** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux-raspi2 - 4.15.0-1057.61
---
linux-raspi2 (4.15.0-1057.61) bionic; urgency=medium
* bionic/linux-raspi2: 4.15.0-1057.61 -proposed tracker (LP: #1864726)
[ Ubuntu: 4.15.0-90.90 ]
* bionic/linux: 4.15.0-90.90 -proposed tracker (LP: #1864753
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
*** This bug is a duplicate of bug 1865247 ***
https://bugs.launchpad.net/bugs/1865247
This bug was fixed in the package linux-kvm - 4.15.0-1056.57
---
linux-kvm (4.15.0-1056.57) bionic; urgency=medium
* bionic/linux-kvm: 4.15.0-1056.57 -proposed tracker (LP: #1865247)
* Pac
*** This bug is a duplicate of bug 1865255 ***
https://bugs.launchpad.net/bugs/1865255
This bug was fixed in the package linux-gke-4.15 - 4.15.0-1055.58
---
linux-gke-4.15 (4.15.0-1055.58) bionic; urgency=medium
* bionic/linux-gke-4.15: 4.15.0-1055.58 -proposed tracker (LP:
#18
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
My bad, its GNOME.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864982
Title:
Ubuntu desktop computer doesn't seem to lock correctly
To manage notifications about this bug go to:
https://bugs.lau
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This bug was fixed in the package linux-kvm - 4.15.0-1056.57
---
linux-kvm (4.15.0-1056.57) bionic; urgency=medium
* bionic/linux-kvm: 4.15.0-1056.57 -proposed tracker (LP: #1865247)
* Packaging resync (LP: #1786013)
- [Packaging] resync dkms-build and family
- [Packaging
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-disco
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux-gke-4.15 - 4.15.0-1055.58
---
linux-gke-4.15 (4.15.0-1055.58) bionic; urgency=medium
* bionic/linux-gke-4.15: 4.15.0-1055.58 -proposed tracker (LP:
#1865255)
[ Ubuntu: 4.15.0-91.92 ]
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: livecd-rootfs (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867607
Title:
fail to reinstall all packages together in minimized builds
To
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
*** This bug is a duplicate of bug 1865438 ***
https://bugs.launchpad.net/bugs/1865438
This bug was fixed in the package linux-kvm - 5.3.0-1012.13
---
linux-kvm (5.3.0-1012.13) eoan; urgency=medium
* eoan/linux-kvm: 5.3.0-1012.13 -proposed tracker (LP: #1865438)
[ Ubuntu: 5.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
*** This bug is a duplicate of bug 1865482 ***
https://bugs.launchpad.net/bugs/1865482
This bug was fixed in the package linux-aws - 5.3.0-1013.14
---
linux-aws (5.3.0-1013.14) eoan; urgency=medium
* eoan/linux-aws: 5.3.0-1013.14 -proposed tracker (LP: #1865482)
[ Ubuntu: 5.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
*** This bug is a duplicate of bug 1865491 ***
https://bugs.launchpad.net/bugs/1865491
This bug was fixed in the package linux-gcp - 5.3.0-1014.15
---
linux-gcp (5.3.0-1014.15) eoan; urgency=medium
* eoan/linux-gcp: 5.3.0-1014.15 -proposed tracker (LP: #1865491)
[ Ubuntu: 5.
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
*** This bug is a duplicate of bug 1865493 ***
https://bugs.launchpad.net/bugs/1865493
This bug was fixed in the package linux-oracle - 5.3.0-1011.12
---
linux-oracle (5.3.0-1011.12) eoan; urgency=medium
* eoan/linux-oracle: 5.3.0-1011.12 -proposed tracker (LP: #1865493)
[ U
*** This bug is a duplicate of bug 1865109 ***
https://bugs.launchpad.net/bugs/1865109
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- K
*** This bug is a duplicate of bug 1865109 ***
https://bugs.launchpad.net/bugs/1865109
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- K
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux - 4.15.0-91.92
---
linux (4.15.0-91.92) bionic; urgency=medium
* bionic/linux: 4.15.0-91.92 -proposed tracker (LP: #1865109)
* CVE-2020-2732
- KVM: x86: emulate RDPID
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM:
This bug was fixed in the package linux-aws - 5.3.0-1013.14
---
linux-aws (5.3.0-1013.14) eoan; urgency=medium
* eoan/linux-aws: 5.3.0-1013.14 -proposed tracker (LP: #1865482)
[ Ubuntu: 5.3.0-42.34 ]
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
This bug was fixed in the package linux-kvm - 5.3.0-1012.13
---
linux-kvm (5.3.0-1012.13) eoan; urgency=medium
* eoan/linux-kvm: 5.3.0-1012.13 -proposed tracker (LP: #1865438)
[ Ubuntu: 5.3.0-42.34 ]
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
Verification-testing cannot be done with this kernel as it does't get
promoted to -proposed.
** Changed in: kernel-sru-workflow/verification-testing
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux-oracle - 5.3.0-1011.12
---
linux-oracle (5.3.0-1011.12) eoan; urgency=medium
* eoan/linux-oracle: 5.3.0-1011.12 -proposed tracker (LP: #1865493)
[ Ubuntu: 5.3.0-42.34 ]
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2
This bug was fixed in the package linux-gcp - 5.3.0-1014.15
---
linux-gcp (5.3.0-1014.15) eoan; urgency=medium
* eoan/linux-gcp: 5.3.0-1014.15 -proposed tracker (LP: #1865491)
[ Ubuntu: 5.3.0-42.34 ]
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
** Summary changed:
- Unusual Home Screen Bug and Application Menu Bug(Refer video attachment))
+ Unusual Show Applications Bug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867575
Title:
Unusual
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
--- Comment From mihaj...@de.ibm.com 2020-03-16 06:36 EDT---
Initial tests performed using the PPA packages (kernel, s390-tools and QEMU):
everything works stable and as expected.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
To sum it up: only -340 in Eoan failed, whereas the rest passed our
tests.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854485
Title:
Introduce the new NVIDIA 440 series, and add 5.4 Linux compati
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux-raspi2 - 5.3.0-1019.21
---
linux-raspi2 (5.3.0-1019.21) eoan; urgency=medium
* eoan/linux-raspi2: 5.3.0-1019.21 -proposed tracker (LP: #1863269)
* Eoan update: upstream stable patchset 2020-02-06 (LP: #1862227)
- [Config] raspi2: Update
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
*** This bug is a duplicate of bug 1865111 ***
https://bugs.launchpad.net/bugs/1865111
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVM
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
This bug was fixed in the package linux-raspi2 - 5.3.0-1019.21
---
linux-raspi2 (5.3.0-1019.21) eoan; urgency=medium
* eoan/linux-raspi2: 5.3.0-1019.21 -proposed tracker (LP: #1863269)
* Eoan update: upstream stable patchset 2020-02-06 (LP: #1862227)
- [Config] raspi2: Update
This bug was fixed in the package linux - 5.3.0-42.34
---
linux (5.3.0-42.34) eoan; urgency=medium
* eoan/linux: 5.3.0-42.34 -proposed tracker (LP: #1865111)
* CVE-2020-2732
- KVM: nVMX: Don't emulate instructions in guest mode
- KVM: nVMX: Refactor IO bitmap checks into
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
Public bug reported:
Chroot chroot dpkg-query -f '${binary:Package}\n' -W | Chroot chroot
xargs apt-get install --reinstall
Fails in focal with:
Processing triggers for libc-bin (2.31-0ubuntu6) ...
E: Could not configure 'libc6:amd64'.
E: Could not perform immediate configuration on 'libgcc-s1
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a memb
Public bug reported:
CAN't open system settings, icon visible but settings don't display
Application named Cheese also have the same issue
ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: gnome-control-center 1:3.28.2-0ubuntu0.18.04.6
ProcVersionSignature: Ubuntu 5.0.0-23.24~18.04.1-generic
See also: https://github.com/lxc/lxd/issues/7029
** Bug watch added: LXD bug tracker #7029
https://github.com/lxc/lxd/issues/7029
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1765998
Title:
FS
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
*** This bug is a duplicate of bug 1867605 ***
https://bugs.launchpad.net/bugs/1867605
** This bug is no longer a duplicate of bug 1866480
focal/linux-raspi2: 5.4.0-1005.5 -proposed tracker
** This bug has been marked a duplicate of bug 1867605
focal/linux-raspi2: -proposed tracker
--
Since the NEW package has been reviewed and ACKed by an AA, this looks
good to go. Approving the FFe.
** Changed in: ffmpeg (Ubuntu Focal)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bug
701 - 800 of 886 matches
Mail list logo