[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2019-10-03 Thread Po-Hsu Lin
** Changed in: linux (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744639 Title: Xenial update to 4.4.100 stable release To manage notifications about this

[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2018-04-04 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-119.143 --- linux (4.4.0-119.143) xenial; urgency=medium * linux: 4.4.0-119.143 -proposed tracker (LP: #1760327) * Dell XPS 13 9360 bluetooth scan can not detect any device (LP: #1759821) - Revert "Bluetooth: btusb: fix QCA

[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2018-02-19 Thread Stefan Bader
** Changed in: linux (Ubuntu Xenial) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1744639 Title: Xenial update to 4.4.100 stable release To manage

[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2018-02-19 Thread Stefan Bader
** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2018-01-22 Thread Khaled El Mously
The following patch had to be applied manually (using 'patch') since 'git am' didn't work - however, no code changes were required: * igb: close/suspend race in netif_device_detach -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1744639] Re: Xenial update to 4.4.100 stable release

2018-01-22 Thread Khaled El Mously
The following patches were skipped because they were already applied: * ext4: fix data exposure after a crash * bpf: don't let ldimm64 leak map addresses on unprivileged * xen-blkback: don't leak stack data via response ring * sctp: do not peel off an assoc from one netns to another one *