029.30~18.04.1
---
linux-gcp (5.0.0-1029.30~18.04.1) bionic; urgency=medium
* bionic/linux-gcp: 5.0.0-1029.30~18.04.1 -proposed tracker (LP:
#1858536)
[ Ubuntu: 5.0.0-1029.30 ]
* disco/linux-gcp: 5.0.0-1029.30 -proposed
This bug was fixed in the package linux-gcp - 5.0.0-1029.30~18.04.1
---
linux-gcp (5.0.0-1029.30~18.04.1) bionic; urgency=medium
* bionic/linux-gcp: 5.0.0-1029.30~18.04.1 -proposed tracker (LP:
#1858536)
[ Ubuntu: 5.0.0-1029.30 ]
* disco/linux-gcp: 5.0.0-1029.30 -proposed
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1858531
Title:
disco/linux-aws:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1858539
Title:
disco/linux-gcp:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1858534
Title:
disco/linux-azure: 5.0.0-1029.31
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1858529
Title:
disco/linux-raspi2:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1858541
Title:
disco/linux-kvm:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
https://bugs.launchpad.net/bugs/1858543
Title:
disco/linux-oracle:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-snapdragon in Ubuntu.
https://bugs.launchpad.net/bugs/1858544
Title:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1859724
Title:
disco/linux: 5.0.0-40.44
Hi @hui.wang,
Thank you very much for this. It now works using the module parameter
you said to use.
Will there be some way that I will be notified that the sof-hda-generic-
4ch.tplg firmware has been incorporated into Ubuntu so I can remove the
workaround?
Thanks again!
--
You received this
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of Kernel
Packages, which is
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1860986
and then change the status of the bug to 'Confirmed'.
If, due to the
This bug was fixed in the package linux-oracle - 5.0.0-1010.15
---
linux-oracle (5.0.0-1010.15) disco; urgency=medium
* disco/linux-oracle: 5.0.0-1010.15 -proposed tracker (LP: #1858543)
[ Ubuntu: 5.0.0-39.43 ]
* disco/linux: 5.0.0-39.43 -proposed tracker (LP: #1858547)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
This bug was fixed in the package linux-snapdragon - 5.0.0-1029.31
---
linux-snapdragon (5.0.0-1029.31) disco; urgency=medium
* disco/linux-snapdragon: 5.0.0-1029.31 -proposed tracker (LP:
#1858544)
[ Ubuntu: 5.0.0-39.43 ]
* disco/linux: 5.0.0-39.43 -proposed tracker (LP:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Invalid
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the
To fix this issue, some patches needs to be back-ported on openvswitch too. See
the following bug:
https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1860987
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Summary changed:
- precise/linux-lts-trusty: -proposed tracker
+ precise/linux-lts-trusty: 3.13.0-176.227~12.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee:
Public bug reported:
[SRU Justification]
[Impact]
Packets encapsulated into a vxlan tunnel with openvswitch don't have the
same udp source port for the first packet and the following ones of the
same TCP flow in a DOCKER scenario usecase.
In fact, when using the kernel datapath, the upcall
Public bug reported:
[SRU Justification]
[Impact]
Packets encapsulated into a vxlan tunnel with openvswitch don't have the
same udp source port for the first packet and the following ones of the
same TCP flow in a DOCKER scenario usecase.
In fact, when using the kernel datapath, the upcall
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
This bug was fixed in the package linux-kvm - 5.0.0-1025.27
---
linux-kvm (5.0.0-1025.27) disco; urgency=medium
* disco/linux-kvm: 5.0.0-1025.27 -proposed tracker (LP: #1858541)
[ Ubuntu: 5.0.0-39.43 ]
* disco/linux: 5.0.0-39.43 -proposed tracker (LP: #1858547)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
I am seeing this error message on a Dell Latitude 5590 with kernel
5.5.0:
$ dmesg | grep acpi
[0.076320] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
[0.076321] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
[0.076322] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
[
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This is a huge issue in business environment. I can't understand that we
don't have this in 2020 when all other platform has it and even now its
importance is a wishlist? Come on! It's impossible to have a
conversation using Bluetooth, audio is unusable.
--
You received this bug notification
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
I created a new RTL8723D driver error report.
https://bugs.launchpad.net/ubuntu/+source/linux-oem/+bug/1860833
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1853665
Title:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This bug was fixed in the package linux-gcp - 5.0.0-1029.30
---
linux-gcp (5.0.0-1029.30) disco; urgency=medium
* disco/linux-gcp: 5.0.0-1029.30 -proposed tracker (LP: #1858539)
[ Ubuntu: 5.0.0-39.43 ]
* disco/linux: 5.0.0-39.43 -proposed tracker (LP: #1858547)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
[gnome settings screenshot](https://i.stack.imgur.com/rVlFZ.png)
When I try to turn it on using bluetoothctl, nothing comes out of the
console either.
``` bash
andrei@HP-Laptop-15:~$ bluetoothctl
Agent registered
[bluetooth]# block
Missing device address argument
[bluetooth]# list
[bluetooth]#
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux-aws - 5.0.0-1024.27
---
linux-aws (5.0.0-1024.27) disco; urgency=medium
* disco/linux-aws: 5.0.0-1024.27 -proposed tracker (LP: #1858531)
* Update EFA driver to 1.5.0 (LP: #1850195)
- SAUCE: linux/efa: Fix incorrect error print
-
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
This bug was fixed in the package linux-raspi2 - 5.0.0-1025.26
---
linux-raspi2 (5.0.0-1025.26) disco; urgency=medium
* disco/linux-raspi2: 5.0.0-1025.26 -proposed tracker (LP: #1858529)
[ Ubuntu: 5.0.0-39.43 ]
* disco/linux: 5.0.0-39.43 -proposed tracker (LP: #1858547)
*
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
*** This bug is a duplicate of bug 1859724 ***
https://bugs.launchpad.net/bugs/1859724
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in
This bug was fixed in the package linux-aws - 5.0.0-1024.27
---
linux-aws (5.0.0-1024.27) disco; urgency=medium
* disco/linux-aws: 5.0.0-1024.27 -proposed tracker (LP: #1858531)
* Update EFA driver to 1.5.0 (LP: #1850195)
- SAUCE: linux/efa: Fix incorrect error print
-
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
This bug was fixed in the package linux - 5.0.0-40.44
---
linux (5.0.0-40.44) disco; urgency=medium
* disco/linux: 5.0.0-40.44 -proposed tracker (LP: #1859724)
* use-after-free in i915_ppgtt_close (LP: #1859522) // CVE-2020-7053
- SAUCE: drm/i915: Fix use-after-free when
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
201 - 300 of 379 matches
Mail list logo