** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This is pretty critical to MAAS as this yield Bionic deployments without
DNS resolution.
** Description changed:
When deploying Bionic, /etc/resolv.conf is not configured correctly,
which leads to no DNS resolution. In the output below, you will see that
netplan config is correctly to the
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
Security review needed.
** Changed in: xdg-desktop-portal (Ubuntu)
Assignee: Nish Aravamudan (nacc) => Ubuntu Security Team (ubuntu-security)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749094
Title:
linux-raspi2: 4.4.0-1085.93 -proposed
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package curtin - 17.1-37-g82622f12-0ubuntu1
---
curtin (17.1-37-g82622f12-0ubuntu1) bionic; urgency=medium
* New upstream snapshot.
- docs: Document use of format command with fstype: zfsroot
- docs: Add HACKING.rst doc to top level dir and
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749096
Title:
linux-snapdragon: 4.4.0-1087.92 -proposed
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749089
Title:
linux: 4.4.0-116.140 -proposed tracker
To
I would also love to know what commit you think is causing the issue.
I've been trying to dig through a bit and haven't had any luck tracking
down the issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux-hwe - 4.13.0-36.40~16.04.1
---
linux-hwe (4.13.0-36.40~16.04.1) xenial; urgency=medium
* linux-hwe: 4.13.0-36.40~16.04.1 -proposed tracker (LP: #1750052)
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
*** This bug is a duplicate of bug 1749096 ***
https://bugs.launchpad.net/bugs/1749096
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: rhythmbox (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749095
Title:
linux-euclid: 4.4.0-9025.27 -proposed
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP: #1749096)
[ Ubuntu: 4.4.0-116.140 ]
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059859/+files/CRDA.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748972
Title:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
*** This bug is a duplicate of bug 1749090 ***
https://bugs.launchpad.net/bugs/1749090
This bug was fixed in the package linux-aws - 4.4.0-1014.14
---
linux-aws (4.4.0-1014.14) trusty; urgency=medium
* linux-aws: 4.4.0-1014.14 -proposed tracker (LP: #1748486)
[ Ubuntu:
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.16 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Branch linked: lp:~unity-team/unity/x-sru6
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750619
Title:
Static CompRegion destruction causes memory corruption at compiz exit
To manage
ubuntu@node03:~$ systemd-resolve --status --no-pager
Global
DNSSEC NTA: 10.in-addr.arpa
16.172.in-addr.arpa
168.192.in-addr.arpa
17.172.in-addr.arpa
18.172.in-addr.arpa
This bug was fixed in the package linux-lts-xenial -
4.4.0-116.140~14.04.1
---
linux-lts-xenial (4.4.0-116.140~14.04.1) trusty; urgency=medium
* linux-lts-xenial: 4.4.0-116.140~14.04.1 -proposed tracker (LP:
#1749091)
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
*
*** This bug is a duplicate of bug 1749089 ***
https://bugs.launchpad.net/bugs/1749089
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux-hwe - 4.13.0-36.40~16.04.1
---
linux-hwe (4.13.0-36.40~16.04.1) xenial; urgency=medium
* linux-hwe: 4.13.0-36.40~16.04.1 -proposed tracker (LP: #1750052)
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
** Attachment added: "gnome_terminal_2.png"
https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1750889/+attachment/5059915/+files/gnome_terminal_2.png
** Also affects: gtk+3.0 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you
*** This bug is a duplicate of bug 1749094 ***
https://bugs.launchpad.net/bugs/1749094
This bug was fixed in the package linux-raspi2 - 4.4.0-1085.93
---
linux-raspi2 (4.4.0-1085.93) xenial; urgency=medium
* linux-raspi2: 4.4.0-1085.93 -proposed tracker (LP: #1749094)
[
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
*** This bug is a duplicate of bug 1749093 ***
https://bugs.launchpad.net/bugs/1749093
This bug was fixed in the package linux-aws - 4.4.0-1052.61
---
linux-aws (4.4.0-1052.61) xenial; urgency=medium
* linux-aws: 4.4.0-1052.61 -proposed tracker (LP: #1748489)
[ Ubuntu:
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
*
@Khaled: I don't see these patches in artful/master-next, so I'm going
to move back the artful task back to "In Progress". Can you confirm if
these will be integrated for the next cycle, or if I should resubmit?
** Changed in: linux (Ubuntu Artful)
Status: Fix Committed => In Progress
--
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
*
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v4.4 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750793
Title:
I have backported it myself and multiple issues (including this one)
have been resolved as a result. I am still confused by the reasoning
behind being unwilling to backport versions of this package in a "Long
Term Support" release of Ubuntu. This bug is not fixed until a newer
version is
First i want to thank you and many others who work for us to make Ubuntu
fantastic
For i know was Ubuntu 14.04 automatic upgraded into 16.04 by your collegas after
problems with my system, after this i changed Ubuntu in Xubuntu, i do not know
if there are parts of old programs left and still are
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
This bug was fixed in the package libreoffice-l10n -
1:5.4.5-0ubuntu0.17.10.1
---
libreoffice-l10n (1:5.4.5-0ubuntu0.17.10.1) artful; urgency=medium
* New upstream release (LP: #1748999)
- fixes CVE-2018-6871: Remote arbitrary file disclosure vulnerability via
WEBSERVICE
This bug was fixed in the package linux-raspi2 - 4.4.0-1085.93
---
linux-raspi2 (4.4.0-1085.93) xenial; urgency=medium
* linux-raspi2: 4.4.0-1085.93 -proposed tracker (LP: #1749094)
[ Ubuntu: 4.4.0-116.140 ]
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG:
*** This bug is a duplicate of bug 1748476 ***
https://bugs.launchpad.net/bugs/1748476
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
*
This bug was fixed in the package linux-oem - 4.13.0-1021.23
---
linux-oem (4.13.0-1021.23) xenial; urgency=low
* linux-oem: 4.13.0-1021.23 -proposed tracker (LP: #1748481)
* Intel 9462 A370:42A4 doesn't work (LP: #1748853)
- SAUCE: iwlwifi: Adding missing id A370:42A4
*
*** This bug is a duplicate of bug 1748478 ***
https://bugs.launchpad.net/bugs/1748478
This bug was fixed in the package linux-gcp - 4.13.0-1011.15
---
linux-gcp (4.13.0-1011.15) xenial; urgency=medium
* linux-gcp: 4.13.0-1011.15 -proposed tracker (LP: #1748478)
[ Ubuntu:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
MAAS kvm deploy SRU verification for xenial
** Attachment added: "maas_pod_kvm_install.log"
https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1747059/+attachment/5059911/+files/maas_pod_kvm_install.log
--
You received this bug notification because you are a member of Ubuntu
Bugs,
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
* [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver (LP: #1749332)
- SAUCE:
** Changed in: kernel-sru-workflow/verification-testing
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1749095
Title:
linux-euclid: 4.4.0-9025.27 -proposed
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
*** This bug is a duplicate of bug 1748990 ***
https://bugs.launchpad.net/bugs/1748990
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
Still in LO 6.0.x
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748895
Title:
LO unable to find a working email configuration
To manage notifications about this bug go to:
*** This bug is a duplicate of bug 1749096 ***
https://bugs.launchpad.net/bugs/1749096
This bug was fixed in the package linux-snapdragon - 4.4.0-1087.92
---
linux-snapdragon (4.4.0-1087.92) xenial; urgency=medium
* linux-snapdragon: 4.4.0-1087.92 -proposed tracker (LP:
This bug was fixed in the package libreoffice - 1:5.4.5-0ubuntu0.17.10.1
---
libreoffice (1:5.4.5-0ubuntu0.17.10.1) artful; urgency=medium
* New upstream release (LP: #1748999)
- fixes CVE-2018-6871: Remote arbitrary file disclosure vulnerability via
WEBSERVICE formula
*** This bug is a duplicate of bug 1750046 ***
https://bugs.launchpad.net/bugs/1750046
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059868/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748972
Title:
This bug was fixed in the package linux - 4.13.0-36.40
---
linux (4.13.0-36.40) artful; urgency=medium
* linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)
* Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set
linux (4.13.0-35.39) artful; urgency=medium
* linux:
This bug was fixed in the package linux-azure - 4.13.0-1011.14
---
linux-azure (4.13.0-1011.14) xenial; urgency=medium
* linux-azure: 4.13.0-1011.14 -proposed tracker (LP: #1748476)
* [Hyper-V] Fixes for Network Direct InfiniBand/RDMA driver (LP: #1749332)
- SAUCE:
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748476
Title:
linux-azure: 4.13.0-1011.14 -proposed
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059866/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059869/+files/WifiSyslog.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Same problem with cloudcompare. Installed using snap, launches fine,
can't find any files as I don't keep gigantic 3D point clouds in my home
directory. Seriously, what is the point of this thing?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
*** This bug is a duplicate of bug 1749092 ***
https://bugs.launchpad.net/bugs/1749092
This bug was fixed in the package linux-kvm - 4.4.0-1019.24
---
linux-kvm (4.4.0-1019.24) xenial; urgency=medium
* linux-kvm: 4.4.0-1019.24 -proposed tracker (LP: #1749092)
[ Ubuntu:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: gvfs (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1740644
Title:
I think we can close this out, we were able to reproduce the issue
without kvm. Sorry for the false alarm.
** Changed in: qemu (Ubuntu)
Status: Incomplete => Invalid
** Changed in: openldap (Ubuntu)
Status: Confirmed => Invalid
** Changed in: openldap (Ubuntu)
Status:
Also, please consider reproducing this issue on the official Ubuntu GA
kernel or linux-hwe when reporting bugs.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750774
Title:
Replace rescan_scsi_bus
Your installation medium contains files from multiple debian based
distributions. Before reusing a USB stick to install another release,
you need to wipe it.
** Changed in: ubiquity (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of
Hi @Igor,
I restarted and the reader does recover, but I run into the same issue
as before when I try to re-enroll:
Here's the log:
=
╰─$ sudo examples/enroll
This program will enroll your right index finger, unconditionally overwriting
any right-index
pyrfc3339 looks good and straightforward to me; MIR approved.
** Changed in: pyrfc3339 (Ubuntu)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1747460
Title:
Public bug reported:
Install crashed with an error similar to above.
ProblemType: Bug
DistroRelease: Ubuntu 17.10
Package: ubiquity 17.10.10
ProcVersionSignature: Ubuntu 4.13.0-21.24-generic 4.13.13
Uname: Linux 4.13.0-21-generic x86_64
ApportVersion: 2.20.7-0ubuntu3.7
Architecture: amd64
** Summary changed:
- stress-ng enosys stresser causes kernel to bug
+ stress-ng enosys stressor triggers a kernel BUG
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750786
Title:
stress-ng enosys
Your installation medium is corrupt; you will need to recreate it and
may want to verify it using the check disc option at the boot menu.
** Changed in: ubiquity (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Your EFI system partition is corrupt; you will need to repair it with
either dosfsck or Windows' chkdsk/scandisk.
** Changed in: grub-installer (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
It looks like your installation medium may be corrupt; can you run the
check disc option from the boot menu?
** Changed in: ubiquity (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The "disk" became unresponsive and all requests started timing out.
** Changed in: ubiquity (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735951
Title:
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1748972/+attachment/5059860/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package linux - 4.4.0-116.140
---
linux (4.4.0-116.140) xenial; urgency=medium
* linux: 4.4.0-116.140 -proposed tracker (LP: #1748990)
* BUG: unable to handle kernel NULL pointer dereference at 0009
(LP: #1748671)
- SAUCE: net: ipv4:
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-artful
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: xdg-desktop-portal-gtk (Ubuntu)
Assignee: (unassigned) => Nish Aravamudan (nacc)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1750069
Title:
[MIR] xdg-desktop-portal-gtk
To
Hopefully this gets fixed soon. It is very frustrating.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1732454
Title:
Reply to message composer window opens behind main evolution window
To manage
601 - 700 of 806 matches
Mail list logo