** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
*** This bug is a duplicate of bug 1797066 ***
https://bugs.launchpad.net/bugs/1797066
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu:
Is there any way to fix the problem if I do NOT have access to Ubuntu
(or any other Linux distro) at all? I can only run on Windows10
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1734147
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
This bug was fixed in the package linux-aws - 4.15.0-1025.25
---
linux-aws (4.15.0-1025.25) bionic; urgency=medium
* linux-aws: 4.15.0-1025.25 -proposed tracker (LP: #1797066)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data
This bug was fixed in the package linux - 3.13.0-161.211
---
linux (3.13.0-161.211) trusty; urgency=medium
* linux: 3.13.0-161.211 -proposed tracker (LP: #1795595)
* CVE-2017-0794
- scsi: sg: protect accesses to 'reserved' page array
- scsi: sg: reset 'res_in_use' after
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/snap-release-to-stable
Status: New => Confirmed
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
With latest 4.15 LTS kernels, I see the vdbench process crash and the
PERC controller and the related disks go offline..
** Attachment added: "4.15 - vdbench - disks go offline"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1795453/+attachment/5204195/+files/4.15-stress_fails.txt
--
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1793086
Title:
qeth: use vzalloc for QUERY OAT buffer
Status
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
This bug was fixed in the package linux - 4.4.0-138.164
---
linux (4.4.0-138.164) xenial; urgency=medium
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stable release build is broken on ppc64 (LP: #1795662)
- powerpc/fadump: Return error when fadump
This bug was fixed in the package linux-aws - 4.4.0-1032.35
---
linux-aws (4.4.0-1032.35) trusty; urgency=medium
* linux-aws: 4.4.0-1032.35 -proposed tracker (LP: #1795583)
[ Ubuntu: 4.4.0-138.164 ]
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155
*** This bug is a duplicate of bug 1797065 ***
https://bugs.launchpad.net/bugs/1797065
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu:
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1070.80
---
linux-aws (4.4.0-1070.80) xenial; urgency=medium
* linux-aws: 4.4.0-1070.80 -proposed tracker (LP: #1795585)
[ Ubuntu: 4.4.0-138.164 ]
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1036.42
---
linux-kvm (4.4.0-1036.42) xenial; urgency=medium
* linux-kvm: 4.4.0-1036.42 -proposed tracker (LP: #1795589)
* Xenial update to 4.4.148 stable release (LP: #1792174)
- [config] updateconfigs for master changes
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
--
You received this bug notification because you are
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for
This bug was fixed in the package linux-kvm - 4.15.0-1025.25
---
linux-kvm (4.15.0-1025.25) bionic; urgency=medium
* linux-kvm: 4.15.0-1025.25 -proposed tracker (LP: #1797065)
[ Ubuntu: 4.15.0-38.41 ]
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data
This bug was fixed in the package linux - 4.4.0-138.164
---
linux (4.4.0-138.164) xenial; urgency=medium
* linux: 4.4.0-138.164 -proposed tracker (LP: #1795582)
* Linux 4.4.155 stable release build is broken on ppc64 (LP: #1795662)
- powerpc/fadump: Return error when fadump
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in:
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1794294
Title:
[Ubuntu] s390/crypto: Fix return code checking
I think I just ran into this bug on bionic. I was building a yocto distribution
like this user here:
https://www.spinics.net/lists/linux-unionfs/msg05363.html
I was I was two point releases behind at :
$ uname -a
Linux ses-docker50c 4.15.0-34-generic #37-Ubuntu SMP Mon Aug 27 15:21:48 UTC
2018
It looks like the bug was fixed upstream here:
https://github.com/torvalds/linux/commit/355139a8dba446cc11a424cddbf7afebc3041ba1
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1736808
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1798674
Title:
linux-azure:
Public bug reported:
Ubuntu starts, w/ /sbin/init, a kworker process that never stops running
below 85%:
pb@pb-tower:~/Downloads$ ps -elf
F S UIDPID PPID C PRI NI ADDR SZ WCHAN STIME TTY TIME CMD
4 S root 1 0 0 80 0 - 56471 - 18:30 ?00:00:01
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 3.13.0-161.211
---
linux (3.13.0-161.211) trusty; urgency=medium
* linux: 3.13.0-161.211 -proposed tracker (LP: #1795595)
* CVE-2017-0794
- scsi: sg: protect accesses to 'reserved' page array
- scsi: sg: reset 'res_in_use' after
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
This bug was fixed in the package linux - 4.15.0-38.41
---
linux (4.15.0-38.41) bionic; urgency=medium
* linux: 4.15.0-38.41 -proposed tracker (LP: #1797061)
* Silent data corruption in Linux kernel 4.15 (LP: #1796542)
- block: add a lower-level bio_add_page interface
-
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797080
Title:
linux-gcp: 4.15.0-1023.24~16.04.1
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-precise
** Tags removed: block-proposed
--
You received this bug notification because
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1797069
Title:
linux-oem: 4.15.0-1024.29
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
https://bugs.launchpad.net/bugs/1798658
Title:
linux-azure: 4.15.0-1028.29
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797062
Title:
linux-gcp: 4.15.0-1023.24
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1797066
Title:
linux-aws: 4.15.0-1025.25
Feel free to close this if it makes sense. I am researching how best to
report this upstream. The documentation on reporting kernel bugs makes
it clear you need to identify the affected subsystem or your bug will be
bit-bucketed. More hard core log diving is called for :)
** Changed in: linux
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1795595
Title:
linux: 3.13.0-161.211
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/1797080
Title:
linux-gcp:
I've moved to ubuntu 1810 in the meantime, can't file a bug from the
system anymore
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Does not need to go to the security pocket
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-azure in Ubuntu.
Seems like there are some UEFI magic happens under the scene. Have you
tried using the default macOS boot loader instead?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1794641
Title:
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.19
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
Does not need to go to the security pocket.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1797065
Title:
linux-kvm: 4.15.0-1025.25
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem in Ubuntu.
https://bugs.launchpad.net/bugs/1797069
Title:
linux-oem: 4.15.0-1024.29
Does not need to go to security pocket
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1797061
Did this issue start happening after an update/upgrade? Was there a
prior kernel version where you were not having this particular problem?
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.19
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-trusty in Ubuntu.
https://bugs.launchpad.net/bugs/1795596
Title:
linux-lts-trusty:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1795583
Title:
linux-aws: 4.4.0-1032.35
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1795582
Title:
linux: 4.4.0-138.164
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-kvm in Ubuntu.
https://bugs.launchpad.net/bugs/1795589
Title:
linux-kvm: 4.4.0-1036.42
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1795585
Title:
linux-aws: 4.4.0-1070.80
** Changed in: linux (Ubuntu)
Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage) =>
Canonical Kernel Team (canonical-kernel-team)
** Changed in: ubuntu-power-systems
Status: New => Incomplete
** Changed in: linux (Ubuntu)
Status: New => Incomplete
**
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1799201
and then change the status of the bug to 'Confirmed'.
If, due to the
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1799201
Title:
slow upload speed to smb / cifs
Status in linux package in
You have been subscribed to a public bug:
I've discussed this in the gnome nautilus section:
https://gitlab.gnome.org/GNOME/nautilus/issues/695
Is it possible to backport the fix to the 4.15 kernel used in 1804?
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
**
apport information
** Tags added: apport-collected
** Description changed:
Hi there folks sorry if it's inappropriate to report a bug in an
upstream release candidate kernel, but as a suggested test / fix for
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1796743 I was told
to
Given that python2 is effectively EOL soon, and python3 has been
available since forever... the switch must happen. Including stable
releases of kernel, imho.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
More testing, this time also with Xubuntu 18.10, 32 bit.
Testing in my Dell laptop
https://www.cnet.com/products/dell-precision-mobile-
workstation-m4800-15-6-core-i7-4810mq-8-gb-ram-256-gb-ssd-english/specs/
Lubuntu 18.10, 32 bit:
The persistent live USB drive (by mkusb) boots and runs
More testing, this time also with Xubuntu 18.10, 32 bit.
1. Testing in my Dell laptop
https://www.cnet.com/products/dell-precision-mobile-
workstation-m4800-15-6-core-i7-4810mq-8-gb-ram-256-gb-ssd-english/specs/
Lubuntu 18.10, 32 bit:
The persistent live USB drive (by mkusb) boots and runs
The 4.15.0-33-generic #37~lp1792100Commitf03220fb0122 kernel works.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1792100
Title:
Boot hangs at "loading initial ramdisk..."
Status in
101 - 200 of 246 matches
Mail list logo