Ok so any guidance as to how to proceed - Jeremy do you have a
preference for how this should work? Would you like it to also support
Debian in a similar manner and link to the Debian CVE tracker? In this
case would you prefer runtime detection (via say /etc/os-release) or
compile-time selection of
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
It failed to install since there was no available group ID to create:
addgroup: No GID is available in the range 100-999 (FIRST_SYS_GID -
LAST_SYS_GID).
addgroup: The group `geoclue' was not created.
Have you got a large number of groups in your system?
** Information type changed from Private
You're welcome - glad I could help - closing this as invalid since it
was not a bug in the package but due to an incomplete cleanup of a
previous install.
** Changed in: mysql-5.7 (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubun
*** This bug is a duplicate of bug 1779637 ***
https://bugs.launchpad.net/bugs/1779637
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1779637, so it is being marked as such. Please look
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I can see from the attached logs there are file-system errors (likely
due to incomplete shutdowns in the past) but I am surprised by the
presence of XFS and QNX file-system drivers both being loaded - can you
describe this system in more details - also any details you can provide
about the crash wo
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Unfortunately we can't fix it, because your description
didn't include enough information. You may find it helpful to read 'How
to report bugs effectively'
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd
Thank you for taking the time to file a bug report.
This looks like a local issue that occurred during the time of upgrade.
Since it seems likely to me that this is a local configuration problem,
rather than a bug in Ubuntu, I am marking this bug as 'Incomplete'.
However, if you believe that thi
*** This bug is a duplicate of bug 1784852 ***
https://bugs.launchpad.net/bugs/1784852
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1784852 ***
https://bugs.launchpad.net/bugs/1784852
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1779637, so it is being marked as such. Please look
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1784852 ***
https://bugs.launchpad.net/bugs/1784852
Apologies - ignore comment #2 - wrong bug.
** Changed in: gdm3 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
*** This bug is a duplicate of bug 1784852 ***
https://bugs.launchpad.net/bugs/1784852
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1784852, so it is being marked as such. Please look
Ignore comment #2 - I misread bug #1779637 - this bug is distinct from
that.
Can you provide any details as to whether you are using the X or the
Wayland session?
** This bug is no longer a duplicate of bug 1779637
Password visible at login screen
--
You received this bug notification becaus
*** This bug is a duplicate of bug 1784852 ***
https://bugs.launchpad.net/bugs/1784852
Also wrong duplicate - ignore comment #4 as well.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1784888
Titl
*** This bug is a duplicate of bug 1784883 ***
https://bugs.launchpad.net/bugs/1784883
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1784883 ***
https://bugs.launchpad.net/bugs/1784883
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1784883, so it is being marked as such. Please look
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1784883 ***
https://bugs.launchpad.net/bugs/1784883
Please try to avoid creating duplicate bug reports for the same issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I can't reproduce this myself but I am using the default shell (bash
provided by dash) and gnome-terminal. My understanding of the change to
policykit-1
https://git.launchpad.net/ubuntu/+source/policykit-1/commit/?h=applied/ubuntu
/bionic-devel&id=840c50182f5ab1ba28c1d20cce4c207364852935 is that
pr
@TJ re comment:6 that fix is already in for both xenial and bionic as
far as I can see.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1784964
Title:
Regression due to CVE-2018-1116 (processes not in
I've tried replicating your setup in a fresh bionic VM (ie. using tmux
as default shell which then launches bash) and I can't replicate this:
amurray@sec-bionic-amd64:~$ grep amurray /etc/passwd
amurray:x:1000:1000:Ubuntu,,,:/home/amurray:/usr/bin/tmux
amurray@sec-bionic-amd64:~$ echo $SHELL
/bin/
** Attachment added: "Screenshot from 2018-08-02 14-11-37.png"
https://bugs.launchpad.net/ubuntu/+source/policykit-1/+bug/1784964/+attachment/5170643/+files/Screenshot%20from%202018-08-02%2014-11-37.png
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is su
@teward - I am planning to push this out within the next 24h - please
let me know if you have any concerns.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781925
Title:
Vulnerabilities in znc packag
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Unfortunately we can't fix it, because your description
didn't include enough information. You may find it helpful to read 'How
to report bugs effectively'
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Unfortunately we can't fix it, because your description
didn't include enough information. You may find it helpful to read 'How
to report bugs effectively'
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. We'd
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785176
Title:
GnuPG 1.4.23 released on 2018-06-11, addresses CVE-2017-7526
To man
Thanks for reporting this - FYI you can see the status of each CVE via
the CVE tracker http://people.canonical.com/~ubuntu-security/cve/
ie.
https://people.canonical.com/~ubuntu-
security/cve/2017/CVE-2017-7526.html
This CVE was triaged against libgrypt only - not against gnupg1 - and
all the up
https://usn.ubuntu.com/3733-1/
** Changed in: gnupg (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785176
Title:
GnuPG 1.4.23 released on 2018-06-11, add
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14055
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14056
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781925
T
If you haven't gotten far with Xenial, I can have a look at that (since
am running znc myself on a Xenial instance...)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1781925
Title:
Vulnerabilities in
debdiff against xenial znc - will upload this to security-proposed ppa
soon
** Changed in: znc (Ubuntu Xenial)
Assignee: Thomas Ward (teward) => Alex Murray (alexmurray)
** Patch added: "debdiff against xenial znc"
https://bugs.launchpad.net/ubuntu/+source/znc/+bug/178192
debdiff against bionic
** Patch added: "debdiff against bionic"
https://bugs.launchpad.net/ubuntu/+source/znc/+bug/1781925/+attachment/5167943/+files/znc-bionic.debdiff
** Changed in: znc (Ubuntu Bionic)
Assignee: Thomas Ward (teward) => Alex Murray (alexmurray)
--
You
Have uploaded both to security-proposed - @teward any testing you could
give would be appreciated.
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
Apologies - I was on a roll and figured I might as well do it too. I'm
hoping to push the update out early next week but will wait for your
feedback first.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privileg
The other option would be to do it "properly" the way upstream want -
ie. to have the user be able to configure their one linkification.
I am happy to rework the patch - is there any interest in carrying this
just in Ubuntu or would the preference be to push it to Debian and get
it into Ubuntu tha
The upstream bug is https://bugzilla.gnome.org/show_bug.cgi?id=579859
** Bug watch added: GNOME Bug Tracker #579859
https://bugzilla.gnome.org/show_bug.cgi?id=579859
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.laun
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privileg
Thank you for taking the time to file a bug report.
Looks like an expected directory/file was not present and caused the
install to fail. Did you remove that file?
Since there is not enough information in your report to begin triage or to
differentiate between a local configuration problem and a
The output listed in DpkgTerminalLog.txt seems to suggest there is a
configuration setting which specifies a non-existent symlink location -
have you customised the installation at all?
/var/lib/dpkg/info/mysql-server-5.7.postinst: linha 191:
/usr/share/mysql-common/configure-symlinks: Arquivo ou
Thank you for taking the time to file a bug report.
Looks like an invalid configuration option was listed - did you modify
the configuration?
Since there is not enough information in your report to begin triage or to
differentiate between a local configuration problem and a bug in Ubuntu, I
am ma
It looks like you have some invalid configuration parameters in your
/etc/ssh/ssh_config file since the upgrade encountered an error when
trying to restart sshd (from your attached DpkgTerminalLog.txt):
Jul 30 22:15:28 kike-pc sshd[23579]: bad addr or host: 192.168.*.* (Name
or...n)
--
You recei
>From the logs it looks like this failed since the configuration file for
nginx was not found:
7月 31 11:16:17 zhiying-Lenovo-XiaoXin-310-15IKB nginx[12081]: nginx: [emerg]
open() "/etc/nginx/nginx.conf" failed (2: No such file or directory)
7月 31 11:16:17 zhiying-Lenovo-XiaoXin-310-15IKB nginx[12
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
Provide automatic link handling for CVE identifiers back to the Ubuntu
Security team's CVE database (useful when looking at package changelog's
which have security fixes etc).
** Affects: gnome-terminal (Ubuntu)
Importance: Undecided
Status: New
** Attachment a
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780019
Title:
package linux-image-4.13.0-41-generic 4.13.0-41.46~16.04.1 failed to
instal
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779983
Title:
new nvidia driver causes system failure
To manage notifications about this b
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780090
Title:
grub-efi-amd64-signed package failed to install
To manage notifications abou
*** This bug is a duplicate of bug 1779237 ***
https://bugs.launchpad.net/bugs/1779237
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/177
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779014
Title:
unable to install grub in /dev/sda/
To manage notifications about this bug g
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779622
Title:
issue is regarding boot hanging between work
To manage notifications about t
*** This bug is a duplicate of bug 1652439 ***
https://bugs.launchpad.net/bugs/1652439
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/177
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779064
Title:
package libxfce4util-common 4.12.1-2 failed to install/upgrade:
package is
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780188
Title:
i can't install well
To manage notifications about this bug go to:
https://b
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780311
Title:
package initramfs-tools 0.130ubuntu3.1 failed to install/upgrade:
instalado
It looks like the ssh server configuration file has become corrupted -
notice the error message:
Error: command ['/usr/sbin/sshd', '-T'] failed with exit code 255:
/etc/ssh/sshd_config: line 1: Bad configuration option: \342\200\213\342\200\213
/etc/ssh/sshd_config: terminating, 1 bad configurat
Public bug reported:
Error occurred after installing latest updates. There are similar bugs
in the system, but none for this version of the package.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: grub-common 2.02~beta2-36ubuntu3.8
ProcVersionSignature: Ubuntu 4.8.0-34.36~16.04.1-generi
@dwmw2 - are there any logs etc I can capture to help debug this to get
the dtls fallback or whatnot working correctly?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1500826
Title:
Missing --no-dtls
Public bug reported:
Received error after installing latest updates.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: grub-common 2.02~beta2-36ubuntu3.12
ProcVersionSignature: Ubuntu 4.10.0-27.30~16.04.2-generic 4.10.17
Uname: Linux 4.10.0-27-generic x86_64
ApportVersion: 2.20.1-0ubuntu2
Just hit this as well - can't believe such a simple fix needs more
review - 3 full years now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313787
Title:
Multistrap is broken in 14.04
To manage no
Hi Brian - I have since done a clean reinstall (due to this an other
issues) and the issue is not present any more on the new installation
(plymouth --ping is fine) - I wonder if something perhaps got corrupted
in the old install?
Anyway, I appreciate you looking into it - will close as invalid.
Hi Brian - I have since done a clean reinstall (due to this an other
issues) and the issue is not present any more on the new installation
(plymouth --ping is fine) - I wonder if something perhaps got corrupted
in the old install?
Anyway, I appreciate you looking into it - will close as invalid.
Manually installing the packages from precise (within trusty) seems to
work.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323422
Title:
DirectFB broken in Trusty ?
To manage notifications about t
@Tomodachi - if you note, the bug refers to the nouveau driver, not the
binary one - with the nouveau driver it fails to successfully boot
UNLESS acceleration is disabled - ie. it only boot successfully if you
add:
nouveau.noaccel=1
to the kernel command line
The second issue is then that Xorg m
If it definitely is a MacBook Pro (emphasis on the Pro) then it does (a
lower powered 9400M and a higher powered 9600M GT - you should be able
to see both under OSX which boot via native EFI) - however by default
Ubuntu will boot via BIOS emulation in which case the 9400M is
automatically disabled
Can you please post the output of the sensors command when sensors-
applet shows duplicate sensors and when it doesn't show duplicates?
Also could you post the output when running sensors-applet from the command
line.
Open a terminal and type:
killall sensors-applet
and hit Return. Then a windo
*** This bug is a duplicate of bug 614008 ***
https://bugs.launchpad.net/bugs/614008
No worries, glad you could resolve it - sounds like a misconfigured
install due to your machine freezing due to the aforementioned bug.
--
sensors-applet does not display detected sensors
https://bugs.launch
Could you also please post the output of the sensors command as well
too. Thanks.
--
sensors-applet does not display detected sensors
https://bugs.launchpad.net/bugs/636481
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs
Okay I can see the problem - the output from sensors-applet shows that
it is unable to load any of the plugins and hence cannot access any
sensors - can you please try completely uninstalling sensors-applet and
then reinstalling it:
sudo apt-get purge sensors-appplet libsensors-applet-plugin0 hddt
More info here: http://nvidia.custhelp.com/app/answers/detail/a_id/3109
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/979307
Title:
/dev/nvidia* is world writable
To manage notifications about this
@Chase - any chance this may get fixed (and hence reenabled) for
clickpads which don't have a physical right button (such as all the ones
on Apple laptops?) As it is a shame to be so close to having good
support for such devices now only to have it removed. I agree that
maintaining two / three fing
Public bug reported:
After updating my VMWare Player install of Ubuntu 14.04 amd64 to linux-
image-3.19.0-51-generic it fails to boot - plymouth appears to hang
during boot and so it never reaches the GDM login screen - also seems I
am not alone:
http://askubuntu.com/questions/738083/ubuntu-14-04
This is the bug tracker for indicator-sensors not psensor, please file a
separate bug report in the psensor bug tracker instead.
** Changed in: psensor (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
Also I am booting via EFI too using the 9400M GPU.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/875305
Title:
MacBookPro 5,1 does not resume properly when lid is opened in 11.10
To manage notifica
Downgrading from nvidia-current-updates to just nvidia-current (and
hence from nvidia driver version 285.05.09 to 280.13) seems to have
fixed this for me - @Clint - can you confirm?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
@Colin - I'd be pretty sad if you disabled EFI booting for Mac's as soon
as it is finally actually working now on my MacBook Pro 5,1 with Oneiric
- mjg's recent work has made this all work properly - please reconsider,
or aleast provide a way to manually EFI boot still since it is pretty
poor form
Colin - why do you say its installing in EFI mode by accident? I would
have assumed that if you boot the livecd in EFI mode then it will
install in efi mode - and conversely if you boot in bios mode it will
install bios mode - this is the expected behaviour isn't it?
--
You received this bug noti
This is a bug in lm-sensors, not sensors-applet (since sensors-applet
simply uses lm-sensors to read the sensors anyway). Have you tried a
later version of Ubuntu as the latest ones will have newer versions of
lm-sensors which will support new motherboards etc.
--
You received this bug notificati
reassign to lm-sensors not sensors-applet
** Package changed: sensors-applet (Ubuntu) => lm-sensors (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1062310
Title:
ubuntu 10.04.4 LTS failed t
Public bug reported:
Emacs 24.1 was recently released as the latest stable version, would be
great to have it in Quantal
** Affects: emacs23 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
If you can try and confirm that'd be great, otherwise I'll just reassign
this bug to nvidia-current-updates and keep pushing it myself.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/875305
Title:
Ma
Emacs is specifically blacklisted from using appmenu-gtk and hence the
global menus since appmenu doesn't cope with Emac's dynamic menus where
changing say major modes adds / removes entries from the menu - more
info on this bug report https://bugs.launchpad.net/ubuntu/+source
/appmenu-gtk/+bug/673
Thanks, should be fixed upstream now in https://sourceforge.net/p
/sensors-applet/code/ci/2db4ce3909efdaf6348ce5d244af3c847568db51/
** Changed in: sensors-applet (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Don't you mean Alt-` for switching windows of same app?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/967008
Title:
Ctrl-^ for switching windows does not work
To manage notifications about this bug
Have just noticed this too after I installed Oneiric Beta 1 last night -
MacBook Pro 5,1 (bcm5974)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/817979
Title:
[bcm5974] annoying random freezes
To m
It seems I had manually installed the add-on in addition to the bundled
version and I think this was conflicting - after uninstalling the manual
copy of the addon it now works - so for anyone else affected, in
Thunderbird, open the Tools menu then select Addons, and in the Addon
Manager tab, if the
I'm seeing suspend / resume failures on my MacBook Pro 5,1 with nvidia-
current-updates 285.05.09 - nvidia-current 280.13 is fine though - this
is also noted in bug #875305
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
Reassigning to nvidia-current-updates since this seems to be the
culprit, not the kernel
** Package changed: linux (Ubuntu) => nvidia-graphics-drivers-updates
(Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
The latest lm-sensors (aka libsensors) apparently support reading the
acpi thermal zone temperatures so we can probably just remove the acpi
plugin from sensors-applet to fix this - can anyone confirm if this is
the case? i.e. if the libsensors plugin shows these temperatures?
--
You received thi
These will probably just show up as tempX under libsensors.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/670511
Title:
ACPI thermal procfs I/F removed from kernel 2.6.37
To manage notifications ab
I've written a new implementation of sensors-applet but with the app-
indicator api in mind, you can find it at http://launchpad.net
/indicator-sensors.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/68
Have subscribed the security team to see if anyone there wants to chime
in
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/804594
Title:
reseed(8) performs HTTP fetch of data from random.org
To manag
@derp herp - make sure you don't have the nvidia_bl driver installed -
instead I think you just need the mbp_nvidia_bl which comes with the
standard kernel - if you have both, then the nvidia_bl conflicts and
stops the mbp_nvidia_bl working correctly - uninstall nvidia_bl and then
reboot and see if
Ahh whoops just saw its 8,2 which has an ATI GPU instead - ignore my
comments.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/743352
Title:
LCD backlight doesn't respond to brightness control keys
T
Public bug reported:
Error popped up after upgrading bcmwl-kernel-source from natty-proposed
ProblemType: Package
DistroRelease: Ubuntu 11.04
Package: bcmwl-kernel-source 5.100.82.38+bdcom-0ubuntu3.1
ProcVersionSignature: Ubuntu 2.6.38-9.43-generic 2.6.38.4
Uname: Linux 2.6.38-9-generic x86_64
No
801 - 900 of 1239 matches
Mail list logo