** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Released
** Changed in:
Hello Stéphane, or anyone else affected,
Accepted lxd into xenial-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/lxd/2.0.11-0ubuntu1~16.04.3 in a
few hours, and then in the -proposed repository.
Please help us by testing this new package. See
Blacklisting the gssd module is a terrible solution for those using AD
to authenticate users on the machine.
I want to authenticate users while using non-authenticated NFS shares.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Waiting a week for upstream & Debian to accept/review the proposed
patches.
** Bug watch added: Debian Bug tracker #883804
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883804
** Also affects: vmdk-stream-converter (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883804
Thanks for testing and the patch, Ryan. I can submit and SRU request.
We should also send this upstream for inclusion in the mainline kernel.
Is that something you think you can do? If not, I can do it for you.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The Ubuntu mainline kernel build unfortunately currently does not have
apparmor set as the default LSM. This is due to some config changes done
when adding the LSM stacking patches (Ubuntu tries to keep the configs
as close as possible). Addressing this is wip and should land with the
next
fo
> build_name: server
> serial: 20171207
> ubuntu@ubuntu:~$ uname -a
> Linux ubuntu 4.10.0-40-generic #44~lp1729145 SMP Wed Dec 6 16:21:45 UTC
> 2017 x86_64 x86_64 x86_64 GNU/Linux
> ubuntu@ubuntu:~$ tree /dev/bcache
> /dev/bcache [error opening dir]
>
> 0 directorie
Hello Łukasz, or anyone else affected,
Accepted ubuntu-image into zesty-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/ubuntu-
image/1.3+17.04ubuntu1 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package.
Do you have more logs just before what you posted when filing this bug?
Could you please attach them?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to bind9 in Ubuntu.
https://bugs.launchpad.net/bugs/1736943
Title:
The Regression Potential section could use some information about how
testing will be done to ensure there are no regressions.
** Changed in: gnome-user-docs (Ubuntu Artful)
Status: In Progress => Fix Committed
** Tags added: verification-needed verification-needed-artful
--
You
I built one more test kernel. This one only has commit 4ae2508
reverted.
The test kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1734327/revert-test
Can you test that kernel and report back if it has the bug or not?
--
You received this bug notification because you are
Hello Gunnar, or anyone else affected,
Accepted gnome-user-docs into artful-proposed. The package will build
now and be available at https://launchpad.net/ubuntu/+source/gnome-user-
docs/3.26.2.1-0ubuntu0.1 in a few hours, and then in the -proposed
repository.
Please help us by testing this new
Oh and it goes without saying that our manual testing plan got updated
to better cover lxd init moving forward.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1737020
Title:
Regression in "lxd init"
Do you have more logs just before what you posted when filing this bug?
Could you please attach them?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1736943
Title:
9.10.3.dfsg.P4-8ubuntu1.9 - keep
Public bug reported:
This is an SRU tracking bug for the fixes to two "lxd init" regressions
in LXD 2.0.11.
1) Missing question about the ZFS pool name when creating a new pool.
2) Missing question about the LXD bridge configuration.
Both of those are part of our interactive workflow so didn't
The bug is still reproducible in xenial.
--
# lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 16.04.3 LTS
Release:16.04
Codename: xenial
# grep Automatic-Reboot /etc/apt/apt.conf.d/50unattended-upgrades
Hello Łukasz, or anyone else affected,
Accepted uvp-monitor into artful-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/uvp-
monitor/2.2.0.316-0ubuntu1~17.10.1 in a few hours, and then in the
-proposed repository.
Please help us by testing this new
@mhcerri
Thanks for the explanation! I built the kernels directly from the git repo and
I didn't use the binary packages (I thought they should be the same). What's
your repro-rate? Yesterday as Chris tested linux-azure-edge 4.13.0-1004.4 + my
pull request, the repro rate was only ~1%, meaning
Disabling fragments, by passing the -no-fragments option to mksquashfs,
retains performance while providing reproducibility:
A) 12 core Xeon E5-2609 v3 with 16GB of ram
Without the frag deflator removal patch and with the -no-fragments option:
real 0.90-0.97(0.928+/-0.023)
user
Hello Ryan, or anyone else affected,
Accepted percona-xtradb-cluster-5.6 into artful-proposed. The package
will build now and be available at https://launchpad.net/ubuntu/+source
/percona-xtradb-cluster-5.6/5.6.34-26.19-0ubuntu4.17.10.1 in a few
hours, and then in the -proposed repository.
Hello Michael, or anyone else affected,
Accepted libinput into artful-proposed. The package will build now and
be available at
https://launchpad.net/ubuntu/+source/libinput/1.8.4-0ubuntu0.17.10.1 in
a few hours, and then in the -proposed repository.
Please help us by testing this new package.
Hello Łukasz, or anyone else affected,
Accepted ubuntu-image into artful-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/ubuntu-
image/1.3+17.10ubuntu1 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package.
Hello Timo, or anyone else affected,
Accepted libinput into artful-proposed. The package will build now and
be available at
https://launchpad.net/ubuntu/+source/libinput/1.8.4-0ubuntu0.17.10.1 in
a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
** Tags removed: verification-needed-artful
** Tags added: verification-done-artful
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1481347
Title:
Power8 Nest PMU Instrumentation support
To manage
please tell me "0" rights to "others" group does not affect root
account.
De: boun...@canonical.com en nombre de alex dekker
<411...@bugs.launchpad.net>
Enviado: martes, 5 de diciembre de 2017 18:03:58
Para: jfarroy...@hotmail.com
SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088677.html
** Description changed:
+
+ == SRU Justification ==
+ The bug reporter was trying to enable IMA appraisal with signatures for
executable
+ files on Xenial. However, when enabling IMA appriasl the
Could you check if the patch attached to
https://bugzilla.gnome.org/show_bug.cgi?id=789070 fixes the issue?
It looks like a workaround to me, but still
** Bug watch added: GNOME Bug Tracker #789070
https://bugzilla.gnome.org/show_bug.cgi?id=789070
--
You received this bug notification
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1728098
Title:
[kernel] tty/hvc: Use opal irqchip interface if
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
> In both of our reproducers, we added "ip route flush table all;
that won't help
> ifconfig down;
that's not a valid cmdline
> sleep 10" before existing from containers.
sleeping without closing existing open sockets doesn't help
what are you using for container mgmt? docker? lxc? lxd?
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
In order to reach that INSIST(0) code, type.sa.sa_family needs to be something
other than AF_INET, AF_INET6 or AF_UNIX:
void
isc_netaddr_fromsockaddr(isc_netaddr_t *t, const isc_sockaddr_t *s) {
int family = s->type.sa.sa_family;
t->family = family;
switch (family) {
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
In order to reach that INSIST(0) code, type.sa.sa_family needs to be something
other than AF_INET, AF_INET6 or AF_UNIX:
void
isc_netaddr_fromsockaddr(isc_netaddr_t *t, const isc_sockaddr_t *s) {
int family = s->type.sa.sa_family;
t->family = family;
switch (family) {
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-meta-aws - 4.4.0.1005.5
---
linux-meta-aws (4.4.0.1005.5) trusty; urgency=medium
* Bump ABI 4.4.0-1005
-- Kamal Mostafa Mon, 04 Dec 2017 12:20:48 -0800
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1737005
and then change the status of the bug to 'Confirmed'.
If, due to the
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
Public bug reported:
[109127.127307] chromium-browse[15588]: segfault at a1 ip 7f298eb57cc3 sp
7ffc956c8fc0
Just random and seldom crashes.
ProblemType: Bug
DistroRelease: Ubuntu 17.10
Package: chromium-browser 62.0.3202.94-0ubuntu0.17.10.1388
ProcVersionSignature: Ubuntu
*** This bug is a duplicate of bug 1736125 ***
https://bugs.launchpad.net/bugs/1736125
This bug was fixed in the package linux-raspi2 - 4.13.0-1008.8
---
linux-raspi2 (4.13.0-1008.8) artful; urgency=low
* linux-raspi2: 4.13.0-1008.8 -proposed tracker (LP: #1736125)
[
This bug was fixed in the package network-manager -
1.2.6-0ubuntu0.16.04.2
---
network-manager (1.2.6-0ubuntu0.16.04.2) xenial; urgency=medium
* Fix nm-dhcp-helper DBus Event/Notify race condition (LP: #1696415)
-- Ray Link Thu, 19 Oct 2017 13:53:52
This bug was fixed in the package linux-euclid - 4.4.0-9020.21
---
linux-euclid (4.4.0-9020.21) xenial; urgency=low
* linux-euclid: 4.4.0-9020.21 -proposed tracker (LP: #1736188)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-euclid - 4.4.0-9020.21
---
linux-euclid (4.4.0-9020.21) xenial; urgency=low
* linux-euclid: 4.4.0-9020.21 -proposed tracker (LP: #1736188)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
The verification of the Stable Release Update for network-manager has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
*** This bug is a duplicate of bug 1736155 ***
https://bugs.launchpad.net/bugs/1736155
This bug was fixed in the package linux-raspi2 - 4.10.0-1023.26
---
linux-raspi2 (4.10.0-1023.26) zesty; urgency=low
* linux-raspi2: 4.10.0-1023.26 -proposed tracker (LP: #1736155)
[
This bug was fixed in the package linux-euclid - 4.4.0-9020.21
---
linux-euclid (4.4.0-9020.21) xenial; urgency=low
* linux-euclid: 4.4.0-9020.21 -proposed tracker (LP: #1736188)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
*** This bug is a duplicate of bug 1736155 ***
https://bugs.launchpad.net/bugs/1736155
This bug was fixed in the package linux-raspi2 - 4.10.0-1023.26
---
linux-raspi2 (4.10.0-1023.26) zesty; urgency=low
* linux-raspi2: 4.10.0-1023.26 -proposed tracker (LP: #1736155)
[
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
*** This bug is a duplicate of bug 1736124 ***
https://bugs.launchpad.net/bugs/1736124
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu:
*** This bug is a duplicate of bug 1736120 ***
https://bugs.launchpad.net/bugs/1736120
This bug was fixed in the package linux-azure-edge - 4.13.0-1005.5
---
linux-azure-edge (4.13.0-1005.5) xenial; urgency=low
* linux-azure-edge: 4.13.0-1005.5 -proposed tracker (LP: #1736120)
*** This bug is a duplicate of bug 1736120 ***
https://bugs.launchpad.net/bugs/1736120
This bug was fixed in the package linux-azure-edge - 4.13.0-1005.5
---
linux-azure-edge (4.13.0-1005.5) xenial; urgency=low
* linux-azure-edge: 4.13.0-1005.5 -proposed tracker (LP: #1736120)
*** This bug is a duplicate of bug 1736187 ***
https://bugs.launchpad.net/bugs/1736187
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu:
*** This bug is a duplicate of bug 1736186 ***
https://bugs.launchpad.net/bugs/1736186
This bug was fixed in the package linux-snapdragon - 4.4.0-1081.86
---
linux-snapdragon (4.4.0-1081.86) xenial; urgency=low
* linux-snapdragon: 4.4.0-1081.86 -proposed tracker (LP: #1736186)
*** This bug is a duplicate of bug 1736185 ***
https://bugs.launchpad.net/bugs/1736185
This bug was fixed in the package linux-raspi2 - 4.4.0-1079.87
---
linux-raspi2 (4.4.0-1079.87) xenial; urgency=low
* linux-raspi2: 4.4.0-1079.87 -proposed tracker (LP: #1736185)
[
*** This bug is a duplicate of bug 1736125 ***
https://bugs.launchpad.net/bugs/1736125
This bug was fixed in the package linux-raspi2 - 4.13.0-1008.8
---
linux-raspi2 (4.13.0-1008.8) artful; urgency=low
* linux-raspi2: 4.13.0-1008.8 -proposed tracker (LP: #1736125)
[
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
*** This bug is a duplicate of bug 1736185 ***
https://bugs.launchpad.net/bugs/1736185
This bug was fixed in the package linux-raspi2 - 4.4.0-1079.87
---
linux-raspi2 (4.4.0-1079.87) xenial; urgency=low
* linux-raspi2: 4.4.0-1079.87 -proposed tracker (LP: #1736185)
[
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
*** This bug is a duplicate of bug 1736189 ***
https://bugs.launchpad.net/bugs/1736189
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu:
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-azure-edge - 4.13.0-1005.5
---
linux-azure-edge (4.13.0-1005.5) xenial; urgency=low
* linux-azure-edge: 4.13.0-1005.5 -proposed tracker (LP: #1736120)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-raspi2 - 4.10.0-1023.26
---
linux-raspi2 (4.10.0-1023.26) zesty; urgency=low
* linux-raspi2: 4.10.0-1023.26 -proposed tracker (LP: #1736155)
[ Ubuntu: 4.10.0-42.46 ]
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-azure - 4.11.0-1016.16
---
linux-azure (4.11.0-1016.16) xenial; urgency=low
* linux-azure: 4.11.0-1016.16 -proposed tracker (LP: #1736123)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-azure - 4.11.0-1016.16
---
linux-azure (4.11.0-1016.16) xenial; urgency=low
* linux-azure: 4.11.0-1016.16 -proposed tracker (LP: #1736123)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-raspi2 - 4.13.0-1008.8
---
linux-raspi2 (4.13.0-1008.8) artful; urgency=low
* linux-raspi2: 4.13.0-1008.8 -proposed tracker (LP: #1736125)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
*
This bug was fixed in the package linux-lts-xenial -
4.4.0-103.126~14.04.1
---
linux-lts-xenial (4.4.0-103.126~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-103.126~14.04.1 -proposed tracker (LP:
#1736183)
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-lts-xenial -
4.4.0-103.126~14.04.1
---
linux-lts-xenial (4.4.0-103.126~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-103.126~14.04.1 -proposed tracker (LP:
#1736183)
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-raspi2 - 4.4.0-1079.87
---
linux-raspi2 (4.4.0-1079.87) xenial; urgency=low
* linux-raspi2: 4.4.0-1079.87 -proposed tracker (LP: #1736185)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
This bug was fixed in the package linux-euclid - 4.4.0-9020.21
---
linux-euclid (4.4.0-9020.21) xenial; urgency=low
* linux-euclid: 4.4.0-9020.21 -proposed tracker (LP: #1736188)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-snapdragon - 4.4.0-1081.86
---
linux-snapdragon (4.4.0-1081.86) xenial; urgency=low
* linux-snapdragon: 4.4.0-1081.86 -proposed tracker (LP: #1736186)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
Public bug reported:
I emailed debian maintainers already but I'll post here as well in case I might
get it worked out.
The current steam package does not comply with xdg specification well as I have
outlined here https://github.com/ValveSoftware/steam-for-linux/issues/5272 .
I'm asking you to
The verification of the Stable Release Update for python-heatclient has
completed successfully and the package has now been released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
This bug was fixed in the package python-heatclient - 1.8.0-0ubuntu3
---
python-heatclient (1.8.0-0ubuntu3) zesty; urgency=medium
* d/p/dont-encode-path-separators.patch: Cherry-pick patch from upstream
stable/pike branch to stop encoding of path separators as the are
This bug was fixed in the package python-heatclient - 1.1.0-2ubuntu1
---
python-heatclient (1.1.0-2ubuntu1) xenial; urgency=medium
* d/p/dont-encode-path-separators.patch: Cherry-pick patch from upstream
stable/pike branch to stop encoding of path separators as the are
201 - 300 of 653 matches
Mail list logo