apport information
** Attachment added: "AplayDevices.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324034/+files/AplayDevices.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324044/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861
apport information
** Attachment added: "Card1.Amixer.values.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324040/+files/Card1.Amixer.values.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324053/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324048/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324049/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324047/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324045/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324055/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861359
apport information
** Attachment added: "PciMultimedia.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324046/+files/PciMultimedia.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324059/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324051/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1861359/+attachment/5324057/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861359
Very curious. I tried again with new kernel and no change in results:
$ cat /proc/version_signature
Ubuntu 5.4.0-12.15-generic 5.4.8
$ uname -a
Linux millbarge 5.4.0-12-generic #15-Ubuntu SMP Tue Jan 21 15:12:29 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ apt policy fatrace
fatrace:
Installed: 0
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861359
Title:
swap storms kills interactive use
Status in linux pack
I had a vmstat 1 running; the entire time the system was swapping out, X
was unusable.
Thanks
** Attachment added: "vmstat 1 output"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1861359/+attachment/5324495/+files/vmstat-1
--
You received this bug notification because you are a membe
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861446
Title:
on focal 'ubuntu-bug linux' doesn't automatically colle
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This kernel command line parameter didn't appear to help:
Moments after loading a new URL into firefox:
1 00 69917617804 369982000 0 0
2289 863 2 1 98 0 0
0 00 70286017804 369978000 0 2288
4
$ systemctl show '*.slice' | grep -e '^Slice' -e '^ControlGroup' -e
"^DefaultMem" -e "^Memory"
Slice=system.slice
ControlGroup=/system.slice/system-systemd\x2dfsck.slice
MemoryCurrent=[not set]
MemoryAccounting=yes
DefaultMemoryLow=0
DefaultMemoryMin=0
MemoryMin=0
MemoryLow=0
MemoryHigh=infinity
M
Thanks Jesus for the workaround, I can confirm that those two files
fixed wifi on my raspi 3b+.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1836730
Title:
Raspberry Pi 3 brcm
Apparently I was too hasty. Using these two files got my ip link status
further along but didn't actually get me to working wifi.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/183
Public bug reported:
Hello, my thinkpad x1 carbon 6th gen disconnected from its dock. This
caused the external display to stop working. (I was able to switch to
virtual console 1 with control+alt+fn+f1 then switch back with
control+alt+fn+f7 and video recovered.)
Here's the selection of dmesg at
On Ubuntu 16.04 LTS and newer, there's no need to use the zfs DKMS
packages.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1760141
Title:
zfs-dkms 0.6.5.6-0ubuntu20: zfs ker
One of the udev rules files appears to be untranslated:
./thunderbolt-tools_0.9.3-1_amd64/lib/udev/rules.d/tbtacl.rules:
# Thunderbolt udev rules for ACL (device auto approval)
SUBSYSTEM=="thunderbolt" ENV{DEVTYPE}=="thunderbolt_device" ACTION=="add"
ATTR{authorized}=="0" RUN+="@UDEV_BIN_DIR@/
I reviewed thunderbolt-tools version 0.9.3-1 as checked into bionic. This
shouldn't be considered a full security audit but rather a quick gauge of
maintainability.
- No CVEs in our database
- thunderbolt-tools provides a simple interface to authorize thunderbolt
devices that are being added to
I think the real fix is easier... This still has two copies of the file:
sarnold@hunt:/tmp/bolt$ ar x thunderbolt-tools_0.9.3-2_amd64.deb
sarnold@hunt:/tmp/bolt$ tar tf data.tar.xz
./
./lib/
./lib/udev/
./lib/udev/rules.d/
./lib/udev/rules.d/60-tbtacl.rules
./lib/udev/rules.d/60-tbtxdomain.rules
On Sat, Apr 07, 2018 at 10:09:29PM -, Yehezkel Bernat wrote:
> I'd like to get a bit more details about some of the comments to
> understand what steps I can take to improve it. Please let me know if
> you prefer to take this discussion to another medium.
Hello Yehezkel,
> > - udev rules -- a
On Tue, Apr 10, 2018 at 05:12:22AM -, Mario Limonciello wrote:
> > Did I get the interpretation of these rules correct?
> At a glance it looks like what you thought, but dig a little deeper.
> If it's not in the ACL it exits.
Ah! Thanks Mario!
--
You received this bug notification because yo
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/16
** Also affects: glibc (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/401202
Title:
Resolver ignores ndots option
Status in glibc pa
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-390 in Ubuntu.
https://bugs.launchpad.net/bugs/1787433
Title:
package nvidia-utils-390 (not installed) f
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1788563
Title:
L1TF mitigation not effective
Status in linux package
Public bug reported:
Hello, my audit logs are currently filled with messages from Firefox's
seccomp filters which looks like this:
type=SECCOMP msg=audit(1527882167.659:223316): auid=1000 uid=1000 gid=1000
ses=1 pid=28901 comm=57656220436F6E74656E74
exe=2F7573722F6C69622F66697265666F782F6669726
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1766857
Title:
[Hyper-V] KVP daemon fails to start
Status in linux package in U
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763384
Title:
Null-Pointer Deference in hfs.ko (Linux 4.15.0-15.16)
Excellent, thanks Sergej.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1763403
Title:
Multiple Memory Corruption I
This looks relevant, I hope this helps:
/usr/sbin/grub-mkconfig: 13: /etc/default/grub: psmouse.resolution=1200:
not found
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed t
This sounds like https://usn.ubuntu.com/usn/usn-3718-1
Please re-open if this updated kernel doesn't fix the issue.
Thanks
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because
Hello,
This is probably not possible to fix -- it was a widely accepted
criticism of the POSIX draft capabilities, and Linux implemented
capabilities, that it is an impossible task to prevent individual
capability grants from 'bleeding' over into privileges that correspond
to other capabilities.
Public bug reported:
Hello,
I'm seeing substantially slower read performance from an ssd pool than I
expected.
I have two pools on this computer; one ('fst') is four sata ssds, the
other ('srv') is nine spinning metal drives.
With a long-running ripgrep process on the fst pool, performance star
sudo perf top output:
Samples: 1M of event 'cycles:ppp', Event count (approx.): 476944550835
Overhead Shared Object Symbol
24.93% [kernel] [k] _raw_spin_lock
21.52% [kernel] [k] zfs_prune
17.29% [kernel] [k] d_prune_aliases
And top(1) output after dropping caches:
top - 18:42:09 up 70 days, 18:18, 3 users, load average: 17.33, 22.19, 27.87
Tasks: 826 total, 2 running, 644 sleeping, 0 stopped, 0 zombie
%Cpu(s): 1.2 us, 22.9 sy, 0.0 ni, 63.3 id, 11.5 wa, 0.0 hi, 1.1 si, 0.0 st
GiB Mem : 125.805 total, 3
Debugging by voodoo dolls: I made a wild guess that stumbling over
cached objects was getting in the way. I dropped caches with:
echo 3 > /proc/sys/vm/drop_caches
and immediately the read iops to the pool skyrocketed and the ripgrep
output sure looks like it's going WAY faster:
Oh yes, and perf top output after dropping caches:
Samples: 11M of event 'cycles:ppp', Event count (approx.): 648517108833
Overhead Shared Object Symbol
19.77% [kernel][k] zfs_prune
18.96% [kernel][k] _raw_spin_lo
This is also repeatable on my pool of slower spinning metal disks, srv:
top - 22:59:43 up 71 days, 22:35, 3 users, load average: 18.88, 17.98, 10.68
Tasks: 804 total, 20 running, 605 sleeping, 0 stopped, 0 zombie
%Cpu(s): 0.1 us, 58.0 sy, 0.0 ni, 41.9 id, 0.0 wa, 0.0 hi, 0.0 si, 0.0 s
echo 1 > /proc/sys/vm/drop_caches # still slow
echo 2 > /proc/sys/vm/drop_caches # goes faster
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1814983
Title:
zfs poor sustai
Use CVE-2018-18653.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18653
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1798863
Title:
18.10 kernel does not appear t
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for the report, I'm marking this public so the kernel team can
more easily work with it.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://b
*** This bug is a security vulnerability ***
Public security bug reported:
Hello,
I suggest we disable a.out support in our kernels. It's quite old,
likely has security problems, and unlikely to have users.
Here's a hand-filtered list of kernel configs that were returned from this list:
grep
Setting to confirmed to placate the bot. Thanks.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1818552
Title:
disab
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/177
** Information type changed from Private Security to Public
** Also affects: nvidia-graphics-drivers-340 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-390 in U
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-384 in Ubuntu.
https://bugs.launchpad.net/bugs/1810092
Title:
nvidia-384 384.130-0ubuntu0.16.04.1: nvidi
Hello Andrea, thanks for looking into my problem.
# zpool status -v
pool: fst
state: ONLINE
scan: scrub repaired 0B in 2h37m with 0 errors on Sun Nov 8 03:01:53 2020
config:
NAMESTATE READ WRITE CKSUM
fst ONLINE 0
Picking the previous bad object (which I'm pretty sure should still be
intact):
$ modinfo zfs | grep ^version
version:0.7.5-1ubuntu16.10+lp1861235
$ uname -a
Linux wopr 4.15.0-126-generic #129-Ubuntu SMP Mon Nov 23 18:53:38 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ sudo zdb - srv/back
Here's smartctl output on the disks in the pool. It's a bit hard to
summarize nine drives of smartctl output but nothing stood out as
interesting to me.
My journals only go back a few months so they wouldn't show any IO
errors at the time of this problem being introduced, but this currently
gives
The scrub has finished, no new errors in zpool status -v, dmesg is
filled with debugging messages, I hope something is useful. :)
Thanks
$ uname -a
Linux wopr 4.15.0-126-generic #129-Ubuntu SMP Mon Nov 23 18:53:38 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
$ modinfo zfs | grep -i version
version:
My guess is the next step is trying the zfs send | ssh zfs recv commands
that were causing the VERIFY(size != 0) failed message with traces. I've
always been uneasy with the 'main' error coming only with a recv
operation, relying upon two systems to recreate a bug is iffy at best.
And since it wedg
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-455 in Ubuntu.
https://bugs.launchpad.net/bugs/1907852
Title:
package libnvidia-gl-455 (not installed) f
Hello Sanjay, from your logs:
diversion of /usr/lib/i386-linux-gnu/libGL.so.1 to /usr/lib/i386-linux-
gnu/libGL.so.1.distrib by nvidia-340
I don't know nvidia drivers well, but this looks a bit like an older
driver is still installed while trying to install a new one. Does this
sound familiar?
T
Hello Eko, my guess is the process that had the debconf database locked
was asking you to enroll a new secure boot key. By killing it rather
than configuring a key, you can't install self-built kernel modules.
I suggest looking at the "Manual Method" section of
https://wiki.ubuntu.com/UEFI/SecureB
Is it interesting that I'm seeing both 19 and 20 in my dmesg?
[1229822.406130] dmu_object_free: object = 0x266d2904, dn->dn_type = 20
[1229823.980888] dmu_object_free: object = 0x266d0d5a, dn->dn_type = 20
[1229823.994690] dmu_object_free: object = 0x266d0d5b, dn->dn_type = 20
[1229823.998123] dmu
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take include
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1897792
Title:
package bcmwl-kernel-source 6.30.223.30+bdcom-0ubuntu1~ppa1 fail
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1897982
Title:
bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu5 (amd64 binary) i
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1898351
Title:
Wifi does not show up or work
Status in linux package in Ubuntu
This appears to be: https://people.canonical.com/~ubuntu-
security/cve/2020/CVE-2020-25643.html
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25643
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public Se
These cryptsetup warnings and errors are indeed due to my zfs use, I see
them several times a month for the life of the machine, roughly the last
ten months. Don't let the 'error' there scare you, as it did me. I don't
understand them, but they also don't appear to have any consequences.
The probl
Hello Dexuan, wonderful, thanks;
Eric's proposed patch confuses me on one point:
- if (rcu_access_pointer(sk->sk_filter) &&
- udp_lib_checksum_complete(skb))
+ if (udp_lib_checksum_complete(skb))
goto csum_error;
Do you know why the rcu_access_pointer() call
On Wed, Oct 21, 2020 at 10:32:14PM -, Peter Burkholder wrote:
> Is there an approval/publication step that y'alls still need to take?
Yes, there is; it's been a busy, uh, three months give or take.
Thanks for the friendly reminder. :)
--
You received this bug notification because you are a
Hi Colin, thanks so much for giving this another look. I don't see any
references to trying different zfs_arc_meta_limit* settings here!
I raised zfs_arc_meta_limit_percent from the default 75 to 95 and my
system has been running this ripgrep for four hours without falling to
pieces.
I think we c
Hopefully helpful, hopefully this isn't a red herring, but it sure seems
suspicious timing:
[ 113.249890] rfkill: input handler disabled
[ 242.742392] INFO: task kworker/u16:3:110 blocked for more than 120 seconds.
[ 242.742399] Not tainted 5.4.0-58-generic #64-Ubuntu
[ 242.742401] "echo
Hello, was this perhaps within a container that might have just had the
host filesystem passed in without write access?
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to li
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1908768
Title:
TouchPad don't response
Status in linux package in Ubuntu:
Co
I was reminded of this bug earlier today -- Andrea, Sultan, thanks so
much for fixing my issues. I've been happily running along for months
now. :) Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launc
Hello Trinity,
Quite often, running pavucontrol is enough to see what needs to be
changed to make audio output work correctly.
I hope this helps.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Package
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1887190
Title:
MSFT Touchpad not working on Lenovo Legion-5 15ARH05
Status in P
Hopefully helpful:
[ 45.069078] NVRM: API mismatch: the client has the version 440.95.01, but
NVRM: this kernel module has the version 440.100. Please
NVRM: make sure that this kernel module and all NVIDIA driver
NVRM: components have the same versio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1905150
Title:
package linux-image-5.4.0-55-generic 5.4.0-55.61 failed to
ins
These lines look like the important ones from the logs:
/boot/vmlinuz-4.15.0-1024-oem.efi.signed is signed, but using an unknown key:
Subject: CN = PPA canonical-kernel-team ppa
E: Your kernels are not signed with a key known to your firmware. This system
will fail to boot in a Secure Boo
New threads at
http://marc.info/?l=linux-netdev&m=149251041420195&w=2
http://marc.info/?l=linux-netdev&m=149251041420194&w=2
Does this issue have a CVE number or numbers yet?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
Hi Fabian, Ubuntu is currently not assigning CVE numbers; MITRE can be
best contacted at https://cveform.mitre.org/
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1682368
Title:
There's a lot in this bug report:
- It appears a bluez snap is in use? that'll complicate the distro-provided
bluez
- It appears a bluez package is in use? that'll complicate the snap-provided
bluez
- It appears an i386 build of bluez is reporting errors, but the system
otherwise reports amd64
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1733038
Title:
freeze
Status in linux package in Ubuntu:
New
Bug descriptio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm hitting 'confirmed' on this one to quiet the bots, it looks entirely
too familiar to bug 1734147 (Lenovo hardware) to be coincidence.
Please do run the apport-collect 1736827 command if you can.
Thanks
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Summary changed:
Hello, your logs have more complaints about firmware errors than I'm
accustomed to seeing. Wild guess, maybe try the firmware test suite
package 'fwts' or 'fwts-frontend' on your system. Maybe your hardware
vendor has updated BIOS you can try?
Thanks
** Information type changed from Private Secur
Hello, your logs show more errors than I'm accustomed to seeing;
consider running fwts or fwts-frontend, or looking for firmware updates
from your system vendor.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of
This appears to be duplicating functionality from bolt:
https://bugs.launchpad.net/ubuntu/+source/bolt/+bug/1752056
Are both packages truly desired?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to thunderbolt-tools in Ubuntu.
Matc
Will, can you provide some advice?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to thunderbolt-tools in Ubuntu.
Matching subscriptions: Kernel Packages
https://bugs.launchpad.net/bugs/1748157
Title:
[MIR] thunderbolt-tools
Sta
Mario, thanks for the feedback. I'll try to get to the Intel Thunderbolt
tools in time for the Bionic release.
Yehezkel, any chance you can communicate your desire to upstream Bolt
folks? The github issues for Bolt appears to have been disabled.
Thanks
--
You received this bug notification beca
Hello, there's a strong chance this is hardware failure:
[ 2333.849914] print_req_error: I/O error, dev loop0, sector 30237272
[ 2333.849931] EXT4-fs (loop0): Delayed block allocation failed for inode
130978 at logical offset 1101 with max blocks 3 with error 5
[ 2333.849935] EXT4-fs (loop0): Thi
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-firmware in Ubuntu.
https://bugs.launchpad.net/bugs/1749277
Title:
[nfp] NIC stops transmitting for small MSS values when
Just in case 32 megs is too much to download but someone needs the full
logs, here's the logs compressed with xz.
** Attachment added: "kern.log.xz"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1749746/+attachment/5059369/+files/kern.log.xz
** Information type changed from Private Sec
*** This bug is a duplicate of bug 1742364 ***
https://bugs.launchpad.net/bugs/1742364
** This bug has been marked a duplicate of bug 1742364
Updated microcode for Spectre fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-f
The error message is:
This kernel does not support a non-PAE CPU.
This page https://help.ubuntu.com/community/PAE suggests that you might
have luck using the 'forcepae' kernel command line flag in your
/etc/default/grub and rebuilding the grub menu. (I believe sudo dpkg-
reconfigure grub-pc is th
101 - 200 of 632 matches
Mail list logo