** Tags removed: natty precise trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 drive
Status in linux package in Ubuntu:
** Tags added: cscc
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 drive
Status in linux package in Ubuntu:
Fix Released
Stat
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 drive
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Released
** Package changed: opensuse => linux (openSUSE)
** Package changed: fedora => linux (Fedora)
** No longer affects: udev (Ubuntu Trusty)
** No longer affects: udev (Ubuntu Precise)
** No longer affects: udev (Ubuntu)
**
Launchpad has imported 17 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1278944.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://he
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2004-0230
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-6704
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-6368
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8
SUSE-SU-2017:1102-1: An update that solves 27 vulnerabilities and has
114 fixes is now available.
Category: security (important)
Bug References:
1003077,1003344,1003568,1003677,1003813,1003866,1003925,1004517,1004520,1005857,1005877,1005896,1005903,1006917,1006919,1007615,1007944,1008557,1008645,
Confirm fixed in Xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 drive
Status in Nautilus:
New
Status in thunar:
Inva
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
** Changed in: linux (Ubuntu Yakkety)
Status: Fix Committed => Fix Released
** No longer affects: linux (Ubuntu Precise)
--
You received this bug notification because you are a member of Kernel
Packages, wh
Kernel update to 4.4.0-64-generic fixed the problem here.
Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 drive
Status i
Today kernel update to 4.8.0-39-generic fixed this issue for me on
16.04.2 Finally, thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely remov
I can also confirm fix after upgrading from something older to
4.4.0-63-generic. Thanks to everybody who was involved bringing the
solution!
Best wishes, Martin.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bug
With the linux-hwe kernel (4.8.0-37.39~16.04.1, xenial) from the "kernel
PPA", my two USB3 drive are successfully ejected and they stay poweroff.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
At least for me, the problem was solved after this week's update
(Xenial, 4.4.0-62-generic).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely remo
Is this fix available in the latest upates? (of xenial) or is it not
ready yet?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic remount of safely removed USB 3.0 d
** Tags added: kernel-bug-break-fix
** Changed in: linux (Ubuntu Yakkety)
Status: In Progress => Fix Committed
** Description changed:
Binary package hint: nautilus
When I choose "Safely remove drive" context menu entry for an external
USB drive within a nautilus window or direct
Six and a half years. This still hasn't been resolved. You have a patch
that works. Please, please, apply it! This has been giving me grief for
far too long!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.lau
** Changed in: thunar
Status: Unknown => Invalid
** Changed in: thunar
Importance: Unknown => Medium
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Automatic rem
SUSE-SU-2017:0181-1: An update that solves 13 vulnerabilities and has
127 fixes is now available.
Category: security (important)
Bug References:
1000118,1000189,1000287,1000304,1000433,1000776,1001169,1001171,1001310,1001462,1001486,1001888,1002322,1002770,1002786,1003068,1003566,1003581,1003606,
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-1350
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8964
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7913
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7
@jsalisbury
I can't find my USB3 flash (as in comment #44) which reappears after removal.
But you can search this thread - Precise is mentioned 19 times; Trusty - 29
times.
So bug still exists in Precise and Trusty.
--
You received this bug notification because you are a member of Kernel
Packag
@flocculant, thanks for testing! I can submit and SRU request for both
Xenial and Yakkety.
Can anyone confirm that this bug does in fact affect Precise and/or
Trusty?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https
SUSE-SU-2016:3304-1: An update that solves 13 vulnerabilities and has
118 fixes is now available.
Category: security (important)
Bug References:
1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003925,1004252,1004418,1004462,1004517,1004520,1005666,1006691,
@jsalisbury
I've downloaded the patched kernels for both Xenial and Yakkety.
For both I tested copying to drive and ejecting. Also tested just
mounting and ejecting.
In both it worked as expected - no re-mounting of the drive after
ejecting.
Thanks.
--
You received this bug notification becau
I built a test kernel for Xenial and Yakkety with the following commit:
37be66767e3c usb: hub: Fix auto-remount of safely removed or ejected USB-3
devices
The test kernels can be downloaded from:
Xenial: http://kernel.ubuntu.com/~jsalisbury/lp792085/xenial
Yakkety: http://kernel.ubuntu.com/~jsali
** Also affects: nautilus (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: udev (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: thunar (Ubuntu Yakkety)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Yakkety)
Dear Ubuntu developers!
Please apply SUSE's patch on kernels in Ubuntu 12.04 LTS, 14.04 LTS,
16.04 LTS, 16.10 - http://kernel.suse.com/cgit/kernel-
source/commit/?id=43e64619bd7eeb1f3d287e8faffc16ed3c1f2a2b .
--
You received this bug notification because you are a member of Kernel
Packages, whic
openSUSE-SU-2016:3021-1: An update that solves 12 vulnerabilities and
has 118 fixes is now available.
Category: security (important)
Bug References:
1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1004252,1004418,1004462,1004517,1004520,1005
SUSE-SU-2016:2976-1: An update that solves 13 vulnerabilities and has 87
fixes is now available.
Category: security (important)
Bug References:
1000189,1001419,1002165,1003077,1003344,1003568,1003677,1003866,1003925,1004517,1004520,1005857,1005896,1005903,1006917,1006919,1007944,763198,771065,799
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-4312
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3841
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-4998
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2013-5
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-6130
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7042
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7097
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8
SUSE-SU-2016:2912-1: An update that solves 11 vulnerabilities and has
111 fixes is now available.
Category: security (important)
Bug References:
1000189,1000287,1000304,1000776,1001419,1001486,1002165,1003079,1003153,1003400,1003568,1003866,1003925,1003964,1004252,1004462,1004517,1004520,1005666,
Dear Ubuntu developers!
Please apply SUSE's patch on kernels in Ubuntu 12.04 LTS, 14.04 LTS,
16.04 LTS, 16.10 - http://kernel.suse.com/cgit/kernel-
source/commit/?id=43e64619bd7eeb1f3d287e8faffc16ed3c1f2a2b .
Why it is so difficult?
Why you ignore this serious bug?
Many users have USB 3.0 on the
** Summary changed:
- Automatic remount of safely removed usb 3.0 drive
+ Automatic remount of safely removed USB 3.0 drive
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
This is an autogenerated message for OBS integration:
This bug (922634) was mentioned in
https://build.opensuse.org/request/show/437000 13.2 / kernel-source
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
openSUSE-SU-2016:2625-1: An update that solves 12 vulnerabilities and
has 19 fixes is now available.
Category: security (important)
Bug References:
1000287,1001486,1003077,1003925,1003931,1004045,1004418,1004462,881008,909994,911687,922634,951155,960689,978094,980371,986570,989152,991247,991608,9
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7513
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-8956
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-0823
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5195
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7039
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7425
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-8
openSUSE-SU-2016:2583-1: An update that solves four vulnerabilities and
has 21 fixes is now available.
Category: security (important)
Bug References:
1000287,1000304,1000907,1001462,1001486,1004418,1004462,1005101,799133,881008,909994,911687,922634,963655,972460,978094,979681,987703,991247,991665
** Changed in: thunar (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: nautilus (Ubuntu)
Importance: Low => Medium
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
Title:
Auto
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/792085
T
Dear Ubuntu developers!
Please apply SUSE's patch on kernels in Ubuntu 12.04 LTS, 14.04 LTS,
16.04 LTS, 16.10 - http://kernel.suse.com/cgit/kernel-
source/commit/?id=43e64619bd7eeb1f3d287e8faffc16ed3c1f2a2b .
** Also affects: linux-meta (Ubuntu)
Importance: Undecided
Status: New
** Tag
43 matches
Mail list logo