The solution seems to be re-issue the apt dist-upgrade command again.
And this time the upgrade process will ended successfully with a
Warning:
$ sudo apt-get dist-upgrade
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
T
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1766176
Title:
initramfs-tools returns error
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Fix Committed
** Tags adde
This has been in -proposed for 4 days now, and there have been multiple
bug reports in that time from users who have -proposed enabled - but
none against the latest version which has been in -proposed for 24h+.
Dropping the block-proposed tag now to let this migrate.
** Tags removed: block-propose
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Fix Committed
** Tags adde
This bug was fixed in the package shim-signed - 1.34.4
---
shim-signed (1.34.4) bionic; urgency=medium
* Handle the case that there are no kernel modules available for a given
dkms package. This probably indicates there is a problem with the dkms
module's installation, but
This bug was fixed in the package dkms - 2.3-3ubuntu7
---
dkms (2.3-3ubuntu7) bionic; urgency=medium
* 0009-Add-support-for-UEFI-Secure-Boot-validation-toggling.patch: update
for the new update-secureboot-policy code: have it generate a new MOK if
there isn't one yet, and us
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1766021
Title:
linux: 4.15.0-19.20 -proposed tr
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
*** This bug is a duplicate of bug 1763687 ***
https://bugs.launchpad.net/bugs/1763687
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fail
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 3.13.0-145.194
---
linux (3.13.0-145.194) trusty; urgency=medium
* linux: 3.13.0-145.194 -proposed tracker (LP: #1761430)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) /
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
This bug was fixed in the package linux - 4.4.0-121.145
---
linux (4.4.0-121.145) xenial; urgency=medium
* linux: 4.4.0-121.145 -proposed tracker (LP: #1763687)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config] arm64: disable BPF_JIT_ALWAYS_ON
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
--- Comment From hasri...@in.ibm.com 2018-04-23 04:28 EDT---
The following are the list of failures on Ubuntu mainline 4.17-rc1 kernel,
which is the same as of distro kernel.
Link: http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.17-rc1/
# uname -a
Linux lep8d 4.17.0-041700rc1-generic #2
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-artful
** Tags removed: block-proposed
--
You received this bug notification because you
This bug was fixed in the package linux-snapdragon - 4.4.0-1090.95
---
linux-snapdragon (4.4.0-1090.95) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1090.95 -proposed tracker (LP: #1763689)
* Ubuntu-4.4.0-120.144 fails to boot on arm64* hardware (LP: #1763644)
- [Config]
Only bug 1758364 hasn't been verified. The regression potential of this
change is none, so setting 'verification-testing' as 'Fix released' so
we can continue with the release process.
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1021.26
---
linux-kvm (4.4.0-1021.26) xenial; urgency=medium
* linux-kvm: 4.4.0-1021.26 -proposed tracker (LP: #1761445)
* linux-kvm VFIO support for Kata containers (LP: #1759421)
- kvm: [config] Enable VFIO
[ Ubuntu: 4
This bug was fixed in the package linux-aws - 4.4.0-1055.64
---
linux-aws (4.4.0-1055.64) xenial; urgency=medium
* linux-aws: 4.4.0-1055.64 -proposed tracker (LP: #1761443)
[ Ubuntu: 4.4.0-120.144 ]
* linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
* intel-microcode 3
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1021.26
---
linux-kvm (4.4.0-1021.26) xenial; urgency=medium
* linux-kvm: 4.4.0-1021.26 -proposed tracker (LP: #1761445)
* linux-kvm VFIO support for Kata containers (LP: #1759421)
- kvm: [config] Enable VFIO
[ Ubuntu: 4
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1017.17
---
linux-aws (4.4.0-1017.17) trusty; urgency=medium
* linux-aws: 4.4.0-1017.17 -proposed tracker (LP: #1761439)
[ Ubuntu: 4.4.0-120.144 ]
* linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
* intel-microcode 3
This bug was fixed in the package linux-aws - 4.4.0-1017.17
---
linux-aws (4.4.0-1017.17) trusty; urgency=medium
* linux-aws: 4.4.0-1017.17 -proposed tracker (LP: #1761439)
[ Ubuntu: 4.4.0-120.144 ]
* linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
* intel-microcode 3
This bug was fixed in the package linux-kvm - 4.4.0-1021.26
---
linux-kvm (4.4.0-1021.26) xenial; urgency=medium
* linux-kvm: 4.4.0-1021.26 -proposed tracker (LP: #1761445)
* linux-kvm VFIO support for Kata containers (LP: #1759421)
- kvm: [config] Enable VFIO
[ Ubuntu: 4
This bug was fixed in the package linux-aws - 4.4.0-1055.64
---
linux-aws (4.4.0-1055.64) xenial; urgency=medium
* linux-aws: 4.4.0-1055.64 -proposed tracker (LP: #1761443)
[ Ubuntu: 4.4.0-120.144 ]
* linux: 4.4.0-120.144 -proposed tracker (LP: #1761438)
* intel-microcode 3
** Also affects: linux-oem (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1764684
Title:
Fix an issue that some PCI devices get incor
comment #8
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1758797
Title:
[Ubuntu 18.04] USB Type-C test failed on GLK
Status in intel:
New
Status in linux package in Ubuntu:
Fix Com
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
patch has been merged into upstream:
b1b59e16075f5e5da2943ce8de724ab96bc3c6c2
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1758797
Title:
[Ubuntu 18.04] USB Type-C test failed on GLK
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/snap-release-to-stable
Status: New => Confirmed
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Description changed:
The system was only recently installed, so there was no other version of
the kernel before on this system. However, last week I could get my
hands on this system again and update/upgrade installed a new kernel
which fixed the problem, I did not have the possibility yet to check
whether it now also
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Description changed:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
This bug was fixed in the package linux - 4.13.0-39.44
---
linux (4.13.0-39.44) artful; urgency=medium
* linux: 4.13.0-39.44 -proposed tracker (LP: #1761456)
* intel-microcode 3.20180312.0 causes lockup at login screen(w/ linux-
image-4.13.0-37-generic) (LP: #1759920) // CVE-
You have been subscribed to a public bug:
== Comment: #0 - Application Cdeadmin - 2018-04-20
05:56:03 ==
== Comment: #1 - Application Cdeadmin - 2018-04-20
05:56:05 ==
State: Open by: stccdenv on 18 April 2018 06:27:28
This defect was opened automatically using defect_template with
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The bug description describes use of an LPAR. Does this report refer to
running Ubuntu as a guest under PowerVM?
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)
** Changed in: ubuntu-power-systems
Importance: Undecided => High
** Changed in: ubuntu-power-systems
Assignee: (
--- Comment From cdead...@us.ibm.com 2018-04-23 06:08 EDT---
== Comment: #7 - Application Cdeadmin - 2018-04-23
02:24:36 == State: Open by: stccdenv on 20 April 2018 05:54:35
== Comment: #5 - Application Cdeadmin - 2018-04-20
06:04:08 == State: Open by: stccdenv on 18 April
--- Comment From cdead...@us.ibm.com 2018-04-23 06:41 EDT---
== Comment: #1 - Application Cdeadmin - 2018-04-20
05:56:05 == State: Open by: stccdenv on 20 April 2018 05:54:35
===END===
State: Open by: cde00 on 23 A
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
I'm now on 4.16.3 kernel, and while I haven't encountered freeze since
moving to 4.15.13+, the WiFi connection becomes slow/unstable after few
minutes. I'm not sure this is connected to the same part of code, or my
HW meanwhile degraded a bit (did the 4.4 kernel work without a hitch? I
may try to b
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1766024
Title:
linux-aws: 4.15.0-1006.6 -
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associ
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/snap-release-to-stable
Status: Confirmed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1766027
Title:
linux-kvm: 4.15.0-1007.7 -
This bug was fixed in the package linux-azure - 4.13.0-1014.17
---
linux-azure (4.13.0-1014.17) xenial; urgency=medium
* linux-azure: 4.13.0-1014.17 -proposed tracker (LP: #1761459)
* retpoline hints: primary infrastructure and initial hints (LP: #1758856)
- [Config] retpolin
1 - 100 of 370 matches
Mail list logo