This bug was fixed in the package linux - 3.2.0-60.91
---
linux (3.2.0-60.91) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281800
[ Andy Whitcroft ]
* [Config] d-i -- add xts.ko to crypto-modules udeb
- LP: #1276739
[ Upstream Kernel Changes
This bug was fixed in the package linux-lts-quantal -
3.5.0-47.71~precise1
---
linux-lts-quantal (3.5.0-47.71~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281900
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns
3.13.0-16-lowlatency has no issues for me as far as I can see. At least
I virtualbox running all day - no crashes.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1275116
Title:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux-armadaxp - 3.2.0-1631.43
---
linux-armadaxp (3.2.0-1631.43) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1281965
* Rebase onto Ubuntu-3.2.0-60.91
[ Ubuntu: 3.2.0-60.91 ]
* Release Tracking Bug
-
This bug was fixed in the package linux - 3.2.0-60.91
---
linux (3.2.0-60.91) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281800
[ Andy Whitcroft ]
* [Config] d-i -- add xts.ko to crypto-modules udeb
- LP: #1276739
[ Upstream Kernel Changes
This bug was fixed in the package linux-armadaxp - 3.2.0-1631.43
---
linux-armadaxp (3.2.0-1631.43) precise-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1281965
* Rebase onto Ubuntu-3.2.0-60.91
[ Ubuntu: 3.2.0-60.91 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-lts-saucy -
3.11.0-18.32~precise1
---
linux-lts-saucy (3.11.0-18.32~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281894
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
-
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
This bug is for tracking the 2.6.32-57.119 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1444.63
---
linux-ti-omap4 (3.2.0-1444.63) precise; urgency=low
* Release Tracking Bug
- LP: #1281963
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-60.91
[ Ubuntu: 3.2.0-60.91 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1444.63
---
linux-ti-omap4 (3.2.0-1444.63) precise; urgency=low
* Release Tracking Bug
- LP: #1281963
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-60.91
[ Ubuntu: 3.2.0-60.91 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-lts-saucy -
3.11.0-18.32~precise1
---
linux-lts-saucy (3.11.0-18.32~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281894
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
-
This bug was fixed in the package linux-ti-omap4 - 3.2.0-1444.63
---
linux-ti-omap4 (3.2.0-1444.63) precise; urgency=low
* Release Tracking Bug
- LP: #1281963
[ Paolo Pisati ]
* rebased on Ubuntu-3.2.0-60.91
[ Ubuntu: 3.2.0-60.91 ]
* Release Tracking Bug
- LP:
Stephen,
The work done in this bug should stop 12.04 systems getting hosed when
updating to 14.04.
The work done in bug #930447 enables Pentium M systems to boot a PAE
kernel with the forcepae parameter (this has to be manually enabled by
the user). Hopefully this means the 14.04 release image
This bug was fixed in the package linux-lts-raring -
3.8.0-37.53~precise1
---
linux-lts-raring (3.8.0-37.53~precise1) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1282210
[ Upstream Kernel Changes ]
* Revert of/address: Handle #address-cells
This bug was fixed in the package linux-lts-raring -
3.8.0-37.53~precise1
---
linux-lts-raring (3.8.0-37.53~precise1) precise; urgency=low
[ Joseph Salisbury ]
* Release Tracking Bug
- LP: #1282210
[ Upstream Kernel Changes ]
* Revert of/address: Handle #address-cells
This bug was fixed in the package linux-lts-quantal -
3.5.0-47.71~precise1
---
linux-lts-quantal (3.5.0-47.71~precise1) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281900
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.5.0-47.71
---
linux (3.5.0-47.71) quantal; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281828
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns higher address than
mmap_min_addr
This bug was fixed in the package linux - 3.5.0-47.71
---
linux (3.5.0-47.71) quantal; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281828
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns higher address than
mmap_min_addr
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 3.5.0-47.71
---
linux (3.5.0-47.71) quantal; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281828
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns higher address than
mmap_min_addr
This bug was fixed in the package linux - 3.5.0-47.71
---
linux (3.5.0-47.71) quantal; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281828
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns higher address than
mmap_min_addr
This bug was fixed in the package linux-ti-omap4 - 3.5.0-239.55
---
linux-ti-omap4 (3.5.0-239.55) quantal; urgency=low
* Release Tracking Bug
- LP: #1281895
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-239.55
---
linux-ti-omap4 (3.5.0-239.55) quantal; urgency=low
* Release Tracking Bug
- LP: #1281895
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux - 3.5.0-47.71
---
linux (3.5.0-47.71) quantal; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281828
[ Upstream Kernel Changes ]
* Revert mm: ensure get_unmapped_area() returns higher address than
mmap_min_addr
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
This bug was fixed in the package linux-armadaxp - 3.5.0-1628.37
---
linux-armadaxp (3.5.0-1628.37) quantal-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1281897
* Rebase onto Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
-
This bug was fixed in the package linux-armadaxp - 3.5.0-1628.37
---
linux-armadaxp (3.5.0-1628.37) quantal-proposed; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1281897
* Rebase onto Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
-
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
This bug was fixed in the package linux - 3.11.0-18.32
---
linux (3.11.0-18.32) saucy; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1281764
[ Bjorn Helgaas ]
* SAUCE: Revert EISA: Log device resources in dmesg
- LP: #1251816
* SAUCE: Revert EISA:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Lucid)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
Public bug reported:
I recently plugged a few SD cards into the reader on a new Mac Book Pro
retina late 2013 (11,1) and experienced a serious slowness in loading
its contents in nautilus. When I ran dmesg on a console I saw there had
been a bunch of storage errors from scsi and the filesystem.
This bug was fixed in the package linux-ti-omap4 - 3.5.0-239.55
---
linux-ti-omap4 (3.5.0-239.55) quantal; urgency=low
* Release Tracking Bug
- LP: #1281895
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-ti-omap4 - 3.5.0-239.55
---
linux-ti-omap4 (3.5.0-239.55) quantal; urgency=low
* Release Tracking Bug
- LP: #1281895
[ Paolo Pisati ]
* rebased on Ubuntu-3.5.0-47.71
[ Ubuntu: 3.5.0-47.71 ]
* Release Tracking Bug
- LP:
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Lucid)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1288854
Title:
sd card reader on mac book pro
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bcmwl (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1287635
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
This bug is for tracking the 3.5.0-1628.37 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
- A flaw was found in the way cifs handled iovecs with bogus pointers
- userland passed down via writev() during uncached writes. An
- unprivileged local user with access to cifs share could use this flaw to
- crash the system or leak kernel memory. Privilege escalation
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux-lts-saucy (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
** Description changed:
This bug is for tracking the 3.11.0-6.9 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
This bug is for tracking the 3.2.0-60.91 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 2.6.32-57.119 upload package. This bug will
contain status and testing results related
** Description changed:
This bug is for tracking the 3.11.0-18.32 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Description changed:
This bug is for tracking the 3.5.0-47.71 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
Some of these patches could apply cleaner onto 3.13 since larger changes
were made since 3.12. I recently reworked some of those changes into a
patch for those getting the c720(p) version working in 14.04. This
patch(along with the first two listed above) together should patch
c720(p) support into
** Description changed:
This bug is for tracking the 3.2.0-1631.43 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results
http://www.labnol.org/internet/important-google-urls/28428/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1014177
Title:
kernel 3.4 testing
Status in “linux” package in Ubuntu:
Nevermind on the Hp chromebook 14. I don't have to add it in because it
is already in the 3.13 kernel. These are the only patches that should
be needed:
https://patchwork.kernel.org/patch/3078491/raw/
https://patchwork.kernel.org/patch/3078481/raw/
http://pastie.org/pastes/8878181/download
--
Public bug reported:
I cannot assign any faces for a user in Ubuntu Trusty. Using the build of 4th
March.
there is no folder called /usr/share/pixmaps/faces
Has this folder been removed for Trusty?
** Affects: unity-control-center (Ubuntu)
Importance: Undecided
Status: New
**
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.11.0-18.32 upload package. This bug will
contain status and testing results related to
So I messed around with this machine for a good part of the day. I built
and booted 3.14-rc4, then instrumented the mei and mei-me modules to
show the various setup and teardown stages. I think they are correct.
What I did find were some issues with MSI. In fact, if you boot with MSI
disabled
** Tags removed: kernel-bug-break-fix
** Tags added: kernel-bug-break-fix-complete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1269053
Title:
IBM Domino 'bindsock' cannot
rodsmith - please try the test kernel at
http://kernel.ubuntu.com/~rtg/3.13.0-16.36-mei/ - After installing you
can add the module parameter options thusly:
echo options mei-me disable_msi=1 | sudo tee /etc/modprobe.d/mei-
me.conf
This option should behave the same as my testing, e.g., disallows
** Changed in: linux (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-ti-omap4 (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in: linux-lts-quantal (Ubuntu Precise)
Status: Fix Committed = Fix Released
** Changed in:
Public bug reported:
From a recent apt-get -u dist-upgrade of my pandaboard omap4:
Setting up linux-image-3.5.0-239-omap4 (3.5.0-239.55) ...
Running depmod.
WARNING: found 3 modules in dependency cycles!
WARNING: /lib/modules/3.5.0-239-omap4/kernel/drivers/usb/otg/nop-usb-xceiv.ko
in dependency
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.2.0-60.91 upload package. This bug will
contain status and testing results related to
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.11.0-6.9 upload package. This bug will
contain status and testing results related to
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.5.0-1628.37 upload package. This bug will
contain status and testing results related
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.2.0-1631.43 upload package. This bug will
contain status and testing results related
Sadly, I was unable to boot with mainline kernel.
** Tags added: kernel-unable-to-test-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I have checked carefully, 3.11-17 is fine, so the problem is strictly
with the kernel attached above. I compiled and packaged it with the
intention to host Xen 4.1 server (pv). After installing said package
and rebooting, the system doesn't boot automatically.
What I mean is that during boot when
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress = Fix Released
** Description changed:
This bug is for tracking the 3.5.0-47.71 upload package. This bug will
contain status and testing results related to
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1285822
Title:
Kernel panic at boot
Status in “linux” package in
Ok, I've tested 2.6.38 and 3.0 final kernels (about 3.0-rc1 version,
there aren't deb packages for i386 architecture).
Results for 2.6.38 final and 3.0 final are the same: no regressions but there
is the original bug.
So:
wifi led button is blinking (red/blue), radio switch is regular (on/off
this is really good news, thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/930447
Title:
Unable to start Ubuntu 12.04 live CD with syslinux loader on Pentium M
x86 Laptop due to
This does seem to help, but with some very big caveats:
First, I was unable to test the -generic kernel because it lacked the
mei and mei_me modules. I therefore did my testing with the -lowlatency
version of the kernel.
Second, whether the disable_msi=1 kernel option was used or not, the
system
Public bug reported:
On resume, the password window appear. After entering the password, the
screen turns black. No response. Consoles (tty1-6) are active.
ProblemType: KernelOops
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-15-generic 3.13.0-15.35
ProcVersionSignature: Ubuntu
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1288994
Title:
[Acer AOD255] hibernate/resume
rodsmith - I don't think you installed linux-image-
extra-3.13.0-17-generic_3.13.0-17.37_amd64.deb which is why you are
missing mei.ko and mei_me.ko. The lowlatency flavour has still got some
issues that we're working through.
--
You received this bug notification because you are a member of
** Description changed:
- Linux kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC
- NAT helper
+ The help function in net/netfilter/nf_nat_irc.c in the Linux kernel
+ before 3.12.8 allows remote attackers to obtain sensitive information
+ from kernel memory by establishing an IRC
but you have issues with previous version?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1275116
Title:
lowlatency-flavour crashes and locks up alot
Status in “linux” package in
I've been busy, so I did not try the last versions that Joseph posted.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1275116
Title:
lowlatency-flavour crashes and locks up alot
Status
** Changed in: linux-ec2 (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Changed in: linux (Ubuntu Lucid)
Status: Fix Committed = Fix Released
** Description changed:
- SELinux local DoS
+ The security_context_to_sid_core function in
+ security/selinux/ss/services.c in the
apparently, the trusty-tahr daily build cd-images already contain the
fixed kernel, so if you have an affected system and want to try
installing (l/x)ubuntu you can get them here:
http://cdimage.ubuntu.com/lubuntu/daily-live/current/
http://cdimage.ubuntu.com/xubuntu/daily-live/current/
Now it is time for me to say thank you :-)
First of all, *I want to thank everybody contributing* to solving this
bug, or complex of bugs, concerning Pentium M and Celeron M CPUs and new
Ubuntu based kernels.
Then I want to mention roland aus köln (devzero-c), who continued
pushing this issue
Still occurs with new kernal. Tag added.
** Tags removed: apport-bug dist-upgrade i386 saucy
** Tags added: kernel-bug-exists-upstream
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
one thing to add - on lubuntu iso i just tested, entering a kernel param
at boot/installation-time does not seem to find it`s way into grub.cfg -
so it needs to be re-added after installation.
since i´m not a long-time ubuntu user, i`m unsure if this a bug or by
design
--
You received this
** Description changed:
- [nfs: information leakage]
+ The nfs_can_extend_write function in fs/nfs/write.c in the Linux kernel
+ before 3.13.3 relies on a write delegation to extend a write operation
+ without a certain up-to-date verification, which allows local users to
+ obtain sensitive
Sorry for the huge delay in a response. I am obtaining the iso now. I
will be able to test it sometime next week. Does this image version
function as a live CD, as that will be my requirement for testing. I
cannot install it.
On Tue, Feb 18, 2014 at 10:49 AM, Joseph Salisbury
Please reply if this is still an issue in a supported release.
** Changed in: pm-utils (Ubuntu)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/677440
** Changed in: pm-utils (Ubuntu)
Status: Incomplete = Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/47994
Title:
PowerBook G4 12 - Suspend to disk doesn't work
Status
Hi,
I've just updated the kernel. Works now, and issue resolved for me.
Platform:
Dell e7440
Linux MXC-062 3.8.0-37-generic #53~precise1-Ubuntu SMP Wed Feb 19 21:37:54 UTC
2014 x86_64 x86_64 x86_64 GNU/Linux
Thank you.
--
You received this bug notification because you are a member of Kernel
Public bug reported:
after upgrade from 12.04 to 14.04
ProblemType: KernelOops
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-16-generic 3.13.0-16.36
ProcVersionSignature: Ubuntu 3.13.0-16.36-generic 3.13.5
Uname: Linux 3.13.0-16-generic x86_64
Annotation: This occured during a previous
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1289085
Title:
[Hewlett-Packard HP G60
** Changed in: hwe-next/trusty
Status: Confirmed = Fix Released
** Changed in: hwe-next/saucy
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Public bug reported:
Ubuntu 13.10 amd64
I wiped a 32GB USB stick and created a UDF filesystem on it (as per
instructions at http://duncanlock.net/blog/2013/05/13/using-udf-as-an-
improved-filesystem-for-usb-flash-drives/ )
reading and writing works fine, until I try to create a directory or
101 - 200 of 232 matches
Mail list logo