** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1664312
Title:
Update ENA driver to 1.1.2 from net-next
** Changed in: linux-hwe-edge (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1674838
Title:
kernel BUG at /build/linux-
7LGLH
** Changed in: linux (Ubuntu Zesty)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689856
Title:
perf: qcom: Add L3 cache PMU driver
Status in
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688132
Title:
Support IPMI system interface on Cavium Thun
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689661
Title:
No PMU support for ACPI-based arm64 systems
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688259
Title:
kernel-wedge fails in artful due to leftover
Hello Vincent, or anyone else affected,
Accepted gnome-settings-daemon into zesty-proposed. The package will
build now and be available at https://launchpad.net/ubuntu/+source
/gnome-settings-daemon/3.24.2-0ubuntu0.1 in a few hours, and then in the
-proposed repository.
Please help us by testing
--- Comment From b...@us.ibm.com 2017-05-16 10:48 EDT---
Can a test kernel be built for the two fixes that did get merged upstream?
target: Fix VERIFY_16 handling in sbc_parse_cdb
https://patchwork.kernel.org/patch/9643687/
target: Add WRITE_VERIFY_16
https://patchwork.kernel.org/patch/96
Good to see that it was a BIOS tweakable setting that could fix this.
BTW, the FADT is an ACPI table "Fixed ACPI Description Table" that
contains setting mainly for power management as well as other hardware
resources. See: http://wiki.osdev.org/FADT
--
You received this bug notification because
** Description changed:
[Impact]
- CONFIG_NUMA_BALANCING and CONFIG_NUMA_BALANCING_DEFAULT_ENABLED were both set
to =y in hwe-x/hwe-y. This changed to =n in hwe-z, unintentionally as far as I
can tell. This can lead to performance degradation on NUMA-based arm64 systems
when processes migrate
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689980
Title:
AACRAID for power9 platform
Status in The
** Changed in: linux (Ubuntu Zesty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1688114
Title:
arm64/ACPI support for SBSA watchdog
Status
Hey Kai-Heng,
Sorry for the late reply - we moved house and it was chaotic. Still is
:)
To try to answer your question: I've got Zesty installed, and the issue is
still happening. I need to sudo service network-manager restart every so
often to get the data flowing.
Be sure to let me know if the
Nevermind, closing. I can't reproduce this anymore, so it was probably
not related to the kernel version.
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
The verification of the Stable Release Update for qemu has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a reg
This bug was fixed in the package qemu - 1:2.5+dfsg-5ubuntu10.13
---
qemu (1:2.5+dfsg-5ubuntu10.13) xenial; urgency=medium
* debian/patches/ubuntu/vvfat-fix-volume-name-assertion.patch:
Fix the volume name assertion in vvfat rw mode (LP: #1684239)
qemu (1:2.5+dfsg-5ubuntu10.12)
Hi,
Running 64-bit Ubuntu 16.04 on a new quietpc "sentinel" fanless pc with
a 256GB Samsung PM961 Polaris NVMe M.2 SSD.
Came back to my set-up this lunchtime and found that the screen had
frozen - first ever crash in 7 years of using ubuntu!
Did Ctrl+Alt+F4 to get to a terminal and got this mess
** Also affects: linux-azure (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-azure (Ubuntu Yakkety)
** No longer affects: linux-azure (Ubuntu Zesty)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689360
Title:
TCMU: Fix possible overwrite of t_data_sg'
Patches are in linux-next:
5d3a0880787b scsi: aacraid: Remove __GFP_DMA for raw srb memory
96a580fcd745 scsi: aacraid: Fix DMAR issues with iommu=pt
7ad76ab57203 scsi: aacraid: Added 32 and 64 queue depth for arc natives
db62b8248626 scsi: aacraid: Set correct Queue Depth for HBA1000 RAW disks
be7
Taihsiang, as no one seems to be interested in solving this, at least
there is a workaround which worked for me, go with the upstream kernel.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
** Changed in: linux (Ubuntu Xenial)
Assignee: Canonical Kernel (canonical-kernel) => Kleber Sacilotto de Souza
(kleber-souza)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1682871
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
** Changed in: ubuntu-power-systems
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
The above are logs of my system booting with 4.4.0-75-generic. And the
kern.log shows something related to drm on skylake:
1 May 16 08:26:41 mtlb kernel: [238539.431888] [ cut here
]
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877466/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877465/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1645056
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877455/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877453/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877457/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
ApportVersion: 2.20.1-0ubuntu2.5
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: tai271828 6927 F pulseaudio
CurrentDesktop: Unity
DistroRelease: Ubuntu 16.04
HibernationDevice: RESUME=UUID=8354ece0-50ea-4d04-9f8f-9e5ec2808edf
InstallationDate: Ins
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877458/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1645056
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877464/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1645056
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877463/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877456/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877461/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877459/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877462/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877454/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1645056
Ti
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1645056/+attachment/4877460/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
LP: #1627670 of comment27 is related to nvm driver. In my case, I saw
hci related (and many other types of) kernel oops with 4.4.0-77-generic.
I can't get in my system with 4.4.0-77-generic so I can't get any log.
Let my have screen shot or something later.
--
You received this bug notification b
This issue happens on 4.4.0-77-generic as well and getting worse. I have
rebooted more than five times and never succeeded. I rolled back to
4.4.0-75-generic to boot my system now.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in U
Joseph,
There where some updates to download.
Partial update is ready to Fase 4
That is the same what i have notice last week...
Get the same message that linux header 4.4.0-43 is half installed
and at the and the message that the system probably is in a unusable
state.
I am thinking of insta
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689661
Title:
No PMU support for ACPI-based arm64 systems
Statu
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1689856
Title:
perf: qcom: Add L3 cache PMU driver
Status in linux
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
4.8.0-52-generic #55~16.04.1-Ubuntu released today (2017-05-16) not ok -
The bug is still here too! Please fix this quickly because my company
network are overloaded because of this bug. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
I will probably be able to test this later this week.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1690084
Title:
mouse disappeared
Status in linux package in Ubuntu:
Incomplete
Bu
I'm having the same problems and 4.4.0-77 does not fix the problem.
I also tested 4.8.0-51 and 4.10.0-20 and they also does not fix the problem.
What I've noticed occurring during the VSS Freeze/Thaw events is that
the VM detects extra disks (see attachment) (which seem to be them same
as the orig
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
--- Comment on attachment From thiag...@br.ibm.com 2017-04-06 14:11
EDT---
I'm not sure I understood the question. All of the patches are backports.
These are the files that had conflicts:
block/blk-cgroup.c
block/blk-core.c
block/blk-settings.c
block/blk-sysfs.c
block/blk-wbt.c
block/c
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
This bug was fixed in the package linux - 4.4.0-78.99
---
linux (4.4.0-78.99) xenial; urgency=low
* linux: 4.4.0-78.99 -proposed tracker (LP: #1686645)
* Please backport fix to reference leak in cgroup blkio throttle
(LP: #1683976)
- block: fix module reference leak on pu
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
I suspect that wouldn't work, for one reason or another. The upstream
one has more features, probably.
I'd rather just keep this Debian-specific. The initramfs script is
likely to have distro specific code. I don't see the idea of one unified
script working out well.
--
You received this bug not
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1686651
Title:
linux-aws: 4.4.0-1017.2
--- Comment From vipar...@in.ibm.com 2017-05-16 07:07 EDT---
Commit c950fd6f20 ("pstore: Split pstore fragile flags") is
available in kernel 4.9 and above, while commit
041939c1ec ("pstore: Fix flags to enable dumps on powerpc")
would get into 4.12, so need to be pulled into kernel version
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap
This bug was fixed in the package linux-hwe - 4.8.0-52.55~16.04.1
---
linux-hwe (4.8.0-52.55~16.04.1) xenial; urgency=low
* linux-hwe: 4.8.0-52.55~16.04.1 -proposed tracker (LP: #1686978)
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
*** This bug is a duplicate of bug 1687718 ***
https://bugs.launchpad.net/bugs/1687718
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kern
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1686414
Title:
linux: 4.10.0-21.23 -pro
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 3.13.0-119.166
---
linux (3.13.0-119.166) trusty; urgency=low
* linux: 3.13.0-119.166 -proposed tracker (LP: #1687718)
* CVE-2016-8645: Linux kernel mishandles socket buffer (skb) truncation
(LP: #1687107)
- rose: limit sk_filter
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.10.0-21.23
---
linux (4.10.0-21.23) zesty; urgency=low
* linux: 4.10.0-21.23 -proposed tracker (LP: #1686414)
* Need to stop using bzip2 compression in packages for zesty onward
(LP: #1686782)
- [Debian] Use default compression
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
This bug was fixed in the package linux - 4.8.0-52.55
---
linux (4.8.0-52.55) yakkety; urgency=low
* linux: 4.8.0-52.55 -proposed tracker (LP: #1686976)
* CVE-2017-7477: macsec: avoid heap overflow in skb_to_sgvec (LP: #1685892)
- macsec: avoid heap overflow in skb_to_sgvec
Can't we upstream the Xenial zfs script instead of fixing the "new" one?
It supports the same syntax, and does what it needs to do? And it does
not try to mount datasets I explicitly configured not to be mountable ;)
Seems like the faster solution, no?
--
You received this bug notification becau
101 - 200 of 241 matches
Mail list logo