That is a new bug in 4.13.3
(https://bugzilla.xfce.org/show_bug.cgi?id=15198).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1063140
Title:
Drag and Drop position ignored by xfdesktop
To manage not
** Changed in: linux (Ubuntu Bionic)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1822760
Title:
Bionic: Sync to Xenial (Spectre)
To manage notifications abo
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1822736
Title:
Passwords longer than 255 characters break authentication
To manage
Public bug reported:
Bug report on KDE's bug tracker:
https://bugs.kde.org/show_bug.cgi?id=405920
The desktop is out of focus/flickering, like when a person is trying
very hard to focus.
Here's a video demo, which was from 18.10: https://youtu.be/Gn_dITHQFEs
In Cosmic, the problem occurs after
The binaries themselves are quite large. Using current master
(a057a16c6), and go 1.11.5, snapd is ~20MB, snap is ~15MB in size. I
think it's fair to assume that whenever snapd or snap runs, most of it
ends up in the memory. So calling 'snap refresh' would take up (worst
case) 35MB to start with.
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you ar
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
This bug was fixed in the package linux-aws - 4.4.0-1079.89
---
linux-aws (4.4.0-1079.89) xenial; urgency=medium
* linux-aws: 4.4.0-1079.89 -proposed tracker (LP: #1821726)
* linux-generic should depend on linux-base >=4.1 (LP: #1820419)
- [Packaging] Fix linux-base dependenc
This bug was fixed in the package linux-kvm - 4.4.0-1043.49
---
linux-kvm (4.4.0-1043.49) xenial; urgency=medium
* linux-kvm: 4.4.0-1043.49 -proposed tracker (LP: #1821712)
* linux-generic should depend on linux-base >=4.1 (LP: #1820419)
- [Packaging] Fix linux-base dependenc
This bug was fixed in the package linux-aws - 4.4.0-1040.43
---
linux-aws (4.4.0-1040.43) trusty; urgency=medium
* linux-aws: 4.4.0-1040.43 -proposed tracker (LP: #1819658)
* CONFIG_CIFS_POSIX=y needs to added to trusty/aws kernel config
(LP: #1820158)
- Revert "UBUNTU:
This bug was fixed in the package linux-gcp - 4.18.0-1008.9
---
linux-gcp (4.18.0-1008.9) cosmic; urgency=medium
* linux-gcp: 4.18.0-1008.9 -proposed tracker (LP: #1819620)
* [Packaging] Improve config annotations check on custom kernels
(LP: #1820075)
- [Config] linux-gc
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.4.0-1043.49
---
linux-kvm (4.4.0-1043.49) xenial; urgency=medium
* linux-kvm: 4.4.0-1043.49 -proposed tracker (LP: #1821712)
* linux-generic should depend on linux-base >=4.1 (LP: #1820419)
- [Packaging] Fix linux-base dependenc
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you ar
This bug was fixed in the package linux-azure - 4.15.0-1041.45
---
linux-azure (4.15.0-1041.45) xenial; urgency=medium
* linux-azure: 4.15.0-1041.45 -proposed tracker (LP: #1819713)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* Add CONFIG_NO_HZ_FU
This bug was fixed in the package linux-oracle - 4.15.0-1010.12
---
linux-oracle (4.15.0-1010.12) bionic; urgency=medium
* linux-oracle: 4.15.0-1010.12 -proposed tracker (LP: #1819704)
* hot add VF to net_failover - could not rename interface '8' from 'eth0' to
'ens4': Device
This bug was fixed in the package linux-kvm - 4.15.0-1031.31
---
linux-kvm (4.15.0-1031.31) bionic; urgency=medium
* linux-kvm: 4.15.0-1031.31 -proposed tracker (LP: #1819699)
* Packaging resync (LP: #1786013)
- [Packaging] resync getabis
[ Ubuntu: 4.15.0-47.50 ]
* linu
This bug was fixed in the package linux-kvm - 4.15.0-1031.31
---
linux-kvm (4.15.0-1031.31) bionic; urgency=medium
* linux-kvm: 4.15.0-1031.31 -proposed tracker (LP: #1819699)
* Packaging resync (LP: #1786013)
- [Packaging] resync getabis
[ Ubuntu: 4.15.0-47.50 ]
* linu
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws - 4.15.0-1035.37
---
linux-aws (4.15.0-1035.37) bionic; urgency=medium
* linux-aws: 4.15.0-1035.37 -proposed tracker (LP: #1819694)
[ Ubuntu: 4.15.0-47.50 ]
* linux: 4.15.0-47.50 -proposed tracker (LP: #1819716)
* Packaging resync
This bug was fixed in the package linux-gcp - 4.15.0-1029.31
---
linux-gcp (4.15.0-1029.31) bionic; urgency=medium
* linux-gcp: 4.15.0-1029.31 -proposed tracker (LP: #1819698)
* [Packaging] Allow overlay of config annotations (LP: #1752072)
- [Config] linux-gcp: Replace annot
This bug was fixed in the package linux-aws - 4.15.0-1035.37
---
linux-aws (4.15.0-1035.37) bionic; urgency=medium
* linux-aws: 4.15.0-1035.37 -proposed tracker (LP: #1819694)
[ Ubuntu: 4.15.0-47.50 ]
* linux: 4.15.0-47.50 -proposed tracker (LP: #1819716)
* Packaging resync
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
*** This bug is a duplicate of bug 1821712 ***
https://bugs.launchpad.net/bugs/1821712
This bug was fixed in the package linux-kvm - 4.4.0-1043.49
---
linux-kvm (4.4.0-1043.49) xenial; urgency=medium
* linux-kvm: 4.4.0-1043.49 -proposed tracker (LP: #1821712)
* linux-generic
This bug was fixed in the package linux-aws - 4.4.0-1040.43
---
linux-aws (4.4.0-1040.43) trusty; urgency=medium
* linux-aws: 4.4.0-1040.43 -proposed tracker (LP: #1819658)
* CONFIG_CIFS_POSIX=y needs to added to trusty/aws kernel config
(LP: #1820158)
- Revert "UBUNTU:
*** This bug is a duplicate of bug 1821712 ***
https://bugs.launchpad.net/bugs/1821712
This bug was fixed in the package linux-kvm - 4.4.0-1043.49
---
linux-kvm (4.4.0-1043.49) xenial; urgency=medium
* linux-kvm: 4.4.0-1043.49 -proposed tracker (LP: #1821712)
* linux-generic
This bug was fixed in the package linux-aws - 4.4.0-1040.43
---
linux-aws (4.4.0-1040.43) trusty; urgency=medium
* linux-aws: 4.4.0-1040.43 -proposed tracker (LP: #1819658)
* CONFIG_CIFS_POSIX=y needs to added to trusty/aws kernel config
(LP: #1820158)
- Revert "UBUNTU:
*** This bug is a duplicate of bug 1821726 ***
https://bugs.launchpad.net/bugs/1821726
This bug was fixed in the package linux-aws - 4.4.0-1079.89
---
linux-aws (4.4.0-1079.89) xenial; urgency=medium
* linux-aws: 4.4.0-1079.89 -proposed tracker (LP: #1821726)
* linux-generic
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-kvm - 4.18.0-1009.9
---
linux-kvm (4.18.0-1009.9) cosmic; urgency=medium
* linux-kvm: 4.18.0-1009.9 -proposed tracker (LP: #1819621)
* CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]: disab
This bug was fixed in the package linux-azure - 4.18.0-1014.14
---
linux-azure (4.18.0-1014.14) cosmic; urgency=medium
* linux-azure: 4.18.0-1014.14 -proposed tracker (LP: #1819618)
* PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be se
This bug was fixed in the package linux-gcp - 4.18.0-1008.9
---
linux-gcp (4.18.0-1008.9) cosmic; urgency=medium
* linux-gcp: 4.18.0-1008.9 -proposed tracker (LP: #1819620)
* [Packaging] Improve config annotations check on custom kernels
(LP: #1820075)
- [Config] linux-gc
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
*** This bug is a duplicate of bug 1821726 ***
https://bugs.launchpad.net/bugs/1821726
This bug was fixed in the package linux-aws - 4.4.0-1079.89
---
linux-aws (4.4.0-1079.89) xenial; urgency=medium
* linux-aws: 4.4.0-1079.89 -proposed tracker (LP: #1821726)
* linux-generic
This bug was fixed in the package linux-aws - 4.18.0-1012.14
---
linux-aws (4.18.0-1012.14) cosmic; urgency=medium
* linux-aws: 4.18.0-1012.14 -proposed tracker (LP: #1819614)
[ Ubuntu: 4.18.0-17.18 ]
* linux: 4.18.0-17.18 -proposed tracker (LP: #1819624)
* Packaging resync
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
This bug was fixed in the package linux-gcp - 4.15.0-1029.31
---
linux-gcp (4.15.0-1029.31) bionic; urgency=medium
* linux-gcp: 4.15.0-1029.31 -proposed tracker (LP: #1819698)
* [Packaging] Allow overlay of config annotations (LP: #1752072)
- [Config] linux-gcp: Replace annot
This bug was fixed in the package linux-azure - 4.18.0-1014.14
---
linux-azure (4.18.0-1014.14) cosmic; urgency=medium
* linux-azure: 4.18.0-1014.14 -proposed tracker (LP: #1819618)
* PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be se
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
This bug was fixed in the package linux-azure - 4.15.0-1041.45
---
linux-azure (4.15.0-1041.45) xenial; urgency=medium
* linux-azure: 4.15.0-1041.45 -proposed tracker (LP: #1819713)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
* Add CONFIG_NO_HZ_FU
This bug was fixed in the package linux-gcp - 4.18.0-1008.9
---
linux-gcp (4.18.0-1008.9) cosmic; urgency=medium
* linux-gcp: 4.18.0-1008.9 -proposed tracker (LP: #1819620)
* [Packaging] Improve config annotations check on custom kernels
(LP: #1820075)
- [Config] linux-gc
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
This bug was fixed in the package linux-kvm - 4.18.0-1009.9
---
linux-kvm (4.18.0-1009.9) cosmic; urgency=medium
* linux-kvm: 4.18.0-1009.9 -proposed tracker (LP: #1819621)
* CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]: disab
This bug was fixed in the package linux-azure - 4.18.0-1014.14
---
linux-azure (4.18.0-1014.14) cosmic; urgency=medium
* linux-azure: 4.18.0-1014.14 -proposed tracker (LP: #1819618)
* PAGE_POISONING / PAGE_POISONING_NO_SANITY / PAGE_POISONING_ZERO option was
expected to be se
This bug was fixed in the package linux-kvm - 4.18.0-1009.9
---
linux-kvm (4.18.0-1009.9) cosmic; urgency=medium
* linux-kvm: 4.18.0-1009.9 -proposed tracker (LP: #1819621)
* CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]: disab
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
This bug was fixed in the package linux-oracle - 4.15.0-1010.12
---
linux-oracle (4.15.0-1010.12) bionic; urgency=medium
* linux-oracle: 4.15.0-1010.12 -proposed tracker (LP: #1819704)
* hot add VF to net_failover - could not rename interface '8' from 'eth0' to
'ens4': Device
This bug was fixed in the package linux-oem - 4.15.0-1035.40
---
linux-oem (4.15.0-1035.40) bionic; urgency=medium
* linux-oem: 4.15.0-1035.40 -proposed tracker (LP: #1819692)
* [amdgpu] screen corruption when using touchpad (LP: #1818617)
- drm/amdgpu/gmc: steal the appropri
This bug was fixed in the package linux-kvm - 4.18.0-1009.9
---
linux-kvm (4.18.0-1009.9) cosmic; urgency=medium
* linux-kvm: 4.18.0-1009.9 -proposed tracker (LP: #1819621)
* CONFIG_SECURITY_SELINUX_DISABLE should be disabled on KVM kernel
(LP: #1812153)
- [Config]: disab
This bug was fixed in the package linux-gcp - 4.18.0-1008.9
---
linux-gcp (4.18.0-1008.9) cosmic; urgency=medium
* linux-gcp: 4.18.0-1008.9 -proposed tracker (LP: #1819620)
* [Packaging] Improve config annotations check on custom kernels
(LP: #1820075)
- [Config] linux-gc
This bug was fixed in the package linux-gcp - 4.15.0-1029.31
---
linux-gcp (4.15.0-1029.31) bionic; urgency=medium
* linux-gcp: 4.15.0-1029.31 -proposed tracker (LP: #1819698)
* [Packaging] Allow overlay of config annotations (LP: #1752072)
- [Config] linux-gcp: Replace annot
Hi,
I can not get this to work..
The Bug must still be there.
Please help or point Me to the right place to get some help on this.
I need to gat nvidia driver to work and be able to use a external monitor :)
Thanks in advance
br.
--
You received this bug notification because you are a member o
Update: correction, I realise foolishly that I was accidentally was
looking at the wrong sources, so I have *not* been running with the
patch.
I'll compile in the patch and try again. Sorry for the confusion.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
An app using libgtk-3 as GUI-lib shows strange behaviour since on ubuntu 18.04
an later.
The problem is, that a not resizeable window not sets its correct size, when it
shows up a second and all further times - but the first time, the size is
correct.
In that window a gtk e
A minimal example program to reproduce the behaviour.
In the example a click on "show subwindow" opens a second window, in which a
component is inserted at showing up. On the first time all is ok like shown in
the left part of the screenshot. But if you close the second (sub) window and
open it
I filed this bug at Debian as well => https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=926229
** Bug watch added: Debian Bug tracker #926229
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926229
** Also affects: openssh (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926
I found Ubuntu 15.10 amd64 on 4.2.0-16 kernel linux is the last version
where the EJ168 card is working and system boots from DVD. I have to
find the way to access my installed 18.10 with card (way to disable xhci
driver during boot or pci card) becouse I cannot access installed system
to make anyt
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
This bug was fixed in the package linux-azure - 4.15.0-1041.45~14.04.1
---
linux-azure (4.15.0-1041.45~14.04.1) trusty; urgency=medium
* linux-azure: 4.15.0-1041.45~14.04.1 -proposed tracker (LP: #1819711)
* Disable ZFS (LP: #1817740)
- Packaging: Really disable ZFS
* Stri
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1819711 (trusty/li
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
This bug was fixed in the package linux-azure - 4.15.0-1041.45~14.04.1
---
linux-azure (4.15.0-1041.45~14.04.1) trusty; urgency=medium
* linux-azure: 4.15.0-1041.45~14.04.1 -proposed tracker (LP: #1819711)
* Disable ZFS (LP: #1817740)
- Packaging: Really disable ZFS
* Stri
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you ar
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1819703 (xenial/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
--
You received this bug notification because you are
This bug was fixed in the package linux-gcp - 4.15.0-1029.31~16.04.1
---
linux-gcp (4.15.0-1029.31~16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0-1029.31~16.04.1 -proposed tracker (LP: #1819695)
* Packaging resync (LP: #1786013)
- [Packaging] update update.conf
* Stri
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This bug was fixed in the package linux-oracle - 4.15.0-1010.12~16.04.1
---
linux-oracle (4.15.0-1010.12~16.04.1) xenial; urgency=medium
* linux-oracle: 4.15.0-1010.12~16.04.1 -proposed tracker (LP:
#1819703)
* Packaging resync (LP: #1786013)
- [Packaging] update update.conf
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This bug was fixed in the package linux-aws-hwe - 4.15.0-1035.37~16.04.1
---
linux-aws-hwe (4.15.0-1035.37~16.04.1) xenial; urgency=medium
* linux-aws-hwe: 4.15.0-1035.37~16.04.1 -proposed tracker (LP:
#1819693)
* Packaging resync (LP: #1786013)
- [Packaging] update update.co
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This bug was fixed in the package linux-gcp - 4.15.0-1029.31~16.04.1
---
linux-gcp (4.15.0-1029.31~16.04.1) xenial; urgency=medium
* linux-gcp: 4.15.0-1029.31~16.04.1 -proposed tracker (LP: #1819695)
* Packaging resync (LP: #1786013)
- [Packaging] update update.conf
* Stri
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1819693 (xenial/li
This bug was fixed in the package linux-aws-hwe - 4.15.0-1035.37~16.04.1
---
linux-aws-hwe (4.15.0-1035.37~16.04.1) xenial; urgency=medium
* linux-aws-hwe: 4.15.0-1035.37~16.04.1 -proposed tracker (LP:
#1819693)
* Packaging resync (LP: #1786013)
- [Packaging] update update.co
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Fix Committed => Fix Released
** Changed in: kernel-sru
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1819619 (bionic/li
This bug was fixed in the package linux-gcp-edge - 4.18.0-1008.9~18.04.1
---
linux-gcp-edge (4.18.0-1008.9~18.04.1) bionic; urgency=medium
* linux-gcp-edge: 4.18.0-1008.9~18.04.1 -proposed tracker (LP:
#1819619)
* Packaging resync (LP: #1786013)
- Packaging: Introduce copy-fi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => Fix Committed
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Łukasz
Zemczak (sil2100)
** Changed in: kernel-sru-workflow/promote-to-security
This bug was fixed in the package linux-aws-edge -
4.18.0-1012.14~18.04.1
---
linux-aws-edge (4.18.0-1012.14~18.04.1) bionic; urgency=medium
* linux-aws-edge: 4.18.0-1012.14~18.04.1 -proposed tracker (LP:
#1819613)
* Packaging resync (LP: #1786013)
- [Packaging] update helper
301 - 400 of 1133 matches
Mail list logo