** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in: kernel-sr
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in: kernel-s
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
** Changed in: kernel-sr
** Changed in: kernel-sru-workflow/verification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741651
Title:
linux-kvm: 4.4.0-1015.20 -proposed tracker
T
** Package changed: linux-meta (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1738259
Title:
need to ensure microcode updates are available to all bare-metal
installs of
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: compiz (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1736219
Title:
com
** Tags added: bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1726156
Title:
gnome-shell-portal-helper crashed with SIGABRT in
g_assertion_message() from g_assertion_message_expr("assertion
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: gnome-shell (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1726156
Title:
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: compiz (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1668686
Title:
com
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: compiz (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1564128
Title:
com
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
Statu
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
Statu
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741653
Title:
linux-snapdragon: 4.4.0-1084.89 -proposed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
Statu
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
Statu
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
** Changed in: kernel-sru-workflow/security-signoff
Statu
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm: Disable PCID on 32-bit kernels
linux (4.4.0-107.130) xenial; urgency=low
* linux: 4.4.0-
*** This bug is a duplicate of bug 1741727 ***
https://bugs.launchpad.net/bugs/1741727
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm:
This bug was fixed in the package linux-aws - 4.4.0-1047.56
---
linux-aws (4.4.0-1047.56) xenial; urgency=low
* linux-aws: 4.4.0-1047.56 -proposed tracker (LP: #1741646)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
- R
*** This bug is a duplicate of bug 1741727 ***
https://bugs.launchpad.net/bugs/1741727
This bug was fixed in the package linux - 4.4.0-108.131
---
linux (4.4.0-108.131) xenial; urgency=low
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-2017-5754
- x86/mm:
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741644
Title:
linux-aws: 4.4.0-1009.9 -proposed tracker
Acer E3-111-290X
only boot from cd drive and only ubuntu cd 17.10
can install ubuntu 17.10 but after finishing install and reboot list only cd
drive
sudo efibootmgr -v
BootCurrent:
Timeout: 0 seconds
BootOrder: 2001,2002,2003
Boot* USB CDROM: TSSTcorpCDDVDW SE-208DB
PciRoot(0x0)/Pci
I've followed the steps Chris gave above, and have confirmed that the
vagrant user is the default via SSH. The ubuntu user also exists, and
is in the appropriate groups.
** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial
--
** No longer affects: linux (Ubuntu Trusty)
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741934
Title:
Kernel trace with
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: Confirmed => Invalid
--
You received this bu
Thanks for the clarification!
** Changed in: gnome-software (Ubuntu)
Importance: Undecided => Medium
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741588
Title:
Categories in Ubuntu Software do
** Summary changed:
- linux-lts-xenial: -proposed tracker
+ linux-lts-xenial: 4.4.0-109.132~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you ar
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: Incomplete => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: Fix Released => Invalid
** Changed in: kernel-sru-workflow/pr
PPA builders are unfortunately still offline because of SPECTRE :(
One quick workaround for this issue is to downgrade to stock 16.04
xserver and install x-x-v-intel:
sudo apt install --install-recommends xserver-xorg xserver-xorg-video-
all xserver-xorg-input-all xserver-xorg-video-intel
that s
since upgrading to Ubuntu 17.04, I'm unable to reproduce the crash any
longer FYI.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1739525
Title:
gnome-shell segfault at e8 in libgdk-3.so.0
To manage
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1738259
and then change the status of the bug to 'Confirmed'.
If, due to the nature
** Package changed: linux (Ubuntu Bionic) => linux-meta (Ubuntu Bionic)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1738259
Title:
need to ensure microcode updates are available to all bare-metal
Public bug reported:
!
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: findutils (not installed)
ProcVersionSignature: Ubuntu 4.10.0-35.39~16.04.1-generic 4.10.17
Uname: Linux 4.10.0-35-generic x86_64
ApportVersion: 2.20.1-0ubuntu2.10
Architecture: amd64
Date: Wed Jan 3 18:28:17 2018
E
** Tags removed: verification-needed verification-needed-xenial
** Tags added: verification-done verification-done-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1613184
Title:
method mirror b
Public bug reported:
Debian commit [60fb7e6] in glibc first introduced in
"debian/2.25-0experimental3-25-g60fb7e6", has the effect to create a
FTBFS situation for "cross-toolchain-base" on Bionic which uses glibc
2.26.
In fact after the above commit, the patch "debian/patches/glibc/ubuntu
/no-gdb
bug still present in 17.10.
relevant ps fauxw output here:
root 11199 0.0 0.0 88768 4940 pts/1S+ 21:31 0:00 | | \_
sudo apt install network-manager-openvpn
root 11200 0.3 0.4 128036 75684 pts/1S+ 21:31 0:00 | |
\_ apt install network-manager-openvpn
r
@Mika
After seeing the logs in your post I checked the logs on my Lenovo Yoga (20C0)
for similar entries as yours:
[ 19.724288] intel-spi intel-spi: wrote SSFSTS_CTL=0x0045020c
[ 19.724301] intel-spi intel-spi: wrote FDATA(0)=00 00
[ 19.724304] intel-spi intel-spi: wrote SSFSTS_CTL=0x0041360c
[ 1
** Description changed:
Debian commit [60fb7e6] in glibc first introduced in
"debian/2.25-0experimental3-25-g60fb7e6", has the effect to create a
FTBFS situation for "cross-toolchain-base" on Bionic which uses glibc
2.26.
In fact after the above commit, the patch "debian/patches/glibc
This bug was fixed in the package mariadb-5.5 - 5.5.58-1ubuntu0.14.04.1
---
mariadb-5.5 (5.5.58-1ubuntu0.14.04.1) trusty-security; urgency=high
* SECURITY UPDATE: New upstream release 5.5.58. Includes fixes for
the following security vulnerabilities (LP: #1740608):
- CVE-201
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Public bug reported:
error occured during normal system update with the standard Software-Update
Tool.
Havn't done anything unusual during Update.
Kodi 17.6 was up and waiting to start something in Main-Menue on 3rd virtual
Desktop during Update.
Going to reboot the system after this Kernel Up
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-trusty
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-xenial
** Tags removed: block-proposed
--
You received this bug notification because you
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: network-manager (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735798
Tit
** Changed in: linux-meta (Ubuntu Xenial)
Status: Incomplete => Triaged
** Changed in: linux-meta (Ubuntu Bionic)
Status: Incomplete => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
This bug was fixed in the package mariadb-5.5 - 5.5.58-1ubuntu0.14.04.1
---
mariadb-5.5 (5.5.58-1ubuntu0.14.04.1) trusty-security; urgency=high
* SECURITY UPDATE: New upstream release 5.5.58. Includes fixes for
the following security vulnerabilities (LP: #1740608):
- CVE-201
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: openconnect (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1735798
Title:
It certainly fixes the bug for me - stunnel4 process was up until the
server was rebooted (several months) versus crashing after a day or two.
However, as the author of the patch I'm not sure that I should be the
one to verify it...
--
You received this bug notification because you are a member
*** This bug is a duplicate of bug 1441460 ***
https://bugs.launchpad.net/bugs/1441460
** This bug has been marked a duplicate of bug 1441460
[xubuntu] Failing to sleep after inactivity - power manager error?
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
Marked xenial as verified, because, while the problem itself does not
exist, it still fixes the same underlying bug from an API perspective.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1613184
Title
Public bug reported:
First screen that reported say systems was an AMD, but I have an Intel
i5.
When I go the task bar, the display flickers, and it is difficult to
start programs. once they are started for example firefox, I can use
firefox without issue.
I think the upload was attached but I
This bug was fixed in the package linux-snapdragon - 4.4.0-1084.89
---
linux-snapdragon (4.4.0-1084.89) xenial; urgency=low
* linux-snapdragon: 4.4.0-1084.89 -proposed tracker (LP: #1741653)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
*
** Description changed:
According to http://nvidia.custhelp.com/app/answers/detail/a_id/4611 the
NVIDIA driver needs to be updated to 384.111 to fix the Spectre
vulnerabilities in the NVIDIA kernel modules (along with the upcoming
Kernel security patches).
I think this update should b
** Description changed:
Debian commit [60fb7e6] in glibc first introduced in
"debian/2.25-0experimental3-25-g60fb7e6", has the effect to create a
FTBFS situation for "cross-toolchain-base" on Bionic which uses glibc
2.26.
In fact after the above commit, the patch "debian/patches/glibc
This bug was fixed in the package linux-snapdragon - 4.4.0-1084.89
---
linux-snapdragon (4.4.0-1084.89) xenial; urgency=low
* linux-snapdragon: 4.4.0-1084.89 -proposed tracker (LP: #1741653)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
*
This bug was fixed in the package linux-raspi2 - 4.4.0-1082.90
---
linux-raspi2 (4.4.0-1082.90) xenial; urgency=low
* linux-raspi2: 4.4.0-1082.90 -proposed tracker (LP: #1741652)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-575
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1015.20
---
linux-kvm (4.4.0-1015.20) xenial; urgency=low
* linux-kvm: 4.4.0-1015.20 -proposed tracker (LP: #1741651)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
- R
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-raspi2 - 4.4.0-1082.90
---
linux-raspi2 (4.4.0-1082.90) xenial; urgency=low
* linux-raspi2: 4.4.0-1082.90 -proposed tracker (LP: #1741652)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-575
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the assoc
I have the same issue with latest the candidate kernel required to fix Meltdown
on Xenial.
linux-hwe-edge 4.13.0-25.29~16.04.1 from ppa:canonical-kernel-team/pti
Because "the Rolling HWE kernel for Ubuntu 16.04 will go to 4.13 early,
instead of also fixing 4.10 HWE kernel" I cannot stay on 4.10 a
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
**
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1015.20
---
linux-kvm (4.4.0-1015.20) xenial; urgency=low
* linux-kvm: 4.4.0-1015.20 -proposed tracker (LP: #1741651)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
- R
Public bug reported:
I have an (old) hypervisor with an Intel Xeon E3110 (Core 2 Duo E8400
rebranded) that is unable to boot 2 of my 17 KVM guests. The guests that
boot fine are all Xenial (running 4.4.0-104.127). The 2 that do not work
are: a Trusty VM (3.13.0-137.186) and an OpenBSD 6.2 VM (late
This bug was fixed in the package linux-aws - 4.4.0-1009.9
---
linux-aws (4.4.0-1009.9) trusty; urgency=low
* linux-aws: 4.4.0-1009.9 -proposed tracker (LP: #1741644)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
- Reve
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-lts-xenial -
4.4.0-108.131~14.04.1
---
linux-lts-xenial (4.4.0-108.131~14.04.1) trusty; urgency=low
* linux-lts-xenial: 4.4.0-108.131~14.04.1 -proposed tracker (LP:
#1741729)
* linux: 4.4.0-108.131 -proposed tracker (LP: #1741727)
* CVE-
** Summary changed:
- linux-aws: -proposed tracker
+ linux-aws: 4.4.0-1048.57 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package-meta
Assignee: Canonical Kernel Team (canonical-kerne
Computer: Dell XPS 1 9360
Works in Wayland, both Gnome and Ubuntu.
Does not work in Xorg, both Gnome and Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1706357
Title:
Natural scrolling in G
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Steve
Langasek (vorlon)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.4.0-1009.9
---
linux-aws (4.4.0-1009.9) trusty; urgency=low
* linux-aws: 4.4.0-1009.9 -proposed tracker (LP: #1741644)
[ Ubuntu: 4.4.0-107.130 ]
* linux: 4.4.0-107.130 -proposed tracker (LP: #1741643)
* CVE-2017-5754
- Reve
No. I see it in 17.10 as of today (2018-01-09). I cannot log intro Unity
because of this bug. Right after login, indicator-datetime-service" eats
all of my CPU, breaks, starts again, eats all of my CPU, breaks, starts
again, eats all of my CPU, breaks, starts again, eats all of my CPU,
breaks, star
*** This bug is a duplicate of bug 1706097 ***
https://bugs.launchpad.net/bugs/1706097
Thank you for taking the time to report this crash and helping to make
this software better. This particular crash has already been reported
and is a duplicate of bug #1706097, so is being marked as such.
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/verific
** Bug watch added: www.lyx.org/trac/ #10973
http://www.lyx.org/trac/ticket/10973
** Also affects: lyx via
http://www.lyx.org/trac/ticket/10973
Importance: Unknown
Status: Unknown
** Changed in: lyx (Ubuntu)
Status: New => Invalid
--
You received this bug notification bec
** Summary changed:
- linux-kvm: -proposed tracker
+ linux-kvm: 4.4.0-1016.21 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: New => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-team) =>
Package from virtualbox.org cannot be used as the latest 5.0 build is
5.0.40 and even this needs to be patched as described in #1729568 to
build the kernel modules.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1742286
Title:
[regression] Xenial host with 4.4.0-108.131
*** This bug is a duplicate of bug 1735594 ***
https://bugs.launchpad.net/bugs/1735594
no need to debug anymore, the issue is well known by now and 1735594 has
more information, you should have received my emails about it
--
You received this bug notification because you are a member of Ubun
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Right after reporting this and 3 other bugs all at the same time, I
rebooted and it got cought in a loop right before the login and I had to
reinstall.
Thank you for working on these issues, your way ahead of me.
James
On Tue, Jan 9, 2018 at 5:17 AM, Jacques Koch <1741...@bugs.launchpad.net>
wrot
*** This bug is a duplicate of bug 1735594 ***
https://bugs.launchpad.net/bugs/1735594
not emails but replies/edits to that bug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1741925
Title:
Unit
Right after reporting this and 3 other bugs all at the same time, I
rebooted and it got cought in a loop right before the login and I had to
reinstall.
Thank you for working on these issues, your way ahead of me.
James
On Tue, Jan 9, 2018 at 7:27 AM, Videonauth <1741...@bugs.launchpad.net>
wrote:
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Released
** Description changed:
This bug is for tracking the upload package. This
bug will contain status
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Description changed:
This bug is for tra
The package has been published and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sr
601 - 700 of 1070 matches
Mail list logo