** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
This bug was fixed in the package linux-oem - 4.13.0-1015.16
---
linux-oem (4.13.0-1015.16) xenial; urgency=low
* linux-oem: 4.13.0-1015.16 -proposed tracker (LP: #1741958)
[ Ubuntu: 4.13.0-25.29 ]
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
-
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1738259
Title:
need to ensure
*** This bug is a duplicate of bug 1741727 ***
https://bugs.launchpad.net/bugs/1741727
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm:
*** This bug is a duplicate of bug 1741727 ***
https://bugs.launchpad.net/bugs/1741727
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm:
** No longer affects: linux (Ubuntu Trusty)
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
--
You received this
** Package changed: linux (Ubuntu Bionic) => linux-meta (Ubuntu Bionic)
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1738259
Title:
need
This bug was fixed in the package linux-snapdragon - 4.4.0-1084.89
---
linux-snapdragon (4.4.0-1084.89) xenial; urgency=low
* linux-snapdragon: 4.4.0-1084.89 -proposed tracker (LP: #1741653)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
*
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
This bug was fixed in the package linux-aws - 4.4.0-1047.56
---
linux-aws (4.4.0-1047.56) xenial; urgency=low
* linux-aws: 4.4.0-1047.56 -proposed tracker (LP: #1741646)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
-
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
This bug was fixed in the package linux-gcp - 4.13.0-1006.9
---
linux-gcp (4.13.0-1006.9) xenial; urgency=low
* linux-gcp: 4.13.0-1006.9 -proposed tracker (LP: #1741956)
[ Ubuntu: 4.13.0-25.29 ]
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
-
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in:
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm: Disable PCID on 32-bit kernels
linux (4.4.0-107.130) xenial; urgency=low
* linux:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह,
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
This bug was fixed in the package linux-kvm - 4.4.0-1015.20
---
linux-kvm (4.4.0-1015.20) xenial; urgency=low
* linux-kvm: 4.4.0-1015.20 -proposed tracker (LP: #1741651)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
-
This bug was fixed in the package linux-raspi2 - 4.4.0-1082.90
---
linux-raspi2 (4.4.0-1082.90) xenial; urgency=low
* linux-raspi2: 4.4.0-1082.90 -proposed tracker (LP: #1741652)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
*
*** This bug is a duplicate of bug 1741958 ***
https://bugs.launchpad.net/bugs/1741958
This bug was fixed in the package linux-oem - 4.13.0-1015.16
---
linux-oem (4.13.0-1015.16) xenial; urgency=low
* linux-oem: 4.13.0-1015.16 -proposed tracker (LP: #1741958)
[ Ubuntu:
*** This bug is a duplicate of bug 1741956 ***
https://bugs.launchpad.net/bugs/1741956
This bug was fixed in the package linux-gcp - 4.13.0-1006.9
---
linux-gcp (4.13.0-1006.9) xenial; urgency=low
* linux-gcp: 4.13.0-1006.9 -proposed tracker (LP: #1741956)
[ Ubuntu:
*** This bug is a duplicate of bug 1742177 ***
https://bugs.launchpad.net/bugs/1742177
** This bug has been marked a duplicate of bug 1742177
linux-hwe: 4.13.0-26.29~16.04.2 -proposed tracker
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह,
*** This bug is a duplicate of bug 1741956 ***
https://bugs.launchpad.net/bugs/1741956
This bug was fixed in the package linux-gcp - 4.13.0-1006.9
---
linux-gcp (4.13.0-1006.9) xenial; urgency=low
* linux-gcp: 4.13.0-1006.9 -proposed tracker (LP: #1741956)
[ Ubuntu:
** Changed in: linux (Ubuntu Artful)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Bionic)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-azure-edge (Ubuntu Xenial)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
** No longer affects: linux (Ubuntu Xenial)
** Changed in: linux-azure-edge (Ubuntu Xenial)
Status: New => In Progress
** Changed in: linux-azure-edge (Ubuntu Xenial)
Assignee: (unassigned) => Marcelo Cerri (mhcerri)
--
You received this bug notification because you are a member of
*** This bug is a duplicate of bug 1741652 ***
https://bugs.launchpad.net/bugs/1741652
** This bug has been marked a duplicate of bug 1741652
linux-raspi2: 4.4.0-1082.90 -proposed tracker
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह,
*** This bug is a duplicate of bug 1741651 ***
https://bugs.launchpad.net/bugs/1741651
** This bug has been marked a duplicate of bug 1741651
linux-kvm: 4.4.0-1015.20 -proposed tracker
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which
*** This bug is a duplicate of bug 1741653 ***
https://bugs.launchpad.net/bugs/1741653
** This bug has been marked a duplicate of bug 1741653
linux-snapdragon: 4.4.0-1084.89 -proposed tracker
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह,
*** This bug is a duplicate of bug 1741646 ***
https://bugs.launchpad.net/bugs/1741646
** This bug has been marked a duplicate of bug 1741646
linux-aws: 4.4.0-1047.56 -proposed tracker
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package
** Also affects: pacemaker (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: corosync (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: pacemaker (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: corosync (Ubuntu
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Invalid
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that
*** This bug is a duplicate of bug 1738206 ***
https://bugs.launchpad.net/bugs/1738206
This bug was fixed in the package linux-azure-edge - 4.14.0-1003.3
---
linux-azure-edge (4.14.0-1003.3) xenial; urgency=low
* linux-azure-edge: 4.14.0-1003.3 -proposed tracker (LP: #1741962)
This bug was fixed in the package linux-azure-edge - 4.14.0-1003.3
---
linux-azure-edge (4.14.0-1003.3) xenial; urgency=low
* linux-azure-edge: 4.14.0-1003.3 -proposed tracker (LP: #1741962)
* ubuntu/xr-usb-serial didn't get built in zesty and artful (LP: #1733281)
- ubuntu:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह,
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Released => Invalid
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
** Changed in: fwupd
Status: New => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1730343
Title:
firmware update
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
This bug was fixed in the package linux-azure-edge - 4.14.0-1003.3
---
linux-azure-edge (4.14.0-1003.3) xenial; urgency=low
* linux-azure-edge: 4.14.0-1003.3 -proposed tracker (LP: #1741962)
* ubuntu/xr-usb-serial didn't get built in zesty and artful (LP: #1733281)
- ubuntu:
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with
This bug was fixed in the package debian-installer - 20101020ubuntu527
---
debian-installer (20101020ubuntu527) bionic; urgency=medium
[ dann frazier ]
* arm64-efi/netboot: Improvements to mini.iso generation:
- Add an EFI System Partition to fix booting from USB stick on
This bug was fixed in the package linux-hwe-edge - 4.13.0-25.29~16.04.2
---
linux-hwe-edge (4.13.0-25.29~16.04.2) xenial; urgency=low
* linux-hwe-edge: 4.13.0-25.29~16.04.2 -proposed tracker (LP:
#1741960)
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Invalid
** Changed in:
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Invalid
** Changed in:
This bug was fixed in the package linux-euclid - 4.4.0-9021.22
---
linux-euclid (4.4.0-9021.22) xenial; urgency=low
* linux-euclid: 4.4.0-9021.22 -proposed tracker (LP: #1741648)
* CVE-2017-5754
- KAISER: Kernel Address Isolation
- kaiser: merged update
- kaiser: do
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in:
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~17.04.1
---
nplan (0.32~17.04.1) zesty; urgency=medium
* Backport 0.32 to 17.04. (LP: #1713142)
nplan (0.32) bionic; urgency=medium
* src/nm.c: better handle the UUID generation; the order of iterating
through interaces may
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~17.04.1
---
nplan (0.32~17.04.1) zesty; urgency=medium
* Backport 0.32 to 17.04. (LP: #1713142)
nplan (0.32) bionic; urgency=medium
* src/nm.c: better handle the UUID generation; the order of iterating
through interaces may
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
This bug was fixed in the package nplan - 0.32~17.04.1
---
nplan (0.32~17.04.1) zesty; urgency=medium
* Backport 0.32 to 17.04. (LP: #1713142)
nplan (0.32) bionic; urgency=medium
* src/nm.c: better handle the UUID generation; the order of iterating
through interaces may
This bug was fixed in the package nplan - 0.32~17.04.1
---
nplan (0.32~17.04.1) zesty; urgency=medium
* Backport 0.32 to 17.04. (LP: #1713142)
nplan (0.32) bionic; urgency=medium
* src/nm.c: better handle the UUID generation; the order of iterating
through interaces may
This bug was fixed in the package nplan - 0.32~16.04.3
---
nplan (0.32~16.04.3) xenial; urgency=medium
* tests/integration.py: Really fix skipping test_routes_v6 for the NM
backend.
nplan (0.32~16.04.2) xenial; urgency=medium
* tests/integration.py: Fix test_routes_v6 that
1 - 100 of 138 matches
Mail list logo