This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux-hwe - 4.13.0-36.40~16.04.1
---
linux-hwe (4.13.0-36.40~16.04.1) xenial; urgency=medium
* linux-hwe: 4.13.0-36.40~16.04.1 -proposed tracker (LP: #1750052)
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package libreoffice-l10n -
1:5.4.5-0ubuntu0.17.10.1
---
libreoffice-l10n (1:5.4.5-0ubuntu0.17.10.1) artful; urgency=medium
* New upstream release (LP: #1748999)
- fixes CVE-2018-6871: Remote arbitrary file disclosure vulnerability via
WEBSERVICE f
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
*** This bug is a duplicate of bug 1749094 ***
https://bugs.launchpad.net/bugs/1749094
This bug was fixed in the package linux-raspi2 - 4.4.0-1085.93
---
linux-raspi2 (4.4.0-1085.93) xenial; urgency=medium
* linux-raspi2: 4.4.0-1085.93 -proposed tracker (LP: #1749094)
[ Ubun
** Attachment added: "gnome_terminal_2.png"
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1750889/+attachment/5059915/+files/gnome_terminal_2.png
** Also affects: gtk+3.0 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you ar
*** This bug is a duplicate of bug 1748478 ***
https://bugs.launchpad.net/bugs/1748478
This bug was fixed in the package linux-gcp - 4.13.0-1011.15
---
linux-gcp (4.13.0-1011.15) xenial; urgency=medium
* linux-gcp: 4.13.0-1011.15 -proposed tracker (LP: #1748478)
[ Ubuntu: 4.
This bug was fixed in the package linux-raspi2 - 4.4.0-1085.93
---
linux-raspi2 (4.4.0-1085.93) xenial; urgency=medium
* linux-raspi2: 4.4.0-1085.93 -proposed tracker (LP: #1749094)
[ Ubuntu: 4.4.0-116.140 ]
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unab
*** This bug is a duplicate of bug 1748476 ***
https://bugs.launchpad.net/bugs/1748476
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
* [Hyp
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: nautilus (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
a
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: audacious (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
*** This bug is a duplicate of bug 1749093 ***
https://bugs.launchpad.net/bugs/1749093
This bug was fixed in the package linux-aws - 4.4.0-1052.61
---
linux-aws (4.4.0-1052.61) xenial; urgency=medium
* linux-aws: 4.4.0-1052.61 -proposed tracker (LP: #1748489)
[ Ubuntu: 4.4.0
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
Gunnar and I have been working on a solution to this issue, based on
Aders and Hans comments above and what gnome help does, and think we
have something very practical and useful. It is now available for
testing on help.ubuntu.com, in the development area, and only for the
desktop help docs, so far
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
@Khaled: I don't see these patches in artful/master-next, so I'm going
to move back the artful task back to "In Progress". Can you confirm if
these will be integrated for the next cycle, or if I should resubmit?
** Changed in: linux (Ubuntu Artful)
Status: Fix Committed => In Progress
--
** Changed in: ubiquity (Ubuntu)
Status: Invalid => New
** Changed in: ubiquity (Ubuntu Precise)
Status: Invalid => Confirmed
** Changed in: ubiquity (Ubuntu Precise)
Status: Confirmed => Fix Released
** Changed in: ubiquity (Ubuntu)
Status: New => Fix Committed
--
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750793
Title:
Faile
I have backported it myself and multiple issues (including this one)
have been resolved as a result. I am still confused by the reasoning
behind being unwilling to backport versions of this package in a "Long
Term Support" release of Ubuntu. This bug is not fixed until a newer
version is backported
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v4.4 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel d
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
MAAS kvm deploy SRU verification for xenial
** Attachment added: "maas_pod_kvm_install.log"
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1747059/+attachment/5059911/+files/maas_pod_kvm_install.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, whi
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
* [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver (LP: #1749332)
- SAUCE: vmbus-rdma
** Changed in: kernel-sru-workflow/verification-testing
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749095
Title:
linux-euclid: 4.4.0-9025.27 -proposed trac
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
*** This bug is a duplicate of bug 1748990 ***
https://bugs.launchpad.net/bugs/1748990
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle ker
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
Still in LO 6.0.x
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748895
Title:
LO unable to find a working email configuration
To manage notifications about this bug go to:
https://bugs.launchpad.n
*** This bug is a duplicate of bug 1749096 ***
https://bugs.launchpad.net/bugs/1749096
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP: #174909
This bug was fixed in the package libreoffice - 1:5.4.5-0ubuntu0.17.10.1
---
libreoffice (1:5.4.5-0ubuntu0.17.10.1) artful; urgency=medium
* New upstream release (LP: #1748999)
- fixes CVE-2018-6871: Remote arbitrary file disclosure vulnerability via
WEBSERVICE formula
*
*** This bug is a duplicate of bug 1750046 ***
https://bugs.launchpad.net/bugs/1750046
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-57
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059868/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748972
Title:
0b
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
* [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver (LP: #1749332)
- SAUCE: vmbus-rdma
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748476
Title:
linux-azure: 4.13.0-1011.14 -proposed tracke
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059866/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/174
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059869/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
Same problem with cloudcompare. Installed using snap, launches fine,
can't find any files as I don't keep gigantic 3D point clouds in my home
directory. Seriously, what is the point of this thing?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
*** This bug is a duplicate of bug 1749092 ***
https://bugs.launchpad.net/bugs/1749092
This bug was fixed in the package linux-kvm - 4.4.0-1019.24
---
linux-kvm (4.4.0-1019.24) xenial; urgency=medium
* linux-kvm: 4.4.0-1019.24 -proposed tracker (LP: #1749092)
[ Ubuntu: 4.4.0
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: gvfs (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
audac
Public bug reported:
For Ubuntu 18.04 LTS, the x86 retpoline options (-mindirect-branch=thunk
and -mfunction-return=thunk) should be enabled by default.
For problematic packages, -mindirect-branch=keep and -mfunction-
return=keep can be used to disable retpolines.
** Affects: gcc-7 (Ubuntu)
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
*** This bug is a duplicate of bug 1749090 ***
https://bugs.launchpad.net/bugs/1749090
This bug was fixed in the package linux-aws - 4.4.0-1014.14
---
linux-aws (4.4.0-1014.14) trusty; urgency=medium
* linux-aws: 4.4.0-1014.14 -proposed tracker (LP: #1748486)
[ Ubuntu: 4.4.0
This bug was fixed in the package linux-gcp - 4.13.0-1011.15
---
linux-gcp (4.13.0-1011.15) xenial; urgency=medium
* linux-gcp: 4.13.0-1011.15 -proposed tracker (LP: #1748478)
[ Ubuntu: 4.13.0-35.39 ]
* linux: 4.13.0-35.39 -proposed tracker (LP: #1748743)
* CVE-2017-5715 (Sp
@Mathieu,
Good catch.
@Scott:
Network config MAAS sent is correect, it is the same config sent to
xenial: https://pastebin.canonical.com/p/rjBgzKjdxR/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059867/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748972
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
*** This bug is a duplicate of bug 1749092 ***
https://bugs.launchpad.net/bugs/1749092
This bug was fixed in the package linux-kvm - 4.4.0-1019.24
---
linux-kvm (4.4.0-1019.24) xenial; urgency=medium
* linux-kvm: 4.4.0-1019.24 -proposed tracker (LP: #1749092)
[ Ubuntu: 4.4.0
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
* h
*** This bug is a duplicate of bug 1749096 ***
https://bugs.launchpad.net/bugs/1749096
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP: #174909
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-hwe - 4.13.0-36.40~16.04.1
---
linux-hwe (4.13.0-36.40~16.04.1) xenial; urgency=medium
* linux-hwe: 4.13.0-36.40~16.04.1 -proposed tracker (LP: #1750052)
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This is pretty critical to MAAS as this yield Bionic deployments without
DNS resolution.
** Description changed:
When deploying Bionic, /etc/resolv.conf is not configured correctly,
which leads to no DNS resolution. In the output below, you will see that
netplan config is correctly to the 1
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
Security review needed.
** Changed in: xdg-desktop-portal (Ubuntu)
Assignee: Nish Aravamudan (nacc) => Ubuntu Security Team (ubuntu-security)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749672
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749094
Title:
linux-raspi2: 4.4.0-1085.93 -proposed tracke
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package curtin - 17.1-37-g82622f12-0ubuntu1
---
curtin (17.1-37-g82622f12-0ubuntu1) bionic; urgency=medium
* New upstream snapshot.
- docs: Document use of format command with fstype: zfsroot
- docs: Add HACKING.rst doc to top level dir and readthed
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749096
Title:
linux-snapdragon: 4.4.0-1087.92 -proposed tr
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749089
Title:
linux: 4.4.0-116.140 -proposed tracker
To ma
I would also love to know what commit you think is causing the issue.
I've been trying to dig through a bit and haven't had any luck tracking
down the issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
This bug was fixed in the package linux-hwe - 4.13.0-36.40~16.04.1
---
linux-hwe (4.13.0-36.40~16.04.1) xenial; urgency=medium
* linux-hwe: 4.13.0-36.40~16.04.1 -proposed tracker (LP: #1750052)
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
*** This bug is a duplicate of bug 1749096 ***
https://bugs.launchpad.net/bugs/1749096
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP: #174909
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: rhythmbox (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749095
Title:
linux-euclid: 4.4.0-9025.27 -proposed tracke
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP: #1749096)
[ Ubuntu: 4.4.0-116.140 ]
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059859/+files/CRDA.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748972
Title:
0bda:a
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux: 4.13
*** This bug is a duplicate of bug 1749090 ***
https://bugs.launchpad.net/bugs/1749090
This bug was fixed in the package linux-aws - 4.4.0-1014.14
---
linux-aws (4.4.0-1014.14) trusty; urgency=medium
* linux-aws: 4.4.0-1014.14 -proposed tracker (LP: #1748486)
[ Ubuntu: 4.4.0
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.16 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix t
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Branch linked: lp:~unity-team/unity/x-sru6
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750619
Title:
Static CompRegion destruction causes memory corruption at compiz exit
To manage notificati
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
Tested and reproduced on mainline kernel linux-
image-4.4.116-0404116-generic .
Incidentally, issue does not occur in the HWE kernel, 4.13.0-32-generic.
** Tags added: kernel-bug-exists-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notif
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
401 - 500 of 803 matches
Mail list logo