*** This bug is a duplicate of bug 1326751 ***
https://bugs.launchpad.net/bugs/1326751
** This bug has been marked a duplicate of bug 1326751
linux-lowlatency: version to be filled -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Chris J Arges (arges) = Adam Conrad (adconrad)
--
You received this bug notification because you are a member of Ubuntu
Bugs,
This bug was fixed in the package crash - 7.0.3-3ubuntu3
---
crash (7.0.3-3ubuntu3) trusty-proposed; urgency=medium
* Build crash for ppc64el. LP: #1318809.
* Add ppc64el support (debian/control, debian/rules (for patches),
gdb-7.6-ppc64el.patch); patch-set provided by
Fortunately the bug was fixed with the release of a new version of the
unity package: 7.2.1+14.04.20140513-0ubuntu2
Thanks for the fix, even if it was maybe unintended
** Changed in: compiz (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow
Status: Incomplete = In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Chris J Arges (arges) = Adam Conrad (adconrad)
--
You
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed = In Progress
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks
Error fixed by reinstalling the package(!)
** Description changed:
Was in proccess of restarting after upgrating from ubuntu 12.04 to 14.04
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: tex-common
ProcVersionSignature: Ubuntu 3.13.0-27.50-generic 3.13.11
Uname: Linux
** Changed in: kernel-sru-workflow/package-testing
Status: Confirmed = In Progress
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This
** Description changed:
In v3.2, there was confusion over the new PTRACE_EVENT_EXIT value.
Ultimately, upstream fixed it, but in the precise backporting of
seccomp, the wrong value was used:
5cdf389aee90109e2e3d88085dea4dd5508a3be7
As a result, seccomp filteres expecting ptrace
I suffer from it too - LANG=en_EE.UTF-8 instead of LANG=et_EE.UTF-8.
And Chrome Chromium seem to be unable to make special characters that
english alphabet doesnt have, might this be related to this issue?
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is
** Branch linked: lp:ubuntu/content-hub
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1324969
Title:
peer picker showing old version of application
To manage notifications about this bug go to:
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1321792
Title:
linux: 3.2.0-64.97 -proposed tracker
To
Ah, thanks for the clarification.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/269904
Title:
Screen refresh problems with nvidia cards
To manage notifications about this bug go to:
The fix for this bug is in the architecture all package, so you need to
install initramfs-tools_0.103ubuntu4.2_all.deb and initramfs-tools-
bin_0.103ubuntu4.2_ppc64el.deb.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/certification-testing
Status: In Progress = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1321646
Title:
linux: 2.6.32-61.124 -proposed tracker
To
This bug was fixed in the package libvirt - 1.2.2-0ubuntu13.2
---
libvirt (1.2.2-0ubuntu13.2) utopic; urgency=medium
* debian/apparmor/libvirt-qemu: add device-tree access for ppc
(LP: #1321365)
-- Serge Hallyn serge.hal...@ubuntu.com Thu, 05 Jun 2014 12:06:17 -0500
**
** Summary changed:
- linux: 3.13.0-29.52 -proposed tracker
+ linux: 3.13.0-29.53 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Patch already sent to mailing list:
https://lists.ubuntu.com/archives/kernel-team/2014-June/043473.html
** Changed in: linux (Ubuntu)
Importance: Undecided = High
** Changed in: linux (Ubuntu Precise)
Importance: Undecided = High
** Tags added: kernel-da-key kernel-stable-key
** Changed
** Summary changed:
- linux-lts-trusty: 3.13.0-29.52~precise1 -proposed tracker
+ linux-lts-trusty: 3.13.0-29.53~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress = Fix Released
** Changed in: linux-lts-trusty (Ubuntu)
Status:
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/verification-testing
Public bug reported:
This is on a Lenovo Yoga Pro 2 laptop
ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: alsa-base 1.0.25+dfsg-0ubuntu4
ProcVersionSignature: Ubuntu 3.13.0-27.50-generic 3.13.11
Uname: Linux 3.13.0-27-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.2
Architecture: amd64
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress = Fix Released
** Changed in: linux-lts-saucy (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress = Fix Released
** Changed in: linux-lts-raring (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: menu datetime
https://bugs.launchpad.net/indicator-datetime/+bug/1001595/+attachment/4126001/+files/Screenshot%202014-06-05%2022.49.22.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
That's weird. I really hate seeing июня 5 (analogue in english is of
june 5 — weird, isn't it?) instead of 5 июня (5th of june).
Also after click it's Четверг, 5 Июнь 2014 instead of Четверг, 5 Июня
2014.
I'm attaching screenshot from OS X where developers know how it should
be in russian:
**
** Also affects: openstack-dashboard (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1231364
Title:
firewalls not shown in network topology
To
Can someone help me find the daily builds for Lubuntu 14.04 64-bit? I
used to have this when the bug wasn't present. Also can you tell me how
I can know if when this bug is fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
You may need to run the following:
sudo apt-get install -f
sudo apt-get clean
sudo apt-get update
Then re-install the package.
If that does not resolve your issue, please mark the bug as Confirmed
** Changed in: linux (Ubuntu)
Importance: Undecided = Medium
** Changed in: linux (Ubuntu)
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
** Changed in: kernel-sru-workflow/regression-testing
Status: New = Confirmed
** Changed in: kernel-sru-workflow/security-signoff
Status: New = Confirmed
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v3.15 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 3.13.0-29.52~precise1 upload package. This
bug will contain status
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 3.13.0-29.52 upload package. This bug will
contain status and
** Branch linked: lp:~ubuntu-branches/ubuntu/precise/cunit/precise-
proposed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1275656
Title:
open-vm-dkms 2011.12.20-562307-0ubuntu1: open-vm-tools
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 3.2.0-64.96 upload package. This bug will
contain status and
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 3.8.0-42.61~precise1 upload package. This
bug will contain status
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 2.6.32-61.123 upload package. This bug will
contain status and
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the 3.11.0-23.39~precise1 upload package. This
bug will contain status
** Changed in: kernel-sru-workflow/promote-to-security
Status: New = Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New = Confirmed
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status
*** Bug 79500 has been marked as a duplicate of this bug. ***
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1140716
Title:
[regression] 3.5.0-26-generic and 3.2.0-39-generic GPU hangs on
*** Bug 79640 has been marked as a duplicate of this bug. ***
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1140716
Title:
[regression] 3.5.0-26-generic and 3.2.0-39-generic GPU hangs on
Public bug reported:
Unity doesn't launch(no panels) on Intel Haswell GPU after recent
update, similar issue reported on http://askubuntu.com/questions/475683
/unity-not-working-14-04
Looks like issue related to libgl1-mesa-dri
Currently installed gnome which is not affected
** Affects: ubuntu
Public bug reported:
Pinta throws an error when trying to cut on Ubuntu Trusty.
Exception Below:
System.Reflection.TargetInvocationException: Exception has been thrown by the
target of an invocation. --- System.ArgumentNullException: Argument cannot be
null.
Parameter name: src
at (wrapper
Version 1.5-0ppa3~trusty1 from the Pinta stable PPA doesn't have this
issue
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1326930
Title:
pinta throws an execption when trying to crtl-x / cut
To
Also:
pinta Pictures/foo.png
(Pinta:9564): GLib-GObject-WARNING **: Attempt to add property
__gtksharp_11_Pinta_Gui_Widgets_CellRendererSurface::surface after class was
initialised
Cairo.Pattern is leaking, programmer is missing a call to Dispose
Set MONO_CAIRO_DEBUG_DISPOSE to track
Launchpad has imported 2 comments from the remote bug at
https://bugs.freedesktop.org/show_bug.cgi?id=32210.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
** Description changed:
This bug is for tracking the version to be filled upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux-ec2 - 2.6.32-365.79
---
linux-ec2 (2.6.32-365.79) lucid; urgency=low
[ Brad Figg ]
* Rebased to Ubuntu-2.6.32-61.124
-- Brad Figg brad.f...@canonical.com Wed, 04 Jun 2014 15:25:02 -0700
** Changed in: linux-ec2 (Ubuntu Lucid)
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
The verification of the Stable Release Update for linux has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
** Description changed:
This bug is for tracking the 2.6.32-61.123 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux-ec2 - 2.6.32-365.79
---
linux-ec2 (2.6.32-365.79) lucid; urgency=low
[ Brad Figg ]
* Rebased to Ubuntu-2.6.32-61.124
-- Brad Figg brad.f...@canonical.com Wed, 04 Jun 2014 15:25:02 -0700
--
You received this bug notification because
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux-ec2 - 2.6.32-365.79
---
linux-ec2 (2.6.32-365.79) lucid; urgency=low
[ Brad Figg ]
* Rebased to Ubuntu-2.6.32-61.124
-- Brad Figg brad.f...@canonical.com Wed, 04 Jun 2014 15:25:02 -0700
** Changed in: linux-ec2 (Ubuntu Lucid)
This bug was fixed in the package linux-ec2 - 2.6.32-365.79
---
linux-ec2 (2.6.32-365.79) lucid; urgency=low
[ Brad Figg ]
* Rebased to Ubuntu-2.6.32-61.124
-- Brad Figg brad.f...@canonical.com Wed, 04 Jun 2014 15:25:02 -0700
--
You received this bug notification because
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 2.6.32-61.124
---
linux (2.6.32-61.124) lucid; urgency=low
[ Luis Henriques ]
* Revert sysctl net: Keep tcp_syn_retries inside the boundary
- LP: #1326473
* Revert net: check net.core.somaxconn sysctl values
- LP: #1326473
[
This bug was fixed in the package linux-lts-quantal -
3.5.0-51.77~precise1
---
linux-lts-quantal (3.5.0-51.77~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux-lts-quantal -
3.5.0-51.77~precise1
---
linux-lts-quantal (3.5.0-51.77~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux - 3.11.0-23.40
---
linux (3.11.0-23.40) saucy; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux-lts-raring -
3.8.0-42.62~precise1
---
linux-lts-raring (3.8.0-42.62~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux-lts-saucy -
3.11.0-23.40~precise1
---
linux-lts-saucy (3.11.0-23.40~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux-lts-saucy -
3.11.0-23.40~precise1
---
linux-lts-saucy (3.11.0-23.40~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux - 3.11.0-23.40
---
linux (3.11.0-23.40) saucy; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.11.0-23.40
---
linux (3.11.0-23.40) saucy; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux - 3.11.0-23.40
---
linux (3.11.0-23.40) saucy; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux-lts-trusty -
3.13.0-29.53~precise1
---
linux-lts-trusty (3.13.0-29.53~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux-lts-trusty -
3.13.0-29.53~precise1
---
linux-lts-trusty (3.13.0-29.53~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux-lts-raring -
3.8.0-42.62~precise1
---
linux-lts-raring (3.8.0-42.62~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux - 3.11.0-23.40
---
linux (3.11.0-23.40) saucy; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
This bug was fixed in the package linux-lts-raring -
3.8.0-42.62~precise1
---
linux-lts-raring (3.8.0-42.62~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
To correct my previous post, I tested the fixed kernel on
debian/jessie/xfce (and kde), not mint/xfce. This is a desktop not a
laptop.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1283938
Title:
This bug was fixed in the package linux-lts-raring -
3.8.0-42.62~precise1
---
linux-lts-raring (3.8.0-42.62~precise1) precise; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(...,
This bug was fixed in the package linux - 3.13.0-29.53
---
linux (3.13.0-29.53) trusty; urgency=low
[ Upstream Kernel Changes ]
* futex-prevent-requeue-pi-on-same-futex.patch futex: Forbid uaddr ==
uaddr2 in futex_requeue(..., requeue_pi=1)
- LP: #1326367
-
Public bug reported:
When I want to send a file to a Mac via bluetooth in Ubuntu 14.04
(Gnome), I have to type bluetooth-sendto in a terminal in order to be
able to browse a file and send it.
When I am connected to an Android Smartphone (in my tests Galaxy Note II
and Note III), I see a button
*** This bug is a duplicate of bug 848115 ***
https://bugs.launchpad.net/bugs/848115
yuval, I cannot reproduce this bug by following steps you provided on
Ubuntu 14.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: libreoffice-dictionaries_trusty.patch
https://bugs.launchpad.net/ubuntu/+source/libreoffice-dictionaries/+bug/1308771/+attachment/4126011/+files/libreoffice-dictionaries_trusty.patch
** Tags added: patch
** Description changed:
- While the libreoffice-dictionaries source
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed = Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
501 - 600 of 884 matches
Mail list logo