Oh, for -s, sorry I didn't catch that
Will do this after it get back to us.
** Changed in: linux (Ubuntu)
Status: Confirmed = Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Have same trouble in Ubuntu 13.10 , 14.04 and later alpha 14.10
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1179010
Title:
No battery present
Status in “linux” package in Ubuntu:
*** Bug 81402 has been marked as a duplicate of this bug. ***
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1041790
Title:
[snb] GPU lockup IPEHR: 0x0b160001 IPEHR: 0x0b140001,
I do not understand why this bug is not a duplicate of bug 1189721.
Surely the cause of it not toggling on is that there is no driver?
Please could you explain.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I do not understand why Bug #1234541 is not a duplicate of this bug.
Surely the cause of bluetooth not toggling on is that there is no
driver? Please could you explain.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Public bug reported:
CID: 201305-13673 Dell Inspiron 5437
The wireless hotkey does not work on this system
Steps:
1. Install 14.04 + update (3.13.0-30), boot to desktop
2. Try to control wireless / BT with the hotkey
Expected result:
* Wireless / BT could be controlled by the hotkey
Actual
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) = Liming Wang (wangliming)
** Changed in: linux (Ubuntu Trusty)
Importance: Medium = High
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342548
Title:
[Dell Inspiron 5437] Wireless
Public bug reported:
The touchpad is not recognized.
The psmouse.proto=bare hotfix does not work.
The i8042.noaux i8042.reset does not work, even though the touchpad would
work in PS2 compat mode (under Win7).
The FN keys are not working at all, probably due to some strange ACPI
decode errors
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342561
Title:
Touchpad not recognized + Fn
Public bug reported:
I want to connect to a BT-serial adapter. Always get the error Unknown
command complete for opcode 37.
If I supply the correct pin, connection is reported successful, but the
device immediately disappears.
I tried three different host BT hardware and two different PCs.
I think this solves the problem for me, at least temporarily on my
Studio 1558. I am now able to compile a scientific library (from Julia
REPL) and not have too many issues...will repost if I find problems.
--
You received this bug notification because you are a member of Kernel
Packages, which
Public bug reported:
Ubuntu 12.04's Hardware Enablement Stack (HWE) check forced me to upgrade to
trusty's kernel:
* Install a newer HWE version by running:
sudo apt-get install linux-generic-lts-trusty linux-image-generic-lts-trusty
Since then bluetooth communication fails with Transport
Public bug reported:
CID: 201305-13673 Dell Inspiron 5437
CID: 201307-14038 Dell Vostro 5470
The graphic card NVIDIA Corporation GK208M [GeForce GT 740M]
does not work well with the proprietary driver
Before installing the proprietary driver, there are 4 resolutions available:
1366 x 768
1360 x
** Attachment added: Xorg.0.log
https://bugs.launchpad.net/hwe-next/+bug/1342573/+attachment/4153758/+files/Xorg.0.log
** Tags added: 201307-14038 taipei-lab
** Package changed: linux (Ubuntu) = nvidia-graphics-drivers-331
(Ubuntu)
--
You received this bug notification because you are a
This bug is missing log files that will aid in diagnosing the problem.
From a terminal window please run:
apport-collect 1342570
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a
oh nvm. fan shuts off repeatedly after i8kfan 2 2
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251
Title:
[Dell Studio 1558] kernel is missing support for i8k module
Status in
** Changed in: linux (Ubuntu)
Status: Expired = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1296066
Title:
[Lenovo ThinkPad X1 Carbon 20A7] suspend/resume failure
#28 works for me too.
Linux Mint 17 3.13.0-24-generic with MSI Z97-43 Gaming motherboard.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1321421
Title:
8086:8ca0 Sound output
apport-collect failed when run over ssh on the server so I am changing
the bug status to confirmed.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Yes, moving the drive that was on the PCI-X controller to the main board
solved the problem. Does this mean that a driver disappeared between
the -60 and -64 kernels? Or is it that somehow the driver is just not
available on boot?
Any thoughts on how to correct this?
--
You received this bug
Enabled debugging by adding -d to /etc/init/bluetooth.conf
But I don't understand what exactly is going on and why it fails.
I stripped pid, date (except secs) and hostname from log.
** Attachment added: debug log
Another log using different BT-dongle on host.
** Attachment added: bluetooth2.log
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/1342568/+attachment/4153834/+files/bluetooth2.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
I am experiencing this as well; same macbook pro (11,1) as Julien.
I experience many occurrences of this in /var/log/syslog:
ERROR @wl_cfg80211_get_station : Wrong Mac address
Eventually, the card disassociates, and fails repeatedly to reconnect to
the AP. Sometimes it succeeds, but will fail
Public bug reported:
The latest version from broadcom is 6.30.223.248
http://www.broadcom.com/support/802.11/linux_sta.php
Release notes:
WHAT'S NEW IN RELEASE 6.30.223.23X
-
+ Upgraded to Support 3.11 kernels
+ Added cfg80211 wowlan support for Magic Packets and
** Tags added: targetmilestone-inin1410
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338666
Title:
ppc64le kernel module nx_crypto blocks loading other kernel modules
Status in
Traxtopel, could you please provide the information with the latest
mainline kernel via http://kernel.ubuntu.com/~kernel-
ppa/mainline/v3.16-rc5-utopic/ ?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** This bug is no longer a duplicate of bug 1341275
[Gigabyte GB-BXi7-4470R] Kernel panic in rtl8821ae
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1327741
Title:
Kernel panic on
TEN, using the nvidia drivers narrows the scope of people who may help
you on graphics driver issues to nvidia only.
As well, please do not mix two different drivers (nvidia and nouveau)
into one report. Instead, please create one per driver, not per symptom.
** Description changed:
-
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?
Please provide a direct URL to your e-mail to the mailing list once you
have
Po-Hsu Lin, the issue you are reporting is an upstream one. Could you
please report this problem through the appropriate channel by following
the instructions _verbatim_ at
https://wiki.ubuntu.com/Bugs/Upstream/kernel ?
Please provide a direct URL to your e-mail to the mailing list once you
have
Verified by both me and Victor Tapia (vtapia) - with
3.11.0-26.44~precise1 kernel the MS HCK Offload LSO test passes.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1328973
Title:
GSO
@jesus
Do
# sudo service i8kmon stop
That will allow you to regain control of the fans with i8kfan.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1331251
Title:
[Dell Studio 1558]
Same results.
** Attachment added: cat /proc/acpi/wakeup wakeup
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153949/+files/wakeup-3.16.0-031600rc5-generic
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
** Attachment added: dmesg-3.16.0-031600rc5-generic.txt
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1317979/+attachment/4153950/+files/dmesg-3.16.0-031600rc5-generic.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux
dmesg dmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1317979
Title:
8086:0162 [System76 Sable Complete] backlight stops working after
suspend
Status in “linux” package in
Public bug reported:
System failure while running Software Updater.
ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-3-generic (not installed)
ProcVersionSignature: Ubuntu 3.15.0-6.11-generic 3.15.0
Uname: Linux 3.15.0-6-generic x86_64
ApportVersion: 2.14.4-0ubuntu2
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717
Title:
package linux-image-3.16.0-3-generic (not installed) failed to
install/upgrade:
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342717
Title:
package
Closing as Invalid since the issue is reportedly solve, but we don't
know why/how the other mouse does not work.
Sorry for the delay in responding.
** Changed in: bluez (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Kernel
Packages,
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: Undecided
Status: Confirmed
** Changed in: linux (Ubuntu Trusty)
Status: New = In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee:
** Changed in: linux (Ubuntu Trusty)
Status: In Progress = Fix Committed
** Changed in: linux (Ubuntu Utopic)
Status: In Progress = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
To add a bit of debugging I did (using two VMs):
- There server side kernel version does not matter (tested trusty and utopic)
- A client with a 3.13 kernel will have the delay, while the 3.16 kernel is ok
Enabling NFS debugging on both clients (as root echo 32767
/proc/sys/sunrpc/nfs_debug)
** Changed in: kernel-development-workflow/prepare-package
Status: New = Fix Released
** Changed in: kernel-development-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner
(timg-tpi)
--
You received this bug notification because you are a
Public bug reported:
Installing the latest kernel, i've got:
run-parts: executing /etc/kernel/postinst.d/dkms 3.16.0-4-generic
/boot/vmlinuz-3.16.0-4-generic
Error! Bad return status for module build on kernel: 3.16.0-4-generic (i686)
Consult /var/lib/dkms/nvidia-340/340.24/build/make.log for
On 07/14/2014 05:13 PM, Serge Hallyn wrote:
Since switching to saucy kernel is a good workaround, marking this as
affecting the kernel.
Could you try disabling KSM and see if that avoids the issue?
I set KSM_ENABLED=0 in /etc/default/qemu-kvm and restarted the server.
Also today after 3
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1342776
Title:
[3.16.0.4][nvidia 340.24]
Nils' workaround also works for me, as does setting the
link_power_management_policy to medium_power.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1318218
Title:
SATA problems on
All builds are complete, packages in this bug are available in
-proposed.
** Changed in: kernel-development-workflow/prepare-package-signed
Status: New = Fix Released
** Changed in: kernel-development-workflow/prepare-package-signed
Assignee: Canonical Kernel Team
Realtek has never been good at writing clear module parameter
descriptions. My current working version has the following:
MODULE_PARM_DESC(swenc, Set to 1 for software crypto (default 0)\n);
MODULE_PARM_DESC(ips, Set to 0 to not use link power save (default 1)\n);
MODULE_PARM_DESC(swlps, Set to 1
Solution to my problem - (Thank you Rick Forberg!)
Linux Mint 17 Qiana won't install - keeps rebooting. It doesn't matter if the
installation medium is a flash drive or CD. Once the live version loads it
immediately reboots. There isn't enough time to install it. Once I managed to
actually
Hi Tamas,
To be clear, you have not yet gotten the bug since you've set
KSM_ENABLED to 0, or have you?
Interesting about the saucy kernel. Ideally we could reproduce this
reliably enough to really bisect.
I wonder if we can reproduce without qemu.
--
You received this bug notification
same happens with 3.15.0 on Ubuntu 14.04 64 bit
Jul 11 12:43:41 localhost kernel: [42049.462542] [drm] stuck on render ring
Jul 11 12:43:41 localhost kernel: [42049.463330] [drm] GPU HANG: ecode
0:0x00ff, in chrome [2172], reason: Ring hung, action: reset
Jul 11 12:43:41 localhost kernel:
On 07/16/2014 06:35 PM, Serge Hallyn wrote:
To be clear, you have not yet gotten the bug since you've set
KSM_ENABLED to 0, or have you?
I just did it, so no, not yet.
This happened by time:
Saucy (everything is fine) - Trusty (issue happened) - Trusty with
Saucy kernel 3 weeks ago (no
** Summary changed:
- Samsung SSD 840 Series failed to set xfermode (err_mask=0x40) on Trusty with
upstream kernel
+ Samsung SSD 840 failed to get NCQ Send/Recv Log Emask 0x1 failed to set
xfermode (err_mask=0x40) on Trusty with upstream kernel
** Summary changed:
- Samsung SSD 840 failed to
** Summary changed:
- linux: 2.6.32-64.127 -proposed tracker
+ linux: 2.6.32-64.128 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338946
Title:
linux: 2.6.32-64.128
** Summary changed:
- linux-armadaxp: 3.2.0-1636.52 -proposed tracker
+ linux-armadaxp: 3.2.0-1636.53 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1338870
** Summary changed:
- linux: 3.2.0-67.100 -proposed tracker
+ linux: 3.2.0-67.101 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338654
Title:
linux: 3.2.0-67.101
** Summary changed:
- linux-ti-omap4: 3.2.0-1451.70 -proposed tracker
+ linux-ti-omap4: 3.2.0-1451.71 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-ti-omap4 in Ubuntu.
https://bugs.launchpad.net/bugs/1336143
** Summary changed:
- linux: 3.11.0-26.44 -proposed tracker
+ linux: 3.11.0-26.45 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338556
Title:
linux: 3.11.0-26.45
** Summary changed:
- linux: 3.13.0-32.56 -proposed tracker
+ linux: 3.13.0-32.57 -proposed tracker
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1338524
Title:
linux: 3.13.0-32.57
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) = John Johansen
(jjohansen)
--
You received this bug notification because you are a member
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis
*** This bug is a duplicate of bug 1338946 ***
https://bugs.launchpad.net/bugs/1338946
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
Quoting Tamas Papp (1341...@bugs.launchpad.net):
On 07/16/2014 06:35 PM, Serge Hallyn wrote:
To be clear, you have not yet gotten the bug since you've set
KSM_ENABLED to 0, or have you?
I just did it, so no, not yet.
This happened by time:
Saucy (everything is fine) - Trusty
This bug was fixed in the package linux - 2.6.32-64.128
---
linux (2.6.32-64.128) lucid; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (2.6.32-64.127) lucid; urgency=low
[ Luis
This bug was fixed in the package linux-ec2 - 2.6.32-368.84
---
linux-ec2 (2.6.32-368.84) lucid; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* Ubuntu-2.6.32-368.84
[ Ubuntu: 2.6.32-64.128 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux - 3.2.0-67.101
---
linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.2.0-67.100) precise; urgency=low
[ Luis
This bug was fixed in the package linux-ec2 - 2.6.32-368.84
---
linux-ec2 (2.6.32-368.84) lucid; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* Ubuntu-2.6.32-368.84
[ Ubuntu: 2.6.32-64.128 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux - 3.2.0-67.101
---
linux (3.2.0-67.101) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.2.0-67.100) precise; urgency=low
[ Luis
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
-
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
*** This bug is a duplicate of bug 1338870 ***
https://bugs.launchpad.net/bugs/1338870
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu:
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1451.71
---
linux-ti-omap4 (3.2.0-1451.71) precise; urgency=low
[ Luis Henriques ]
* Rebased to 3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
-
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1
---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux
This bug was fixed in the package linux-lts-saucy -
3.11.0-26.45~precise1
---
linux-lts-saucy (3.11.0-26.45~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux
This bug was fixed in the package linux-armadaxp - 3.2.0-1636.53
---
linux-armadaxp (3.2.0-1636.53) precise; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.2.0-67.101
[ Ubuntu: 3.2.0-67.101 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-quantal -
3.5.0-54.81~precise1
---
linux-lts-quantal (3.5.0-54.81~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis
*** This bug is a duplicate of bug 1338556 ***
https://bugs.launchpad.net/bugs/1338556
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-lts-raring -
3.8.0-44.66~precise1
---
linux-lts-raring (3.8.0-44.66~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux-lts-raring
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis
1 - 100 of 194 matches
Mail list logo