It looks like you're still working with rincebrain to figure out the
root cause; please do update this if you come to a conclusion. (On the
one hand, I'm optimistic, he's really good at this stuff. On the other
hand, the encryption stuff feels more brittle than than usual.)
Thanks
** Changed in:
xnox, rincebrain came to the conclusion that the conditions for this bug
have existed since 0.6.2:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30dc73 and
robn thinks the conditions for this bug was introduced in 2006:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30d
There's over 2k instances of errors like this in the terminal log:
dpkg: 경고: files list file for package 'libctf0:amd64' missing; assuming
package has no files currently installed
This is not a happy installation. I recommend a fresh install when
convenient.
As for the prompt, the history log su
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello FACELLO, a few thoughts:
This bug is specifically due to these log messages. Try installing the
packages that the error messages have identified:
make -j12 KERNELRELEASE=6.2.0-37-generic all
INCLUDEDIR=/lib/modules/6.2.0-37-generic/build/include
KVERSION=6.2.0-37-generic DKMS_BUILD=1...(b
Microsoft has implemented an IPSec stack:
https://learn.microsoft.com/en-us/windows/win32/fwp/ipsec-
configuration#how-to-use-wfp-to-configure-ipsec-policies
"The Microsoft implementation of IPsec uses Windows Filtering Platform
to setup IPsec policies."
This page is a bit thin on which applicati
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of K
@Tobias, that bug is 15 years old. Perhaps you meant another one?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2054296
Title:
Don't restrict to linux-laptop
Status in protection-domain
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Colin, I'm not sure:
- I'm now on 5.4.0-17-generic to try to debug a different issue
- I believe I've fixed all the datasets that were failing to mount at
boot time due to unexpected files or directories in the mountpoints
- I don't know why zfs was segfaulting in the first place: it was m
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953520
Title:
NULL pointer dereference in tcp_splice_read
Status in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953514
Title:
BUG_ON(!PagePrivate(page))
Status in linux package in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953518
Title:
CPU stuck
Status in linux package in Ubuntu:
Confirm
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1964827
Title:
zfs-linux upstream at 2.1.4, jammy has 2.1.2
Status in zfs-l
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm sorry, this doesn't make enough sense for me to know where to re-
assign this. I suggest giving a lot more details about what applications
you're using, etc.
Thanks
** Information type changed from Private Security to Public
** Package changed: linux (Ubuntu) => ubuntu
--
You received this
Hello Luís, we released a fix for this CVE for linux-azure-fde on 22
February 2022 in USN-5294-2:
https://ubuntu.com/security/notices/USN-5294-2
The linux-azure-fde source package is actually just some scripts, and
our kernel update tooling shows incorrect results on the webpage as a
result. Hopef
** Package changed: vlc (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1958787
Title:
CRASH - [drm
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Sounds good, thanks:
[0.00] Linux version 5.11.0-49-generic (buildd@lcy02-amd64-054)
(gcc (Ubuntu 10.3.0-1ubuntu1) 10.3.0, GNU ld (GNU Binutils for Ubuntu)
2.36.1) #55-Ubuntu SMP Wed Jan 12 17:36:34 UTC 2022 (Ubuntu
5.11.0-49.55-generic 5.11.22)
btw, there were a bunch of memory allocati
It looks like I lost track of this browser tab a lot longer than I
expected.
Thanks Hangyu Hua for the fixes! :)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
** Changed in: linux-oem-5.14 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1976181
Title:
CVE-2021-28711 and CVE-2021-28712
Status in
Hello Alberto, any chance for a fix for this issue? Users are still
finding this issue. In #ubuntu, 25 December 2021:
Sat 25 00:12:58 < sem> if you're curious this is the dryrun:
https://pastebin.ubuntu.com/p/N7kP5Z4mRj/
Sat 25 00:15:32 < Bashing-om> sem: I do want to know - looking ^ ,
Sat 25 00
Nguyen, do you have any antivirus tools installed? That's the usual
cause of errors like this.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1956585
Title:
OOB write on BPF_RING
Yes, hopefully you can do that without resorting to a rescue image.
Booting with `init=/bin/bash` may help if you can't uninstall it gently.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
Linux Mint replaces the kernel; if you're having errors with basic
kernel operations you'll need to seek support from the Mint community.
Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug noti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, the tail end of the dpkg terminal log suggests mesa-amdgpu-vdpau-
drivers might be to blame; I don't see that package on my local mirror,
did this come from outside Ubuntu? If so, you may need to report the
issue there.
Thanks
--
You received this bug notification because you are a member
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1987148
Title:
package linux-image-5.15.0-43-generic 5.15.0-43.
Kernel folks, what's the deal with this message? I thought I deleted my
current kernel occasionally but I can't recall seeing this screen
before.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
http
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988108
Title:
kernal 5.15.0-46 error out of memory when boosting
Status in li
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks Nilson, excellent find on the bugzilla report.
The linked linux-hardening thread makes me think this is 'just' an
undefined-but-safe operation: the sort of thing that's good to fix, in
case a future compiler makes an unsafe optimization, but not likely to
be a cause for concern today.
Than
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Also affects: samba (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
P
I've added a few more packages to the bug; nothing in the various links
suggested to me that anyone has yet identified where the fault lies.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
Hello Hadar, I'm sorry for the trouble.
These have been fixed:
https://ubuntu.com/security/notices/USN-4577-1
https://ubuntu.com/security/notices/USN-4576-1
https://ubuntu.com/security/notices/USN-4578-1
https://ubuntu.com/security/notices/USN-4579-1
https://ubuntu.com/security/notices/
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1926548
Title:
The gatt protocol has out-of-bounds read that leads to
Daniel, are you sure about that fixed-in-5.56 bug tag? I can't spot the
referenced commit in the tarballs 5.55, 5.56, 5.57, 5.58 from:
http://www.bluez.org/
nor in the github sources:
https://github.com/bluez/bluez/blob/master/src/gatt-database.c#L1054
nor the kernel.org sources:
https://git.kern
Wonderful, thanks Daniel!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1926548
Title:
The gatt protocol has out-of-bounds read that leads to information
leakage
Status in Bluez Util
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1937107
Title:
Kernel Oops - unable to handle kernel paging request at
*** This bug is a duplicate of bug 1871794 ***
https://bugs.launchpad.net/bugs/1871794
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1922534
Title:
touch pad of my laptop is not working
Status in linux package i
Thanks Christian, I think you're right, this probably doesn't need a
security review and being centralized in one place will probably be
easier to maintain.
Thanks
** Changed in: libbpf (Ubuntu)
Status: New => Fix Committed
** Changed in: libbpf (Ubuntu)
Assignee: Seth
*** This bug is a security vulnerability ***
Public security bug reported:
Hello, it looks like CONFIG_RANDOMIZE_BASE is not set in our ppc64el
kernel configurations, based on running this in an rsync clone of
kernel.ubuntu.com::kernel-ppa-config/ :
grep CONFIG_RANDOMIZE_BASE $(find . -iname '*p
I added the linux source package to this bug because I've heard this
commit addresses the issue:
https://github.com/gregkh/linux/commit/099340d3e758cca06a82bf5dcff8b9a8acbdcb0a
Thanks
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notificat
Re test rebuilds, that's certainly the intention, but there are
occasional problems:
https://launchpad.net/bugs/1910555
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1910709
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910503 (virtualbox,
probably not in scop
I'm sorry I lost track of this bug.
fatrace is still acting strangely for me:
$ uname -a
Linux millbarge 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021
x86_64 x86_64 x86_64 GNU/Linux
$ apt policy fatrace
fatrace:
Installed: 0.13-2
Candidate: 0.13-2
Version table:
*** 0.13-2
Aha, cool, thanks Mike; I started with xxd myself, and got stuff that
looked enough like ELF objects that I was prepared to trust file's
assessment of them as ELF objects.
My machine with non-zero content at the end:
Linux hunt 4.15.0-201-generic #212-Ubuntu SMP Mon Nov 28 11:29:59 UTC 2022
x86_6
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2041951
Title:
package linux-tools-common 5.15.0-86.96 failed to install/upgrad
Please use ubuntu-bug to file bug reports, that will include a lot more
useful information. Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Package changed: linux (Ubuntu) => ubuntu
--
You received this bug n
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2003588
Title:
CVE 2022-4378 fix is in Kinetic, needed on Lunar
Statu
Hello Charles, the development release isn't intended for production
use; a lot of the things common to security updates in supported
releases just won't be present for the development release. It'll
eventually get a new kernel package based on a new upstream series and
we'll address whatever remai
** Information type changed from Private Security to Public
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lowlatency in Ubuntu.
https://bugs.launchpad.net
Thanks Dann, please use CVE-2023-0881 for this issue.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0881
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bug
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2007840
Title:
Cheese camera needs update
Status in linux package in Ubuntu:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-restricted-modules-oracle in
Ubuntu.
https://bugs.launchpad.net/bugs/2019956
Title:
package linux-modules-nvidia-515-oracl
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020091
Title:
package linux-headers-6.2.0-20-generic 6.2.0-20.20 failed to
i
I'm very confused about this report, hopefully you can clarify a few
things:
Package: linux-headers-6.2.0-20-generic 6.2.0-20.20
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.19.0-40-generic
root=UUID=3757a187-5a56-49cb-b5b3-1ee6159919aa ro quiet splash vt.handoff=7
Setting up linux-image-6.2.0
Public bug reported:
Hello, I'm trying to create a new zfs pool using the special allocation
vdevs and I get an error message that doesn't make sense to me:
cannot create 'newsrv': invalid 'special_small_blocks=262144' property:
must be zero or a power of 2 from 512B to 128K
$ echo "2 ^ 18" | bc
Ah, I figured out what's going on: the upper limit of
special_small_blocks is checked against the currently value of
recordsize. But, the pool doesn't actually have a recordsize set at this
point, because the pool doesn't even exist. So, the setting that was
given immediately before on the command
> +ksmd
I'm concerned about this change. Historically, the page-merging code has
allowed cross-VM snooping, including even recovery of GnuPG private
keys: https://eprint.iacr.org/2013/448.pdf
Unless something has changed to mitigate the cross-domain privacy leaks
in ksmd, it ought to be opt-in f
You may wish to try suspend to ram, instead of hibernation; please save
any open work before testing, some systems don't handle suspend to ram
well.
sudo systemctl suspend
Hopefully this just works and suffices for your needs. It's not the same
as hibernation, but might reduce power use enough to
Just a heads-up that SGX has been deprecated by Intel:
https://edc.intel.com/content/www/us/en/design/ipla/software-
development-platforms/client/platforms/alder-lake-desktop/12th-
generation-intel-core-processors-datasheet-volume-1-of-2/004/deprecated-
technologies/
===
The processor has deprec
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993821
Title:
salida ficticia
Status in linux package in Ubuntu:
New
Bug d
Public bug reported:
zdb -b has given me some very long progress estimates:
$ sudo zdb -b fst
[sudo] password for sarnold:
Traversing all blocks to verify nothing leaked ...
loading space map for vdev 0 of 1, metaslab 115 of 116 ...
4.72T completed (2659MB/s) estimated time remaining: 42944189
Heinrich, you might have hit the nail on the head: I'm using only ZFS on
this system. Maybe fatrace thinks zfs doesn't exist, and thus doesn't
bother tracing it -- that would explain why the only fatrace output I
get on this computer is on squashfs mounts.
A quick test on a Bionic system with mixe
** Summary changed:
- no fatrace output in focal
+ fatrace doesn't trace on zfs filesystems
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1861053
Title:
fatrace doesn't trace on zfs fi
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990236
Title:
5.19.0-17.17: kernel NULL pointer dereference, address:
I've been asked to prepare a summary of the current status of this bug:
- there's a grub2 security update that's been published and then pulled:
https://launchpad.net/ubuntu/+source/grub2-unsigned/2.06-2ubuntu10/+publishinghistory
https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/19
Probably a dup of https://bugs.launchpad.net/ubuntu/+source/linux-
aws-5.13/+bug/1977919
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-gcp-5.13 in Ubuntu.
** Package changed: ubuntu-release-upgrader (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1981185
Title:
soft lockup -CPU#11 struck for 186s!
Status in linux
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977699
Title:
zfs icp has deselected all optimized aes & gcm i
apport information
** Tags added: apport-collected
** Description changed:
Hello, twice recently my 20.04 LTS laptop in a docking station was very
unhappy after leaving it unattended overnight:
- the external monitor did not wake from dpms sleep when pressing keys on
either the externa
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827305/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2083638
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827307/+files/acpidump.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/20
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827306/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bug
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827301/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.l
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827302/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "PciMultimedia.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827299/+files/PciMultimedia.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.n
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827303/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827304/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2083638
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827300/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/b
apport information
** Attachment added: "Card0.Codecs.codec.2.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827290/+files/Card0.Codecs.codec.2.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
apport information
** Attachment added: "AplayDevices.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827285/+files/AplayDevices.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Card2.Amixer.values.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827292/+files/Card2.Amixer.values.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827293/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827295/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/20
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827297/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2083
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827298/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2083
apport information
** Attachment added: "ArecordDevices.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827286/+files/ArecordDevices.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827287/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2083638
Ti
apport information
** Attachment added: "Card0.Codecs.codec.0.txt"
https://bugs.launchpad.net/bugs/2083638/+attachment/5827289/+files/Card0.Codecs.codec.0.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bu
501 - 600 of 632 matches
Mail list logo