tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/fozzie__4.8.0-53.56~16.04.1__2017-05-16_11-10-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--- Comment From vipar...@in.ibm.com 2017-05-16 07:07 EDT---
Commit c950fd6f20 ("pstore: Split pstore fragile flags") is
available in kernel 4.9 and above, while commit
041939c1ec ("pstore: Fix flags to enable dumps on powerpc")
would get into 4.12, so need to be pulled into kernel version
Public bug reported:
cvs package fails to build in Artful:
https://launchpadlibrarian.net/317615278/buildlog_ubuntu-artful-
amd64.cvs_2%3A1.12.13+real-23_BUILDING.txt.gz :
...
dh_shlibdeps
dh_gencontrol
dh_md5sums
dh_builddeb -- -Zgzip -z9
INFO: pkgstriptranslations version 131
*** This bug is a duplicate of bug 1664131 ***
https://bugs.launchpad.net/bugs/1664131
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1664131, so is being marked as such.
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid
Verification is ok for Yakkety and Zesty.
On Xenial there is an issue (nothing that breaks, but it doesn't fix it due to
the apparmor packaging structure there being different).
I already have a follow on patch ready and test it now.
Hopefully I can reject/replace the one in x-p rather soon.
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686414
Title:
linux: 4.10.0-21.23 -proposed
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686419
Title:
linux-raspi2: 4.10.0-1005.7
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
*** This bug is a duplicate of bug 1687718 ***
https://bugs.launchpad.net/bugs/1687718
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
chb@conventiont|~
> lxc profile show dummy
config:
security.nesting: "true"
security.privileged: "true"
description: ""
devices:
gpu:
type: gpu
name: dummy
used_by:
- /1.0/containers/alp1
- /1.0/containers/alpgpu
--
You received this bug notification because you are a member of Ubuntu
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
bug 1623664 released yesterday, unblocking the neutron and neutron-lbaas
uploads for this SRU - please can they be reviewed!
Ta
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1688557
Title:
[SRU]
*** This bug is a duplicate of bug 1664131 ***
https://bugs.launchpad.net/bugs/1664131
Public bug reported:
fail to install
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: console-setup 1.108ubuntu15.3
ProcVersionSignature: Ubuntu 4.4.0-77.98-generic 4.4.59
Uname: Linux
First: thank you so much for the quick, accurate replies to my fractured
English reporting. Turns out my phone's autocorrect and my tiredness
were not a good match ("por to go back"? "boy you might have trouble"?
...)
Second, apart from the poor wording, there's no evident way to go back and do a
The verification of the Stable Release Update for ceph has completed
successfully and the package has now been released to -updates. In the
event that you encounter a regression using the package from -updates
please report a new bug using ubuntu-bug and tag the bug report
regression-update so we
This bug was fixed in the package ceph - 0.94.10-0ubuntu0.15.10.1~cloud2
---
ceph (0.94.10-0ubuntu0.15.10.1~cloud2) trusty; urgency=medium
.
* Start ceph-all after static-network-up (LP: #1636322).
- d/p/start-ceph-all-after-network.patch: add dependency on
the
This bug was fixed in the package ceph - 0.94.10-0ubuntu0.15.04.1~cloud1
---
ceph (0.94.10-0ubuntu0.15.04.1~cloud1) trusty; urgency=medium
.
* Start ceph-all after static-network-up (LP: #1636322).
- d/p/start-ceph-all-after-network.patch: add dependency on
the
The verification of the Stable Release Update for ceph has completed
successfully and the package has now been released to -updates. In the
event that you encounter a regression using the package from -updates
please report a new bug using ubuntu-bug and tag the bug report
regression-update so we
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux-raspi2 - 4.10.0-1005.7
---
linux-raspi2 (4.10.0-1005.7) zesty; urgency=low
* linux-raspi2: 4.10.0-1005.7 -proposed tracker (LP: #1686419)
[ Ubuntu: 4.10.0-21.23 ]
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/fozzie__4.8.0-53.56~16.04.1__2017-05-16_10-43-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/gonzo__4.8.0-53.56~16.04.1__2017-05-16_10-49-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: xfce4-weather-plugin
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1688056
Title:
Package outdated
To manage notifications about this bug go to:
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/pepe__4.8.0-53.56~16.04.1__2017-05-16_10-44-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
Can't we upstream the Xenial zfs script instead of fixing the "new" one?
It supports the same syntax, and does what it needs to do? And it does
not try to mount datasets I explicitly configured not to be mountable ;)
Seems like the faster solution, no?
--
You received this bug notification
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-raspi2 - 4.8.0-1036.39
---
linux-raspi2 (4.8.0-1036.39) yakkety; urgency=low
* linux-raspi2: 4.8.0-1036.39 -proposed tracker (LP: #1686979)
[ Ubuntu: 4.8.0-52.55 ]
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477:
Hello Jose, or anyone else affected,
Accepted breeze into zesty-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/breeze/4:5.9.5-0ubuntu0.1 in a few
hours, and then in the -proposed repository.
Please help us by testing this new package. See
same here on ubuntu gnome 17.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375782
Title:
Unable to perform search error when syncing Evolution with Google
Contacts
To manage notifications
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Hello Jose, or anyone else affected,
Accepted bluedevil into zesty-proposed. The package will build now and
be available at
https://launchpad.net/ubuntu/+source/bluedevil/4:5.9.5-0ubuntu0.1 in a
few hours, and then in the -proposed repository.
Please help us by testing this new package. See
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed:
** Also affects: linux (Ubuntu Yakkety)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1690956
Title:
linux: 4.8.0-53.56 -proposed tracker
To manage
Hello IBM,
The fix for this issue has been included on linux kernel 4.4.0-78.99 for
Xenial, which is about to be promoted from -proposed to -updates. Could
you please verify if this kernel version fixes the issue?
Thank you.
--
You received this bug notification because you are a member of
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/gonzo__4.8.0-53.56~16.04.1__2017-05-16_10-22-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/fozzie__4.8.0-53.56~16.04.1__2017-05-16_10-17-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/pepe__4.8.0-53.56~16.04.1__2017-05-16_10-17-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hello Timo, or anyone else affected,
Accepted mesa into zesty-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/mesa/17.0.6-0ubuntu0.17.04.1 in a
few hours, and then in the -proposed repository.
Please help us by testing this new package. See
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1686645
Title:
linux: 4.4.0-78.99 -proposed tracker
** Tags added: kde-neon yakkety
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1530405
Title:
NMI watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [kerneloops:814]
To manage notifications about
** Changed in: linux (Ubuntu Xenial)
Assignee: Tim Gardner (timg-tpi) => Kleber Sacilotto de Souza
(kleber-souza)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1659111
Title:
UbuntuKVM guest
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/rumford__4.8.0-53.56~16.04.1__2017-05-16_10-04-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a duplicate of bug 1617564 ***
https://bugs.launchpad.net/bugs/1617564
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1617564, so is being marked as such.
*** This bug is a duplicate of bug 1588346 ***
https://bugs.launchpad.net/bugs/1588346
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1588346, so is being marked as such.
*** This bug is a duplicate of bug 1617564 ***
https://bugs.launchpad.net/bugs/1617564
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1617564, so is being marked as such.
** Summary changed:
-
/usr/bin/pulseaudio:6:extension_cb:command_extension:pa_pdispatch_run:pstream_packet_callback:do_read
+ pulseaudio crashed with SIGABRT in extension_cb() from command_extension()
from pa_pdispatch_run() from pstream_packet_callback() from do_read()
--
You received this
** Summary changed:
-
/usr/bin/pulseaudio:6:pa_memblock_unref:drop_block:drop_backlog:pa_memblockq_drop:pa_sink_input_drop
+ pulseaudio crashed with SIGABRT in pa_memblock_unref() from drop_block() from
drop_backlog() from pa_memblockq_drop() from pa_sink_input_drop()
--
You received this bug
** Summary changed:
-
/usr/bin/pulseaudio:6:memcpy:pa_memchunk_make_writable:pa_source_post:inputs_drop:pa_sink_render_into
+ pulseaudio crashed with SIGABRT in memcpy() from pa_memchunk_make_writable()
from pa_source_post() from inputs_drop() from pa_sink_render_into()
--
You received this
** Summary changed:
-
/usr/bin/pulseaudio:11:pa_msgobject_isinstance:pa_msgobject_cast:adjust_rates:sink_input_process_msg_cb:pa_asyncmsgq_dispatch
+ pulseaudio crashed with SIGSEGV in pa_msgobject_isinstance() from
pa_msgobject_cast() from adjust_rates() from sink_input_process_msg_cb() from
** Summary changed:
-
/usr/bin/pulseaudio:11:avahi_client_is_connected:avahi_entry_group_reset:publish_service:once_callback:dispatch_defer
+ pulseaudio crashed with SIGSEGV in avahi_client_is_connected() from
avahi_entry_group_reset() from publish_service() from once_callback() from
** Summary changed:
-
/usr/bin/pulseaudio:11:transport_acquire:setup_transport:init_profile:set_profile_cb:pa_card_set_profile
+ pulseaudio crashed with SIGSEGV in transport_acquire() from setup_transport()
from init_profile() from set_profile_cb() from pa_card_set_profile()
--
You received
** Summary changed:
-
/usr/bin/pulseaudio:6:module_jack_source_LTX_pa__init:pa_module_load:pa_cli_command_load:pa_cli_command_execute_line_stateful:pa_cli_command_execute_file_stream
+ pulseaudio crashed with SIGABRT in module_jack_source_LTX_pa__init() from
pa_module_load() from
** Summary changed:
-
/usr/bin/pactl:6:pa_format_info_free:set_sink_formats:context_state_callback:pa_context_set_state:setup_complete_callback
+ pactl crashed with SIGABRT in pa_format_info_free() from set_sink_formats()
from context_state_callback() from pa_context_set_state() from
** Summary changed:
-
/usr/bin/pulseaudio:11:__strcmp_ia32:filter_func:dbus_connection_dispatch:dispatch_timeout_callback:dispatch_timeout
+ pulseaudio crashed with SIGSEGV in __strcmp_ia32() from filter_func() from
dbus_connection_dispatch() from dispatch_timeout_callback() from
** Summary changed:
-
/usr/bin/pulseaudio:6:resampler_basic_interpolate_single:speex_resampler_process_native:speex_resampler_process_float:speex_resampler_process_interleaved_float:speex_resample_float
+ pulseaudio crashed with SIGABRT in resampler_basic_interpolate_single() from
** Summary changed:
-
/usr/bin/pulseaudio:6:__memcpy_avx_unaligned:memcpy:tdb_read:tdb_transaction_recover:tdb_open_ex
+ pulseaudio crashed with SIGABRT in __memcpy_avx_unaligned() from memcpy()
from tdb_read() from tdb_transaction_recover() from tdb_open_ex()
--
You received this bug
** Summary changed:
-
/usr/bin/pulseaudio:6:rtsp_exec:pa_rtsp_setparameter:pa_raop_client_set_volume:pa_sink_set_mute:command_set_mute
+ pulseaudio crashed with SIGABRT in rtsp_exec() from pa_rtsp_setparameter()
from pa_raop_client_set_volume() from pa_sink_set_mute() from command_set_mute()
** Summary changed:
-
/usr/bin/pulseaudio:6:pa_bluetooth_transport_put:profile_new_connection:profile_handler:_dbus_object_tree_dispatch_and_unlock:dbus_connection_dispatch
+ pulseaudio crashed with SIGABRT in pa_bluetooth_transport_put() from
profile_new_connection() from profile_handler()
** Summary changed:
-
/usr/bin/pulseaudio:6:pa_alsa_path_set_volume:sink_write_volume_cb:sink_set_port_cb:pa_sink_process_msg:sink_process_msg
+ pulseaudio crashed with SIGABRT in pa_alsa_path_set_volume() from
sink_write_volume_cb() from sink_set_port_cb() from pa_sink_process_msg() from
The long list of tags suggests this one needs some attention.
** Summary changed:
- /usr/bin/pulseaudio:*** Error in `/usr/bin/pulseaudio': double free or
corruption (!prev): ADDR ***
+ pulseaudio crashed with heap corruption: *** Error in `/usr/bin/pulseaudio':
double free or corruption
** Summary changed:
-
/usr/bin/pulseaudio:6:pa_sink_render_full:sink_input_pop_cb:pa_sink_input_peek:fill_mix_info:pa_sink_render_into
+ pulseaudio crashed with SIGABRT in pa_sink_render_full() from
sink_input_pop_cb() from pa_sink_input_peek() from fill_mix_info() from
pa_sink_render_into()
** Summary changed:
-
/usr/bin/pulseaudio:6:snd_pcm_recover:pa_alsa_recover_from_poll:thread_func:internal_thread_func:start_thread
+ pulseaudio crashed with SIGABRT in snd_pcm_recover() from
pa_alsa_recover_from_poll() from thread_func() from internal_thread_func() from
start_thread()
--
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/wright-kernel__4.8.0-53.56~16.04.1__2017-05-16_09-47-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/hainzel__4.8.0-53.56~16.04.1__2017-05-16_09-55-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/gonzo__4.8.0-53.56~16.04.1__2017-05-16_09-55-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/pepe__4.8.0-53.56~16.04.1__2017-05-16_09-51-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/fozzie__4.8.0-53.56~16.04.1__2017-05-16_09-51-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a duplicate of bug 1617564 ***
https://bugs.launchpad.net/bugs/1617564
Public bug reported:
I was making install via Synaptic.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: kaccounts-providers (not installed)
ProcVersionSignature: Ubuntu
tests ran: 1, failed: 0;
http://kernel.ubuntu.com/testing/4.8.0-53.56~16.04.1-generic/secchi__4.8.0-53.56~16.04.1__2017-05-16_09-47-00/results-index.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a duplicate of bug 1617564 ***
https://bugs.launchpad.net/bugs/1617564
Public bug reported:
I was making install via Synaptic.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: kaccounts-providers (not installed)
ProcVersionSignature: Ubuntu
601 - 700 of 868 matches
Mail list logo