This bug was fixed in the package linux-aws - 5.0.0-1012.13
---
linux-aws (5.0.0-1012.13) disco; urgency=medium
* add support for Amazon Graviton PCIe controller (LP: #1834962)
- PCI: al: Add Amazon Annapurna Labs PCIe host controller driver
- genirq/msi: Add a new field in
This bug was fixed in the package gce-compute-image-packages -
20190801-0ubuntu1
---
gce-compute-image-packages (20190801-0ubuntu1) eoan; urgency=medium
* New upstream version 20190801 (LP: #1840245)
- Add manpages for NSS modules
- Switch to the v1 Guest Attributes URL
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1018.20
---
linux-oem-osp1 (5.0.0-1018.20) bionic; urgency=medium
* alsa/hdmi: the sound is distorted when playing via nvidia hdmi
(LP: #1838243)
- ALSA: hda: program stripe control for codec
* alsa/sof: let legacy
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1018.20
---
linux-oem-osp1 (5.0.0-1018.20) bionic; urgency=medium
* alsa/hdmi: the sound is distorted when playing via nvidia hdmi
(LP: #1838243)
- ALSA: hda: program stripe control for codec
* alsa/sof: let legacy
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1018.20
---
linux-oem-osp1 (5.0.0-1018.20) bionic; urgency=medium
* alsa/hdmi: the sound is distorted when playing via nvidia hdmi
(LP: #1838243)
- ALSA: hda: program stripe control for codec
* alsa/sof: let legacy
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1018.20
---
linux-oem-osp1 (5.0.0-1018.20) bionic; urgency=medium
* alsa/hdmi: the sound is distorted when playing via nvidia hdmi
(LP: #1838243)
- ALSA: hda: program stripe control for codec
* alsa/sof: let legacy
This bug was fixed in the package linux-oem - 4.15.0-1050.57
---
linux-oem (4.15.0-1050.57) bionic; urgency=medium
* bionic/linux-oem: 4.15.0-1050.57 -proposed tracker (LP: #1839261)
* Packaging resync (LP: #1786013)
- [Packaging] update helper scripts
[ Ubuntu: 4.15.0-58.
I encountered this same issue in a freshly installed Ubuntu 18.04
system.
$ uname -a
Linux Machine 5.0.0-25-generic #26~18.04.1-Ubuntu SMP Thu Aug 1 13:51:02 UTC
2019 x86_64 x86_64 x86_64 GNU/Linux
$ lsb_release -rd
Description:Ubuntu 18.04.3 LTS
Release:18.04
$ gnome-shell --versio
Public bug reported:
There was already LP: #539009 about this, but once again Ubuntu seems to
be packaging Shotwell on their own then the Debian maintainer does a
very good job keeping the package up to date.
Please review the Ubuntu-only patches and switch to the Debian packages,
submitting Ubun
acng seems totally broken in bionic. I'm not knowingly behind a proxy -
can't completely rule out ISP doing something evil though. Anyone have
any pointers on this? Very few google hits, nothing on bugs.debian.org
that I can see, very little activity for acng on salsa.debian.org ..
--
You receive
The following patches required some backporting:
* "tcp: be more careful in tcp_fragment()"
There was a bit of a delta in an if-statement here which required manual
adjusting to fit this patch in. I took the if statement from the patch.
* "x86: cpufeatures: Sort feature word 7"
This required so
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflo
This bug was fixed in the package nginx - 1.16.1-0ubuntu2
---
nginx (1.16.1-0ubuntu2) eoan; urgency=medium
* d/conf/sites-available/default: Update PHP referred to in the
example in the default configuration to PHP 7.2.
(LP: #1831748)
-- Thomas Ward Thu, 15 Aug 2019 12:0
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
Public bug reported:
snapd needs the ability to call 'groupdel --extrausers foo' to clean up
after itself, but --extrausers is currently unsupported.
** Affects: snapd
Importance: Undecided
Assignee: Michael Vogt (mvo)
Status: New
** Affects: shadow (Ubuntu)
Importance: U
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Committed
** Ch
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: In Progress => Fix Committed
** Cha
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the
Hi, this is still an issue -- can you provide some instructions on how
to install the Linux firmware on Ubuntu? I can follow instructions.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838208
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-bionic
** Tags added: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
F
Hi Steve,
On 8/15/19 11:04 PM, Steve Dodd wrote:
> acng seems totally broken in bionic. I'm not knowingly behind a proxy -
> can't completely rule out ISP doing something evil though. Anyone have
> any pointers on this? Very few google hits, nothing on bugs.debian.org
> that I can see, very little
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru
Thank you for your bug report, that's not really a bug though. We
regularly rebase our packages on Debian and sync when possible, no need
to keep a report in launchpad for that topic so I'm closing it
** Changed in: shotwell (Ubuntu)
Importance: Undecided => Wishlist
** Changed in: shotwell (U
Public bug reported:
Not sure what has happened, but there is a crash file in /var/crash
which forces a notification each time I log-in in Xubuntu, and it seems
related to Virtual Box.
ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: virtualbox 5.2.18-dfsg-2~ubuntu18.04.5
ProcVersionSignatur
Public bug reported:
SRU Justification
Impact:
The upstream process for stable tree updates is quite similar
in scope to the Ubuntu SRU process, e.g., each patch has to
demonstrably fix a bug, and each patch is vetted by upstream
by originating either directly from
I still encounter this bug in
Distributor ID: Ubuntu
Description:Ubuntu 16.04.6 LTS
Release:16.04
Codename: xenial
4.4.0-157-generic x86_64
the version of xfdesktop is:
$ xfdesktop --version
(xfdesktop:17981): Gtk-WARNING **: 23:31:18.354: Im Modulpfad »hcengine« konnte
kein
Public bug reported:
This is an old error which I've been suffering since Xubuntu 14.04 and
with several packages of amule, using official ones, which may or may
not be a SVN compilation. In this system, with a freshly install of
Xubuntu 18.04 and installed from Universe repositories as version
1:
I was seeing the dreaded "503 Inconsistent file state" talking to the
canonical (sorry) package repositories. As I said, there are no explicit
upstream proxies, but who knows what the ISP is doing (this would be a
big argument in favour of running apt-get over https to my mind..)
Anyway, at the mo
Well, touch wood, something I've done has made things happier. I moved
everything from the cache directory to a subfolder, made it
inaccessible, removed apt lists from clients and ran apt-get update,
then linked all the original cache files into _import and made acng
reimport them.
The first time
** Summary changed:
- xenial/linux-oracle: -proposed tracker
+ xenial/linux-oracle: 4.15.0-1022.25~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Ker
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840324 (bionic/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
derivatives: bug 1840323 (azure-k
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840259 (bionic/li
Public bug reported:
Tried to update from Ubuntu 12.04 to 16.04 using a download on a USB
stick and ran into errors. Then tried to upgrade the partial
installation of 16.04 to 18.04 and ran into further errors.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: grub-efi-amd64-signed 1.66.2
also see https://metacpan.org/source/MIK/CryptX-0.064/Changes
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840382
Title:
18.04 version should be backported to 0.63
To manage notifications about t
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840381
Title:
package grub-efi-amd64-signed 1.66.22+2.02~beta2-36ubuntu3.22 failed
to install/upgrade: subproce
Public bug reported:
Package libcryptx-perl in Ubuntu 18.04 has version 0.056-1 from
universe. This package has a severe bug which was fixed with version
0.63. The bug causes issues with certain decryption.
Therefore I would like to request backporting the version 0.63 to 18.04.
I think the impo
I have submitted the patch upstream to dri-devel and CC'd the hibmc
maintainers.
We will see where the discussion goes.
https://lists.freedesktop.org/archives/dri-devel/2019-August/231284.html
https://lists.freedesktop.org/archives/dri-devel/2019-August/231285.html
--
You received this bug noti
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Fix Released
** Changed in: kernel-s
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838555
Title:
nvme-cli 1.5 in Bionic does not support Micron NVME drives
To manage notifications about this bug go to:
https://bugs
Same problem here with HP ZBook 17 G2.
Woraround with hdajackretask works. Shouldn't this be autodetected by now?
What options should I supply to make the workaround unnecessary?
http://alsa-project.org/db/?f=addf3995c96dec070a7c1b8db97d31f8338d4499
--
You received this bug notification because y
The expected behavior during a package upgrade is to leave all the ceph
service states unmodified. They should not be enabled/disabled or
stopped/started.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
** Changed in: kernel-sru-workflow/automated-testing
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow s
Then removing the units from the exclusion shoud be suffisant at line
135 in debian/rules.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840347
Title:
Ceph 12.2.12 restarts services during upgrade
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840259 (bionic/li
Public bug reported:
An unresolvable problem occurred while calculating the upgrade.
This was likely caused by:
* Unofficial software packages not provided by Ubuntu
Please use the tool 'ppa-purge' from the ppa-purge
package to remove software from a Launchpad PPA and
try the upgrade again.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840324 (bionic/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
derivatives: bug 1840323 (azure-k
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840259 (bionic/li
This bug was fixed in the package kde4libs - 4:4.14.38-0ubuntu3.1
---
kde4libs (4:4.14.38-0ubuntu3.1) bionic-security; urgency=medium
* SECURITY UPDATE: malicious .desktop files (and others) would execute
code (LP: #1839432).
- debian/patches/CVE-2019-14744.patch: remove sup
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
The message
--
This was likely caused by:
* Unofficial software packages not provided by Ubuntu Please use the tool
'ppa-purge' from the ppa-purge package to remove software from a Launchpad PPA
and try the upg
Can anyone comment as to whether or not this will be considered for
kernels beyond -generic and -hwe? Specifically for aws, aws-hwe, and
aws-edge kernels?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
Hi,
How can I find all the unofficial ppa's on the computer?
Em qui, 15 de ago de 2019 22:00, Chris Guiver
escreveu:
> Thank you for taking the time to report this bug and helping to make
> Ubuntu better.
>
> The message
>
> --
> This was likely caused by:
> * Unofficial software packages not p
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837963
Title:
alsa/hda: neither mute led nor mic-mute led work on s
This bug was fixed in the package kde4libs - 4:4.14.38-0ubuntu6.1
---
kde4libs (4:4.14.38-0ubuntu6.1) disco-security; urgency=medium
* SECURITY UPDATE: malicious .desktop files (and others) would execute
code (LP: #1839432).
- debian/patches/CVE-2019-14744.patch: remove supp
This bug was fixed in the package kde4libs - 4:4.14.16-0ubuntu3.3
---
kde4libs (4:4.14.16-0ubuntu3.3) xenial-security; urgency=medium
* SECURITY UPDATE: Directory traversal vulnerability.
- debian/patches/CVE-2016-6232.patch: extraction location to be in
subfolder.
- C
Public bug reported:
1) Power on system with Salomon
2) Connect an external DP or HDMI monitor via DP/HDMI port
3) check audio output
4) Disconnect external monitor
5) Suspend system via power menu
6) resume the system via press power button on system
7) Connect an external DP or HDMI monitor via
I have a lack of experience dealing with kernel modules, so I know there
was a much easier way to build and test the module by itself, but I took
the long route and it seems like a success.
Grabbed source for Ubuntu kernel package 5.0.0-25. Output mentioned
patches to 5.0.0-25.26, if that means an
Any hope of getting this looked at?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838249
Title:
crash on startup
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+so
Corosync was cleaned up in excuses for Eoan.
** Changed in: corosync (Ubuntu Eoan)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837064
Title:
corosync m
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1840394
and then change the status of the bug to 'Confirmed'.
If, due to the nature
This bug was related to incompatibilities between dkms provided by the
Mellanox OFED - implementing some new netlink protocol addons - and
Ubuntu kernel. This type of issues have already been addressed between
Canonical and Mellanox (but might occur again while Mellanox OFED is
using for RDMA and I
There are still regressions for arm64 and ppc64el runs.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837089
Title:
ocfs2-tools (1.8.5-7build1 to 1.8.6-1) autopkgtest regression
To manage notifica
crmsh migration excuses have been cleared for Eoan.
** Changed in: crmsh (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837072
Title:
crmsh (3.0.1-
Pacemaker was cleanup for Eoan migrations.
** Changed in: pacemaker (Ubuntu Eoan)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838024
Title:
pacemaker m
Public bug reported:
An alarm 'beep beep' output during system boot at BIOS phase.
[Steps to reproduce]
1. Install system with sutton-mccarthy-bionic-amd64-20190801-154 image.
2. Reboot system.
[Expected result]
No alarm 'beep beep' when system boot and poweroff.
[Actual result]
An alarm 'beep
** Changed in: linux (Ubuntu)
Importance: Undecided => Critical
** Description changed:
- 1) Power on system with Salomon
- 2) Connect an external DP or HDMI monitor via DP/HDMI port
- 3) check audio output
- 4) Disconnect external monitor
- 5) Suspend system via power menu
- 6) resume the sys
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1840395
and then change the status of the bug to 'Confirmed'.
If, due to the nature
Public bug reported:
idle-python3.6 is not detectable by Ubuntu Software nor is it detectable
by Nautilus as an application that can be used to open .py files. This
should not be the case. It used to be available in Ubuntu 16.04.Users
will need these features to improve work productivity.
**Syst
** Description changed:
- An alarm 'beep beep' output during system boot at BIOS phase.
- [Steps to reproduce]
- 1. Install system with sutton-mccarthy-bionic-amd64-20190801-154 image.
- 2. Reboot system.
+ Since this fix is still in the maintainer's tree, I add the UBUNTU: SAUCE:
+ prefix in t
** Summary changed:
- bionic/linux-oem: -proposed tracker
+ bionic/linux-oem: 4.15.0-1051.58 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (cano
*** This bug is a duplicate of bug 1553802 ***
https://bugs.launchpad.net/bugs/1553802
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1553802, so it is being marked as such. Please look
** Also affects: linux via
https://bugzilla.kernel.org/show_bug.cgi?id=204589
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834085
Title:
Bluetooth
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
*** This bug is a duplicate of bug 1553802 ***
https://bugs.launchpad.net/bugs/1553802
Reassigned to gnome-shell, since that does all the rendering including
the lock screen and clock.
** Package changed: gdm3 (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because yo
** Bug watch added: bugzilla.gnome.org/ #763231
https://bugzilla.gnome.org/show_bug.cgi?id=763231
** Changed in: gnome-shell
Importance: Low => Unknown
** Changed in: gnome-shell
Status: Confirmed => Unknown
** Changed in: gnome-shell
Remote watch: GNOME Bug Tracker #763231 => bugz
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: gnome-shell (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
** Tags removed: wily
** Tags added: bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
Date and time jump around on locked screen when showing seconds (and
also sometimes display
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel sou
Since the bug is fixed in some Ubuntu versions already it is marked as
"Fix Released".
To request a fix for 18.04 please click "Nominate for series".
** Summary changed:
- password dialog is non-responsive
+ Encrypted drive password dialog is non-responsive
** Bug watch added: gitlab.gnome.org/
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Committed
** Ch
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https
** Summary changed:
- disco/linux-aws: 5.0.0-1013.14 -proposed tracker
+ disco/linux-aws: 5.0.0-1013.15 -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839953
Title:
disco/linux-aw
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Committed
** Ch
Fixed in Ubuntu 18.10 and later, it seems.
If you would like a fix for earlier Ubuntu versions then please click
"Nominate for series".
** Bug watch added: gitlab.gnome.org/GNOME/gnome-shell/issues #34
https://gitlab.gnome.org/GNOME/gnome-shell/issues/34
** Changed in: gnome-shell
Remote wat
This is just a comment from a mostly uninterested third party, so take
it for what you will.
It sure seems to me that it makes more sense to make 'ubuntu-drivers'
take a '--accept-license' flag than to make cloud-init know some
seemingly arbitrary wizardry about writing "latelink=true" to a file i
Hi Melissa
I'll firstly provide the following official wiki page
https://help.ubuntu.com/community/CleanUpgrade
The error message mentions the tool `ppa-purge` which is probably easiest if
you read a support site like
https://askubuntu.com/questions/307/how-can-ppas-be-removed, though other
Ub
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1840001 (trusty/li
So is this still a bug?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839773
Title:
MicroSD not mounted when inserted, used to work correctly
To manage notifications about this bug go to:
https://
I always "mess" everything up by copying all files to /lib/firmware/.
Run `sudo apt --reinstall install linux-firmware` to install firmware
from ubuntu archive.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-xenial
** Tags added: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
F
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Tags added: originate-from-1840400
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840395
Title:
reboot will introduce an alarm 'beep ...' during BIOS phase
To manage notifications about this bug
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or
Please test latest mainline kernel:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.3-rc4/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832144
Title:
Ubuntu 19.04 suspend freeze on Dell inspiron
** Summary changed:
- bionic/linux-snapdragon: 4.15.0-1061.67 -proposed tracker
+ bionic/linux-snapdragon: 4.15.0-1061.68 -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839979
Title
Well, from a cursory glance the Ubuntu package looks very different from
the Debian's one, and it has for a long time.
On Thu, 15 Aug 2019, 23:35 Sebastien Bacher, wrote:
> Thank you for your bug report, that's not really a bug though. We
> regularly rebase our packages on Debian and sync when p
301 - 400 of 592 matches
Mail list logo