Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918960
Title:
kernel does not honor mokx revocations, allowing kexec lockdown bypa
Hi Utkarsh,
Great, thank you.
Currently I'm not sure if this issue also affects Bionic. That's
something I can test today or tomorrow if it can help.
It has been fixed in Debian per https://salsa.debian.org/openstack-team
/third-party/rabbitmq-
server/-/commit/20641fde278ad4d8bf7451e3c396f8ae976
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I tried earlyprintk=efi command line option but it still does not
display anything after boot
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
Yeah, that should be ok we have the buy in from everyone involved that
it is fine to promote in past releases.
** Changed in: rsyslog (Ubuntu Groovy)
Status: New => Fix Committed
** Changed in: rsyslog (Ubuntu Focal)
Status: New => Fix Committed
** Changed in: rsyslog (Ubuntu Bioni
@Brian This is specific to the KDE front end UI. 21.04/hirsute is
affected.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1681830
Title:
No Label for LVM Encryption Passwords
To manage notification
** Package changed: linux-signed-hwe-5.8 (Ubuntu) => linux-hwe-5.8
(Ubuntu)
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915118
Title:
"
https://lore.kernel.org/lkml/1884195.1615482...@warthog.procyon.org.uk/
is still not upstream.
https://lore.kernel.org/lkml/20210312171232.2681989-1-...@digikod.net/
may also be worth watching.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Tags added: rls-gg-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917954
Title:
vagrant reports undefined symbol __gmpz_limbs_write
To manage notifications about this bug go to:
https:/
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1918960
and then change the status of the bug to 'Confirmed'.
If, due to the nature
** Patch added: "libwacom_1.3-2ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482566/+files/libwacom_1.3-2ubuntu2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
Pop OS 20.10 has updated to kernel 5.11 and touchpad now works out of the box
without patching.
This is a great day for my laptop!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887190
Title:
MSFT
** Changed in: oem-priority
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1904583
Title:
SRU: Backport the latest developments on drivers detection and hybri
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-26541
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918960
Titl
I have pushed the focal update to the security-proposed ppa at
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages ; any testing that anyone could
give once it is done building would be appreciated.
Thanks!
--
You received this bug notification because you are a member
Hirsute build 30 March still there.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921084
Title:
Hirsute can not read FAT32
To manage notifications about this bug go to:
https://bugs.launchpad.net/
Still happens on Hirsute build 30 March.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915492
Title:
ayatana-indicator-keyboard-service crashed with SIGSEGV in
keyboard_GetLayout()
To manage not
** Changed in: logwatch (Ubuntu Xenial)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880211
Title:
Logwatch package points to wrong location for zfs utils
Updated the [Where problems will occur] part.
** Description changed:
[Impact]
On Cmedia Audio, unusable SPDIF can be selected as output from PulseAudio.
[Fix]
Disable IEC958 (SPDIF) through ALSA UCM.
[Test]
With the UCM applied, `pactl` and audio panel in gnome-control-center
commit ba02abf58f8d0405140e658d8238b69e89120576
Author: Jason Gerecke
Date: Wed Jan 6 13:01:29 2021 -0800
data: Add ISDv4 51e9 (Lenovo ThinkPad P15 Gen 1) (#325)
Tablet definition was tested and verified to work by the bug
reporter.
** Patch added: "isdv4-51e9.patch"
https://bugs.
The add-isdv4-aes-stylus-group.patch need the isdv4-48ca.patch and
isdv4-48ce.patch.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921991
Title:
Support isdv4-aes stylus group and multiple AES styl
commit a864679083c035eb08a75cf084a6564d589c0b1c
Author: Jason Gerecke
Date: Fri Nov 1 11:51:20 2019 -0700
Add multiple AES stylus definitions
Adds definitions for many different AES styli. The precise information
about supported features is hard to come by, but in general most pens
** Patch added: "isdv4-48ce.patch"
https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482542/+files/isdv4-48ce.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921991
** Patch added: "isdv4-48ca.patch"
https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482541/+files/isdv4-48ca.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921991
commit 8652aa3376bfb0e833af3704dc2ab7948958cd8f
Author: Jason Gerecke
Date: Tue Oct 29 15:26:51 2019 -0700
Add isdv4-aes stylus group to all AES sensors
AES sensors determined based on comments and HID descriptors available
at the wacom-hid-descriptors repository, where available.
Hey Etienne,
Thanks for submitting the debdiff. I'm taking a look in more detail, but
on first glance it looks good to me. If all goes well, I'll push it up
to our security-proposed in a bit.
** Changed in: shibboleth-sp (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You re
If its helpful, the proper output looks like this.
- ZFS Report Begin
Total ZFS pools: 1
Total filesystems: 24 (24 mounted)
Total snapshots: 1926
Total volumes: 0
--- ZFS Pool Summary ---
Pool Name
** Description changed:
[Impact]
- * There are lots of stylus couldn't be used on Lenovo's platform, our
+ * There are lots of stylus couldn't be used on Lenovo's platform, our
OEM customer request to support ThinkPad P15 Gen 1, ThinkPad X1 Yoga
Gen5, ThinkPad P1 G3.
- * I reviewed
** Tags added: binder
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921976
Title:
Can't create additional binder devices the user needs to specify them
To manage notifications about this bug go to
This bug is present in Ubuntu 21.04 and 20.10 daily builds.
** Tags removed: apport-bug i386
** Tags added: groovy hirsute
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1404172
Title:
lightdm: PAM
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909005
T
[Expired for ubiquity (Ubuntu) because there has been no activity for 60
days.]
** Changed in: ubiquity (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1910
[Expired for ubiquity (Ubuntu) because there has been no activity for 60
days.]
** Changed in: ubiquity (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912066
T
[Expired for ubiquity (Ubuntu) because there has been no activity for 60
days.]
** Changed in: ubiquity (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912
[Expired for nautilus (Ubuntu) because there has been no activity for 60
days.]
** Changed in: nautilus (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1913
[Expired for calamares (Ubuntu) because there has been no activity for
60 days.]
** Changed in: calamares (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/19
Thanks for the report. Making this public to get the Desktop team to
take a look at this.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
This bug has been reported on the Ubuntu ISO testing tracker.
A list of all reports related to this bug can be found here:
http://iso.qa.ubuntu.com/qatracker/reports/bugs/1921826
** Tags added: iso-testing
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Public bug reported:
[Impact]
* There are lots of stylus couldn't be used on Lenovo's platform, our
OEM customer request to support ThinkPad P15 Gen 1, ThinkPad X1 Yoga
Gen5, ThinkPad P1 G3.
* I reviewed and tested the below patches from upstream. It could
support the stylus very well on P15,
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920685
Title:
Shity ubujntu 20.04 upgrade
To manage noti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This was addressed in https://ubuntu.com/security/notices/USN-4891-1 .
** Information type changed from Private Security to Public Security
** Changed in: openssl (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Also affects: gnome-shell (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921585
Title:
Screen contents visible when switching between logged i
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux - 5.11.0-13.14
---
linux (5.11.0-13.14) hirsute; urgency=medium
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cases for unprivileged
* CVE-2020-27171
This bug was fixed in the package linux-riscv - 5.11.0-1004.4
---
linux-riscv (5.11.0-1004.4) hirsute; urgency=medium
[ Ubuntu: 5.11.0-13.14 ]
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cas
This bug was fixed in the package linux-riscv - 5.11.0-1004.4
---
linux-riscv (5.11.0-1004.4) hirsute; urgency=medium
[ Ubuntu: 5.11.0-13.14 ]
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cas
This bug was fixed in the package linux-riscv - 5.11.0-1004.4
---
linux-riscv (5.11.0-1004.4) hirsute; urgency=medium
[ Ubuntu: 5.11.0-13.14 ]
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cas
This bug was fixed in the package linux-riscv - 5.11.0-1004.4
---
linux-riscv (5.11.0-1004.4) hirsute; urgency=medium
[ Ubuntu: 5.11.0-13.14 ]
* CVE-2020-27170
- bpf: Prohibit alu ops for pointer types not defining ptr_limit
- bpf, selftests: Fix up some test_verifier cas
[Bionic regression / autopkgtest]
simple.sh is looking if it doesn't load module by happenstance by
comparing the list before and after, and Bionic w/ 4.15 kernel reveal
that 'devlink' is added along the way. I was able to isolate it to the
networking plugin:
root@srv:~# lsmod | grep -i devlink
r
[Bionic regression / autopkgtest]
simple.sh is looking if it doesn't load module by happenstance by
comparing the list before and after, and Bionic w/ 4.15 kernel reveal
that 'devlink' is added along the way. I was able to isolate it to the
networking plugin:
root@srv:~# lsmod | grep -i devlink
r
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
sudo apt install libpcap-dev
on ubuntu 20.04.2
when i use funtcion pcap_findalldevs_ex tip to me undefined reference to
`pcap_findalldevs_ex'
ubuntu 18.04 is rigth...
** Affects: libpcap (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug no
Hey Milfred, sorry you are hitting this issue.
What Ubuntu release is this? And can you confirm that the desktop
envirnment you're using is the Ubuntu desktop, and not something else?
Thanks.
** Package changed: ubuntu => gdm3 (Ubuntu)
** Information type changed from Private Security to Public
*** This bug is a duplicate of bug 1532508 ***
https://bugs.launchpad.net/bugs/1532508
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
** Description changed:
[Impact]
Logwatch fails to print info for ZFS due to invalid paths to binaries.
[Test Case]
With ZFS installed, run logwatch and note the missing ZFS information.
+
+ $ sudo apt-get install zfsutils-linux
+ $ sudo logwatch --detail Low --range all --service zz-z
[Bionic regression / autopkgtest]
simple.sh is looking if it doesn't load module by happenstance by
comparing the list before and after, and Bionic w/ 4.15 kernel reveal
that 'devlink' is added along the way. I was able to isolate it to the
networking plugin:
root@srv:~# lsmod | grep -i devlink
Relevat bits from UbiquitySyslog
Mar 28 10:33:20 ubuntu grub-installer: info: Installing grub on '/dev/sdb'
Mar 28 10:33:20 ubuntu grub-installer: info: grub-install does not support
--no-floppy
Mar 28 10:33:20 ubuntu grub-installer: info: Running chroot /target
grub-install --force "/dev/sdb"
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
[Focal regression / autopkgtest]
After a few retries, the test passed. I had the same failure at the first run
with Hirsute.
http://autopkgtest.ubuntu.com/packages/s/sosreport/focal/amd64
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
Hello, sorry you are having this issue.
Unfortunately I am unable to reporduce this, with samba 2:4.11.6+dfsg-
0ubuntu1.6 from focal, either by applying iptables rules manually or
enabling firewall rules with ufw:
$ sudo iptables -D INPUT -i lo -j LOG
$ sudo iptables -L INPUT -n
Chain INPUT
Hi,
thanks for trying this out.
If this is still reproducible, please give the latest mainline kernel [1] a try
to see if you issue exists in the upstream kernel. Instructions could be found
in [2]
Please flip the bug status back to confirmed after your test.
Thank you!
[1] https://kernel.ubunt
Thanks for the bug report.
Please check the issue is still present in newer versions of GNOME. If
so then report it to the developers at https://gitlab.gnome.org/GNOME
/gnome-shell/issues and tell us the new issue ID.
** Package changed: xorg (Ubuntu) => unity (Ubuntu)
** Package changed: unity
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921941
Title:
samba install flushes iptables and sets all chains to policy accept
There aren't many Xorg maintainers left, but if you would like to
communicate with them then please use the upstream page:
https://gitlab.freedesktop.org/xorg/xserver/-/issues/312
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
Ok. I got it working.
I built from here.
git clone https://github.com/thesofproject/linux.git
with
CONFIG_SND_SOC_INTEL_SOUNDWIRE_SOF_MACH=m
I uploaded my kernel debian/ubuntu packages to
https://drive.google.com/drive/folders/1L9DpjMamc37tZ19s5u_4RfmV221F4222?usp=sharing
Affected Spectre X360 l
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1921974
and then change the status of the bug to 'Confirmed'.
If, due to the nature
II is a great point. Part of the original reason for keeping fwupd
major version locked in stable series was concerns to breaking other
components in Ubuntu such as gnome-software (ubuntu-software). Since
that has now transitioned to snap this is no longer a blocker. And as
you pointed out the d
Public bug reported:
ubuntu azure seems not support binder FS.
$ uname -r
5.8.0-1026-azure
$ sudo modprobe binder_linux
$ mkdir ./tbinder
$ sudo mount -t binder binder ./tbinder
mount: /tbinder: unknown filesystem type 'binder'.
$ cat /proc/filesystems | grep binder
Another generic server work
I try memory stress test with my ppa in #4, the issue is still
reproduced.
** Attachment added: "sosreport-u-Inspiron-1918855-2021-03-31-xbkosvf.tar.xz"
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1918855/+attachment/5482483/+files/sosreport-u-Inspiron-1918855-2021-03-31-xbkosvf.tar.xz
** Description changed:
+ Upgrade focal fwupd from 1.3.11 to 1.4.7.
+
+ [Impact]
+
+ * touchscreen is working after login on certain HW
+ * Current LTS is the OEM Project scope, so we need to SRU it.
+ * It's a specific HW related upstream fix.
+
+ [Test Plan]
+
+ * Wit this upgraded, with
** Changed in: gdm (Ubuntu)
Status: In Progress => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865838
Title:
no error displayed on failed fingerprint authentication
To manage noti
Seb, I've pushed the relevant changes to salsa for focal, when you can
do a release please :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915174
Title:
Fingerprint enrollment error stops user to
Public bug reported:
[Impact]
On CML-R, after S3, No screen show on all three connector(3*DP).
[Fix]
The v4 patch has been landed on drm-tip.
For Legacy S3 suspend/resume GEN9 BC needs to enable and setup TGP PCH.
[Test Case]
1. Connected the monitor on one of 3*DP on CML-R.
2. Suspend&resume th
This bug was fixed in the package exo - 0.12.11-1ubuntu1.20.04.1
---
exo (0.12.11-1ubuntu1.20.04.1) focal-proposed; urgency=medium
* d/patches/lp1874954.patch:
- Allow resizing the xfce4-settings window smaller (LP: #1874954)
-- Sean Davis Sun, 14 Mar 2021 08:32:12
-0400
--
This bug was fixed in the package exo - 0.12.11-1ubuntu1.20.10.1
---
exo (0.12.11-1ubuntu1.20.10.1) groovy-proposed; urgency=medium
* d/patches/lp1874954.patch:
- Allow resizing the xfce4-settings window smaller (LP: #1874954)
-- Sean Davis Sun, 14 Mar 2021 08:32:12
-0400
*
The verification of the Stable Release Update for exo has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a regr
As mentioned in the acceptance message, once you've tested the update we
would like you to “please add a comment to this bug, mentioning the
version of the package you tested”.
That said, messed up tags aside, this seems to have been verified as
fixed on the relevant releases.
--
You received th
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: onboard (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880114
Title:
Sy
For point 6:
fwupd has two sides:
1. HWE: Given our policy, we won't block version bump in SRU on HWE component.
2. User space interactivity: given the two paths of user interactivity
I. via command line: the major interface is fwupdmgr. Per check it's
arguments, the command-line interface in t
Installed VLC, problem is gone. This has been confirmed on multiple
systems. Something about the way FireFox is handling media.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1917816
Title:
Firefox n
** Changed in: linux (Ubuntu Bionic)
Importance: Medium => High
** Changed in: linux (Ubuntu Focal)
Importance: Medium => High
** Changed in: linux (Ubuntu Groovy)
Importance: Medium => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
Confirmed that on a working system, just updating to the new kernel breaks it.
So that SRU kernel is definitely broken and should not be shipped.
[8.996651] BUG: unable to handle kernel NULL pointer dereference at
e12c1a77
[8.998738] IP: [] fuse_do_setattr+0x52/
** Description changed:
- Per OEM customer workflow and SBAT update and other bugs fixes, we need
- to SRU focal/fwupd to version 1.4.7.
+ Per OEM customer CPU microcode workflow, SBAT update and other bugs
+ fixes, we need to SRU focal/fwupd to version 1.4.7.
[Impact]
* For new features,
When a single test fails occasionally, it can be an issue with LXD or
with the test, but when a bugfix release of a stable kernel suddenly
causes one of the most trivial tests to fail on all architectures, this
strongly suggests that the kernel is the issue.
--
You received this bug notification
1 - 100 of 417 matches
Mail list logo