This bug was fixed in the package lxd - 2.0.11-0ubuntu1~16.04.4
---
lxd (2.0.11-0ubuntu1~16.04.4) xenial; urgency=medium
* Fix another regression in "lxd init":
- When using the "dir" backend a unrelated profile warning was shown
lxd (2.0.11-0ubuntu1~16.04.3) xenial;
** No longer affects: linux-mako (Ubuntu Precise)
** No longer affects: linux-lts-quantal (Ubuntu Vivid)
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
Public bug reported:
This is an SRU tracking bug for the fixes to two "lxd init" regressions
in LXD 2.0.11.
1) Missing question about the ZFS pool name when creating a new pool.
2) Missing question about the LXD bridge configuration.
Both of those are part of our interactive workflow so didn't
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package network-manager -
1.2.6-0ubuntu0.16.04.2
---
network-manager (1.2.6-0ubuntu0.16.04.2) xenial; urgency=medium
* Fix nm-dhcp-helper DBus Event/Notify race condition (LP: #1696415)
-- Ray Link Thu, 19 Oct 2017 13:53:52
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
*** This bug is a duplicate of bug 1736124 ***
https://bugs.launchpad.net/bugs/1736124
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu:
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
*** This bug is a duplicate of bug 1736120 ***
https://bugs.launchpad.net/bugs/1736120
This bug was fixed in the package linux-azure-edge - 4.13.0-1005.5
---
linux-azure-edge (4.13.0-1005.5) xenial; urgency=low
* linux-azure-edge: 4.13.0-1005.5 -proposed tracker (LP: #1736120)
*** This bug is a duplicate of bug 1736186 ***
https://bugs.launchpad.net/bugs/1736186
This bug was fixed in the package linux-snapdragon - 4.4.0-1081.86
---
linux-snapdragon (4.4.0-1081.86) xenial; urgency=low
* linux-snapdragon: 4.4.0-1081.86 -proposed tracker (LP: #1736186)
*** This bug is a duplicate of bug 1736187 ***
https://bugs.launchpad.net/bugs/1736187
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu:
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
*** This bug is a duplicate of bug 1736185 ***
https://bugs.launchpad.net/bugs/1736185
This bug was fixed in the package linux-raspi2 - 4.4.0-1079.87
---
linux-raspi2 (4.4.0-1079.87) xenial; urgency=low
* linux-raspi2: 4.4.0-1079.87 -proposed tracker (LP: #1736185)
[
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
*** This bug is a duplicate of bug 1736189 ***
https://bugs.launchpad.net/bugs/1736189
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu:
This bug was fixed in the package linux-azure-edge - 4.13.0-1005.5
---
linux-azure-edge (4.13.0-1005.5) xenial; urgency=low
* linux-azure-edge: 4.13.0-1005.5 -proposed tracker (LP: #1736120)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
*
This bug was fixed in the package linux-oem - 4.13.0-1010.11
---
linux-oem (4.13.0-1010.11) xenial; urgency=low
* linux-oem: 4.13.0-1010.11 -proposed tracker (LP: #1736124)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
This bug was fixed in the package linux-azure - 4.11.0-1016.16
---
linux-azure (4.11.0-1016.16) xenial; urgency=low
* linux-azure: 4.11.0-1016.16 -proposed tracker (LP: #1736123)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-snapdragon - 4.4.0-1081.86
---
linux-snapdragon (4.4.0-1081.86) xenial; urgency=low
* linux-snapdragon: 4.4.0-1081.86 -proposed tracker (LP: #1736186)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
This bug was fixed in the package linux-raspi2 - 4.4.0-1079.87
---
linux-raspi2 (4.4.0-1079.87) xenial; urgency=low
* linux-raspi2: 4.4.0-1079.87 -proposed tracker (LP: #1736185)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
*
This bug was fixed in the package linux-aws - 4.4.0-1043.52
---
linux-aws (4.4.0-1043.52) xenial; urgency=low
* linux-aws: 4.4.0-1043.52 -proposed tracker (LP: #1736187)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
This bug was fixed in the package linux-euclid - 4.4.0-9020.21
---
linux-euclid (4.4.0-9020.21) xenial; urgency=low
* linux-euclid: 4.4.0-9020.21 -proposed tracker (LP: #1736188)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
This bug was fixed in the package linux-kvm - 4.4.0-1012.17
---
linux-kvm (4.4.0-1012.17) xenial; urgency=low
* linux-kvm: 4.4.0-1012.17 -proposed tracker (LP: #1736189)
[ Ubuntu: 4.4.0-103.126 ]
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
This bug was fixed in the package python-heatclient - 1.8.0-0ubuntu3
---
python-heatclient (1.8.0-0ubuntu3) zesty; urgency=medium
* d/p/dont-encode-path-separators.patch: Cherry-pick patch from upstream
stable/pike branch to stop encoding of path separators as the are
This bug was fixed in the package python-heatclient - 1.1.0-2ubuntu1
---
python-heatclient (1.1.0-2ubuntu1) xenial; urgency=medium
* d/p/dont-encode-path-separators.patch: Cherry-pick patch from upstream
stable/pike branch to stop encoding of path separators as the are
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Also affects: libzstd (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: libzstd (Ubuntu Zesty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to
This bug was fixed in the package apport - 2.20.4-0ubuntu4.9
---
apport (2.20.4-0ubuntu4.9) zesty; urgency=medium
* bin/apport-cli: read until instead of a single character when # of
apport options is non-unique with a single character. Thanks to Chad Smith
for the patch.
This bug was fixed in the package apport - 2.20.1-0ubuntu2.14
---
apport (2.20.1-0ubuntu2.14) xenial; urgency=medium
* bin/apport-cli: read until instead of a single character when # of
apport options is non-unique with a single character. Thanks to Chad Smith
for the
*** This bug is a duplicate of bug 1736153 ***
https://bugs.launchpad.net/bugs/1736153
This bug was fixed in the package linux-gcp - 4.13.0-1002.5
---
linux-gcp (4.13.0-1002.5) xenial; urgency=low
* linux-gcp: 4.13.0-1002.5 -proposed tracker (LP: #1736153)
[ Ubuntu:
This bug was fixed in the package linux-gcp - 4.13.0-1002.5
---
linux-gcp (4.13.0-1002.5) xenial; urgency=low
* linux-gcp: 4.13.0-1002.5 -proposed tracker (LP: #1736153)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
-
This bug was fixed in the package linux-hwe - 4.10.0-42.46~16.04.1
---
linux-hwe (4.10.0-42.46~16.04.1) xenial; urgency=low
* linux-hwe: 4.10.0-42.46~16.04.1 -proposed tracker (LP: #1736154)
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm,
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux-gcp - 4.13.0-1002.5
---
linux-gcp (4.13.0-1002.5) xenial; urgency=low
* linux-gcp: 4.13.0-1002.5 -proposed tracker (LP: #1736153)
[ Ubuntu: 4.13.0-19.22 ]
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
-
This bug was fixed in the package linux-hwe-edge - 4.13.0-19.22~16.04.1
---
linux-hwe-edge (4.13.0-19.22~16.04.1) xenial; urgency=low
* linux-hwe-edge: 4.13.0-19.22~16.04.1 -proposed tracker (LP:
#1736121)
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
*
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21)
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
*** This bug is a duplicate of bug 1736181 ***
https://bugs.launchpad.net/bugs/1736181
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm,
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088666.html
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: linux (Ubuntu Xenial)
This bug was fixed in the package python-pylxd - 2.2.4-0ubuntu0.17.04.1~cloud0
---
python-pylxd (2.2.4-0ubuntu0.17.04.1~cloud0) xenial; urgency=medium
.
* New upstream stable release, including fix to make models resilient
to new attributes in LXD (LP: #1736454).
**
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
1 - 100 of 125 matches
Mail list logo