[Bug 1788764] Re: linux: 3.13.0-158.208 -proposed tracker
No USN needed. ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788764 Title: linux: 3.13.0-158.208 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788764/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1771245] Re: [ICL] Touch support
** Changed in: linux (Ubuntu Cosmic) Status: Triaged => In Progress ** Changed in: linux (Ubuntu Cosmic) Assignee: (unassigned) => Joseph Salisbury (jsalisbury) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771245 Title: [ICL] Touch support To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1771245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1789496] Re: Fresh install failed when installing or upgrading GRUB-2
*** This bug is a duplicate of bug 1766945 *** https://bugs.launchpad.net/bugs/1766945 ** This bug has been marked a duplicate of bug 1766945 (EFI on top of legacy install) choosing "replace" or "resize" options in partitioning may lead to an install failure -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1789496 Title: Fresh install failed when installing or upgrading GRUB-2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1789496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790996] Re: JS ERROR: ImportError: No JS module 'desktop' found in search path#012
This bug was fixed in the package gnome-shell - 3.30.0-1ubuntu2 --- gnome-shell (3.30.0-1ubuntu2) cosmic; urgency=medium * ubuntu/desktop_detect.patch: + Added missing misc/desktop.js to pref's gresource.xml (LP: #1790996) -- Shem Pasamba Thu, 06 Sep 2018 16:41:39 +0800 ** Changed in: gnome-shell (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790996 Title: JS ERROR: ImportError: No JS module 'desktop' found in search path#012 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1790996/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788765] Re: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788765 Title: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1760920] Re: FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in Bionic
** Summary changed: - FFe: sync java packages from Debian to fix OpenJDK 9/10 issues + FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in Bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1760920 Title: FFe: sync java packages from Debian to fix OpenJDK 9/10 issues in Bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/java-common/+bug/1760920/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1771245] Re: [ICL] Touch support
https://lists.ubuntu.com/archives/kernel-team/2018-September/095316.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771245 Title: [ICL] Touch support To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1771245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788766] Re: linux: 4.4.0-135.161 -proposed tracker
No USN Needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788766 Title: linux: 4.4.0-135.161 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788766/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788563] Re: L1TF mitigation not effective
** Changed in: linux (Ubuntu Bionic) Status: Triaged => In Progress ** Changed in: linux (Ubuntu Bionic) Assignee: (unassigned) => Joseph Salisbury (jsalisbury) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788563 Title: L1TF mitigation not effective To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790966] Re: Electron apps segfault on glibc 2.28 (cosmic)
This issue affects Electron apps built with Electron <= 2.0.7 and is fixed in Electron 2.0.8. * https://github.com/electron/electron/issues/13972 Few Electron applications have made the transition to Electron 2.x, but those that have will need to be rebuilt with Electron >== 2.0.8 ** Bug watch added: github.com/electron/electron/issues #13972 https://github.com/electron/electron/issues/13972 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790966 Title: Electron apps segfault on glibc 2.28 (cosmic) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1790966/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update
> I've bricked two laptops (a L560 and a L570) due to this update. Ohh dear, this really shouldn't have happened. I'm sorry for this experience you've had. > or the fact that lenovo released a fault firmware Lenovo are the ones that upload, test and certify firmware releases. The LVFS doesn't test anything and all the onus is on the OEM to test on actual hardware before moving to stable. > to NOT update the bios unless your system isn't working as expected 1.35 also fixes an unspecified security issue, so I assume that's why it was uploaded. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791407 Title: Thinkpad L570 UEFI destroyed after BIOS update To manage notifications about this bug go to: https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1054299] Re: Race condition in suspend scripts reveals desktop
Jarno, would you be able to contribute a patch to improve the functionality? This is a long-standing issue and still not fully fixed. The upstream developers may not be aware of its severity. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1054299 Title: Race condition in suspend scripts reveals desktop To manage notifications about this bug go to: https://bugs.launchpad.net/unity/+bug/1054299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788744] Re: linux: 4.15.0-34.37 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788744 Title: linux: 4.15.0-34.37 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788767] Re: linux-aws: 4.4.0-1029.32 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788767 Title: linux-aws: 4.4.0-1029.32 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788767/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788771] Re: linux-kvm: 4.4.0-1033.39 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788771 Title: linux-kvm: 4.4.0-1033.39 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788771/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788563] Re: L1TF mitigation not effective in some CPU and RAM combinations
** Summary changed: - L1TF mitigation not effective + L1TF mitigation not effective in some CPU and RAM combinations ** Description changed: == SRU Justification == This regression has been reported in multiple bugs and affects Trust, Xenial and Bionic. All releases need different backports, so T and X will be sent in separate SRU requests. - Due to this regression L1TF mitigation not effective. + Due to this bug in the original L1TF patch set, L1TF mitigation not + effective in certain CPU and installed RAM configurations. == Fixes == 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit") b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM") cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+") == Regression Potential == Low. These are security fixes and have all been cc'd to upstream stable, so they have had additional upstream review. == Test Case == A test kernel was built with these patches and tested by the original bug reporter. The bug reporter states the test kernel resolved the bug. - Lenovo Thinkpad W530 system with 32 GB RAM dmesg | grep -i l1tf [0.038386] L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. [ 2652.469669] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. Related: https://bugzilla.opensuse.org/show_bug.cgi?id=1105536 ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: linux-image-4.15.0-32-generic 4.15.0-32.35 ProcVersionSignature: Ubuntu 4.15.0-32.35-generic 4.15.18 Uname: Linux 4.15.0-32-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.2 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: pgera 2809 F pulseaudio CurrentDesktop: Unity:Unity7:ubuntu Date: Thu Aug 23 03:38:40 2018 InstallationDate: Installed on 2018-08-11 (12 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) MachineType: LENOVO 24382LU ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-32-generic root=UUID=e2607c8a-4bd1-49fe-ad07-83046492fac5 ro quiet splash vt.handoff=1 RelatedPackageVersions: linux-restricted-modules-4.15.0-32-generic N/A linux-backports-modules-4.15.0-32-generic N/A linux-firmware 1.173.1 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 06/11/2018 dmi.bios.vendor: LENOVO dmi.bios.version: G5ETB2WW (2.72 ) dmi.board.asset.tag: Not Available dmi.board.name: 24382LU dmi.board.vendor: LENOVO dmi.board.version: NO DPK dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrG5ETB2WW(2.72):bd06/11/2018:svnLENOVO:pn24382LU:pvrThinkPadW530:rvnLENOVO:rn24382LU:rvrNODPK:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.family: ThinkPad W530 dmi.product.name: 24382LU dmi.product.version: ThinkPad W530 dmi.sys.vendor: LENOVO -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788563 Title: L1TF mitigation not effective in some CPU and RAM combinations To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791724] [NEW] linux-oem: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-oem (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-oem (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-oem (Ubuntu Bionic) Importance: Undecided Status: New ** Tags added: bionic ** Changed in: linux-oem (Ubuntu Bionic) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team
[Bug 1791726] [NEW] linux-azure: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/snap-release-to-beta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-candidate Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-edge Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-stable Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/stakeholder-signoff Importance: Medium Assignee: Joshua R. Poulson (jrp) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-azure (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-azure (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-azure (Ubuntu Bionic) Importance: Undecided Status: New ** Tags added: bionic ** Changed in: linux-azure (Ubuntu Bionic) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-beta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-candidate Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-edge Importance:
[Bug 1788769] Re: linux-aws: 4.4.0-1067.77 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788769 Title: linux-aws: 4.4.0-1067.77 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788769/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788772] Re: linux-raspi2: 4.4.0-1096.104 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788772 Title: linux-raspi2: 4.4.0-1096.104 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788772/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788773] Re: linux-snapdragon: 4.4.0-1100.105 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788773 Title: linux-snapdragon: 4.4.0-1100.105 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788773/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791725] [NEW] linux-aws: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/snap-release-to-beta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-candidate Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-edge Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-stable Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-aws (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-aws (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-aws (Ubuntu Bionic) Importance: Undecided Status: New ** Tags added: bionic ** Changed in: linux-aws (Ubuntu Bionic) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-beta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-candidate Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-edge Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-stable Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided
[Bug 1788768] Re: linux-lts-xenial: 4.4.0-135.161~14.04.1 -proposed tracker
No USN needed ** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788768 Title: linux-lts-xenial: 4.4.0-135.161~14.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788768/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788563] Re: L1TF mitigation not effective in some CPU and RAM combinations
** Changed in: linux (Ubuntu Cosmic) Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788563 Title: L1TF mitigation not effective in some CPU and RAM combinations To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791740] [NEW] linux-hwe: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-hwe (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-hwe (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1791719 kernel-sru-cycle-2018.09.10 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-hwe (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-hwe (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team
[Bug 1791744] [NEW] linux-hwe-edge: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-hwe-edge (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-hwe-edge (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1791719 kernel-sru-cycle-2018.09.10 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-hwe-edge (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-hwe-edge (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in:
[Bug 1791080] Re: Xenial update to 4.4.144 stable release
** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791080 Title: Xenial update to 4.4.144 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1791080/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788762] Re: linux: 3.2.0-135.181 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-precise ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788762 Title: linux: 3.2.0-135.181 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788762/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791336] Re: jerky stuttering playback since updating to 18.04
FWIW. ALL video files stutter but NOT the audio. Audio is fine. I'm getting a lot of messages about main input debug: Creating an input for preparsing is there a way of suppressing or telling VLC NOT to preparse? --- I got a bunch of this: [h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (26 bytes) is 0x804. [h264 @ 0x7f9fc8cb27c0] Decode to surface 0x410. [h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x803. [h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (19 bytes) is 0x800. [h264 @ 0x7f9fc8cce8a0] Decode to surface 0x40d. [h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x804. [h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x802. [h264 @ 0x7f9fc8ceaa80] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8ceaa80] Slice 0 data buffer (17 bytes) is 0x803. [h264 @ 0x7f9fc8ceaa80] Decode to surface 0x404. [h264 @ 0x7f9fc8c4da80] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8c4da80] Param buffer (type 0, 672 bytes) is 0x803. [h264 @ 0x7f9fc8c4da80] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8c4da80] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8c4da80] Slice 0 data buffer (17 bytes) is 0x804. [h264 @ 0x7f9fc8c4da80] Decode to surface 0x408. [h264 @ 0x7f9fc8c2b100] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8c2b100] Param buffer (type 0, 672 bytes) is 0x804. [h264 @ 0x7f9fc8c2b100] Param buffer (type 1, 240 bytes) is 0x802. [h264 @ 0x7f9fc8c2b100] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8c2b100] Slice 0 data buffer (26 bytes) is 0x803. [h264 @ 0x7f9fc8c2b100] Decode to surface 0x40e. [h264 @ 0x7f9fc8cb27c0] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8cb27c0] Param buffer (type 0, 672 bytes) is 0x800. [h264 @ 0x7f9fc8cb27c0] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (19 bytes) is 0x804. [h264 @ 0x7f9fc8cb27c0] Decode to surface 0x40a. [h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x803. [h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x802. [h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (17 bytes) is 0x800. [h264 @ 0x7f9fc8cce8a0] Decode to surface 0x406. [h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x800. [h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8ceaa80] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8ceaa80] Slice 0 data buffer (17 bytes) is 0x803. [h264 @ 0x7f9fc8ceaa80] Decode to surface 0x409. [h264 @ 0x7f9fc8c4da80] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8c4da80] Param buffer (type 0, 672 bytes) is 0x803. [h264 @ 0x7f9fc8c4da80] Param buffer (type 1, 240 bytes) is 0x802. [h264 @ 0x7f9fc8c4da80] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8c4da80] Slice 0 data buffer (25 bytes) is 0x800. [h264 @ 0x7f9fc8c4da80] Decode to surface 0x411. [h264 @ 0x7f9fc8c2b100] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8c2b100] Param buffer (type 0, 672 bytes) is 0x804. [h264 @ 0x7f9fc8c2b100] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8c2b100] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8c2b100] Slice 0 data buffer (19 bytes) is 0x803. [h264 @ 0x7f9fc8c2b100] Decode to surface 0x40c. [h264 @ 0x7f9fc8cb27c0] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8cb27c0] Param buffer (type 0, 672 bytes) is 0x800. [h264 @ 0x7f9fc8cb27c0] Param buffer (type 1, 240 bytes) is 0x802. [h264 @ 0x7f9fc8cb27c0] Slice 0 param buffer (3128 bytes) is 0x801. [h264 @ 0x7f9fc8cb27c0] Slice 0 data buffer (17 bytes) is 0x804. [h264 @ 0x7f9fc8cb27c0] Decode to surface 0x405. [h264 @ 0x7f9fc8cce8a0] nal_unit_type: 1, nal_ref_idc: 0 [h264 @ 0x7f9fc8cce8a0] Param buffer (type 0, 672 bytes) is 0x804. [h264 @ 0x7f9fc8cce8a0] Param buffer (type 1, 240 bytes) is 0x801. [h264 @ 0x7f9fc8cce8a0] Slice 0 param buffer (3128 bytes) is 0x802. [h264 @ 0x7f9fc8cce8a0] Slice 0 data buffer (17 bytes) is 0x800. [h264 @ 0x7f9fc8cce8a0] Decode to surface 0x407. [h264 @ 0x7f9fc8ceaa80] nal_unit_type: 1, nal_ref_idc: 2 [h264 @ 0x7f9fc8ceaa80] Param buffer (type 0, 672 bytes) is 0x800. [h264 @ 0x7f9fc8ceaa80] Param buffer (type 1, 240 bytes) is 0x802. [h264 @
[Bug 1788761] Re: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-xenial ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788761 Title: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788761/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788748] Re: linux-oem: 4.15.0-1018.21 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788748 Title: linux-oem: 4.15.0-1018.21 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788748/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791650] Re: python-pandas has missing dependency
*** This bug is a duplicate of bug 1787280 *** https://bugs.launchpad.net/bugs/1787280 Thank you for taking the time to report this bug and helping to make Ubuntu better. This particular bug has already been reported and is a duplicate of bug 1787280, so it is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. When reporting bugs in the future please use apport by using 'ubuntu-bug' and the name of the package affected. ** This bug has been marked a duplicate of bug 1787280 python3-pandas-lib missing in armhf version -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791650 Title: python-pandas has missing dependency To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1791650/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1651660] Re: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1
Hi Kim, sorry for being unclear. I meant for people affected by this bug to try to run this command, which is what the package does in its post installation procedure: pycompile -p python-samba On a clean xenial install, that does not fail. If it fails for someone, it means a non-standard python version is somehow being invoked. -- You received this bug notification because you are a member of Ubuntu Server, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1651660 Title: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1651660/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash
** Summary changed: - libpcl cflags -march=native -msse4.2 makes user-compiled programs crash + [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771124 Title: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791373] Re: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54
Yeah, I was aware I had to do these steps, just didn't had the time to finish it last friday, but I wanted the bug number to add it to the debian/changelog :). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791373 Title: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1791373/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash
** Description changed: - in /usr/lib/x86_64-linux-gnu/cmake/pcl/PCLConfig.cmake, line 780, the cflags for PCL are defined like this: + [ Impact ] + * It is currently impossible to use the library, without making programs that crash during startup + + [ Test case ] + * Attached and in Other info section + + [ Regression Potential ] + * Fix is uploaded in cosmic, waiting for build/migration + + [ Other Info ] + in /usr/lib/x86_64-linux-gnu/cmake/pcl/PCLConfig.cmake, line 780, the cflags for PCL are defined like this: list(APPEND PCL_DEFINITIONS -march=native -msse4.2 -mfpmath=sse ) however, when using -march=native -msse4.2, even simple user-compiled programs crash in eigen's handmade_aligned_free. I attached a minimal testcase for this (the program crashes on ubuntu artful and bionic, but not on zesty). Problem was on a dell xps13 (since -march=native is hardware-dependent, on some systems the problem might not be reproducible) see also this email thread http://www.pcl-users.org/Segfaults-in-eigen-s -handmade-aligned-free-on-ubuntu-artful-td4045237.html CMakeLists.txt for the program in attach: cmake_minimum_required(VERSION 2.8) project(crashdemo) find_package(Boost 1.54 REQUIRED COMPONENTS filesystem) include_directories(${Boost_INCLUDE_DIRS}) link_directories(${Boost_LIBRARY_DIRS}) set(OUR_Boost_LIBRARIES ${Boost_LIBRARIES}) find_package(PCL 1.8 REQUIRED COMPONENTS common io segmentation visualization filters) add_definitions(${PCL_DEFINITIONS}) include_directories(${PCL_INCLUDE_DIRS}) link_directories(${PCL_LIBRARY_DIRS}) add_executable(crasher - src/crasher.cpp + src/crasher.cpp ) target_link_libraries(crasher - ${OUR_Boost_LIBRARIES} - ${Boost_LIBRARIES} - ${PCL_LIBRARIES} + ${OUR_Boost_LIBRARIES} + ${Boost_LIBRARIES} + ${PCL_LIBRARIES} ) ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: libpcl-dev 1.8.1+dfsg1-2ubuntu2 ProcVersionSignature: Ubuntu 4.15.0-20.21-generic 4.15.17 Uname: Linux 4.15.0-20-generic x86_64 ApportVersion: 2.20.9-0ubuntu7 Architecture: amd64 CurrentDesktop: GNOME Date: Mon May 14 15:18:46 2018 InstallationDate: Installed on 2016-10-23 (567 days ago) InstallationMedia: Ubuntu 16.10 "Yakkety Yak" - Release amd64 (20161012.2) SourcePackage: pcl UpgradeStatus: Upgraded to bionic on 2018-05-09 (4 days ago) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771124 Title: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791675] [NEW] failed to connect to '/run/xpra/system':
Public bug reported: Hi, I just tried to use xpra for the first time after upgrading to 18.04. Seems to have problems with the systemd structure (tested on different machines): $ xpra start :7 Warning: cannot use the system proxy for 'start' subcommand, failed to connect to '/run/xpra/system': [Errno 2] No such file or directory It does not start. On a server machine the log file says: ++) Using config file: "/etc/xpra/xorg.conf" (==) Using system config directory "/usr/share/X11/xorg.conf.d" 2018-09-10 15:36:25,040 created unix domain socket: /run/user/1000/xpra/finnland1-107ESC[0m 2018-09-10 15:36:25,040 created unix domain socket: /home/hadmut/.xpra/finnland1-107ESC[0m 2018-09-10 15:36:25,041 created unix domain socket: /run/xpra/finnland1-107ESC[0m /bin/sh: 1: dbus-launch: not found dbus-launch failed to start using command 'dbus-launch --close-stderr': exit code is 127 On a desktop machine it says: /usr/lib/xorg/Xorg.wrap: Only console users are allowed to run the X server 2018-09-10 15:38:12,624 2018-09-10 15:38:12,625 Xvfb command has terminated! xpra cannot continue 2018-09-10 15:38:12,625 if the display is already running, try a different one, 2018-09-10 15:38:12,625 or use the --use-display flag 2018-09-10 15:38:12,626 2018-09-10 15:38:12,627 killing xvfb with pid 27213 2018-09-10 15:38:12,629 failed to kill xvfb process with pid 27213: 2018-09-10 15:38:12,629 [Errno 3] No such process ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: xpra 2.1.3+dfsg-1ubuntu1 ProcVersionSignature: Ubuntu 4.15.0-33.36-generic 4.15.18 Uname: Linux 4.15.0-33-generic x86_64 NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair ApportVersion: 2.20.9-0ubuntu7.3 Architecture: amd64 CurrentDesktop: LXDE Date: Mon Sep 10 15:28:34 2018 InstallationDate: Installed on 2018-04-30 (133 days ago) InstallationMedia: Lubuntu 18.04 LTS "Bionic Beaver" - Release amd64 (20180426) SourcePackage: xpra UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: xpra (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791675 Title: failed to connect to '/run/xpra/system': To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xpra/+bug/1791675/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790601] Re: Ubuntu18.10 - Update libocxl to version 1.1
We're now past the Feature Freeze for 18.10. As this is not an urgent issue, we would plan to pick up this new version for 19.04. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790601 Title: Ubuntu18.10 - Update libocxl to version 1.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1790601/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update
** Bug watch added: github.com/hughsie/lvfs-website/issues #163 https://github.com/hughsie/lvfs-website/issues/163 ** Also affects: fwupd via https://github.com/hughsie/lvfs-website/issues/163 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791407 Title: Thinkpad L570 UEFI destroyed after BIOS update To manage notifications about this bug go to: https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1651660] Re: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1
Nope kim@T610:/usr/lib/python2.7$ pycompile -p python-samba Traceback (most recent call last): File "/usr/bin/pycompile", line 26, in import logging File "/usr/lib/python2.7/logging/__init__.py", line 26, in import sys, os, time, cStringIO, traceback, warnings, weakref, collections File "/usr/lib/python2.7/weakref.py", line 14, in from _weakref import ( ImportError: cannot import name _remove_dead_weakref This is after I copied back the original version of weakref.py as in step 4 above. However my fix above appears to work so I'm happy for the moment. Cheers Kim -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1651660 Title: package python-samba 2:4.3.11+dfsg-0ubuntu0.16.04.1 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1651660/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update
Sorry for the double comment. I'm not sure if this is a fault of fwupd or the fact that lenovo released a fault firmware; anyway I think Ubuntu should not push firmware updates along normal system updates. Bios updates are very dangerous (as shown in this bug-report) and even Lenovo says on their official documentation to NOT update the bios unless your system isn't working as expected. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791407 Title: Thinkpad L570 UEFI destroyed after BIOS update To manage notifications about this bug go to: https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791407] Re: Thinkpad L570 UEFI destroyed after BIOS update
** Changed in: fwupd Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791407 Title: Thinkpad L570 UEFI destroyed after BIOS update To manage notifications about this bug go to: https://bugs.launchpad.net/fwupd/+bug/1791407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790636] Re: Watchdog CPU:19 Hard LOCKUP when kernel crash was triggered
** Changed in: linux (Ubuntu) Status: New => Fix Committed ** Changed in: ubuntu-power-systems Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790636 Title: Watchdog CPU:19 Hard LOCKUP when kernel crash was triggered To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1790636/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788747] Re: linux-raspi2: 4.15.0-1022.24 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788747 Title: linux-raspi2: 4.15.0-1022.24 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788747/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790901] Re: How to use s390x pxelinux style network booting from qemu 3.0 in bionic
You are the tftp/pxelinux experts more than I am. I follow our tftp and libvirt setup as in [1] But instead of building a complex single purpose pxelinux.0 All the new "code" youneed is actually inside that boot image. So no need to build huge things, instead replace /usr/share/qemu/s390-netboot.img with the one from upstream https://git.qemu.org/?p=qemu.git;a=blob_plain;f=pc-bios/s390-netboot.img;hb=HEAD This works Bionics Qemu well. Now I can now just use kernel/initrd and pxeconfig as "usual" $ sudo cp /boot/vmlinuz-4.15.0-33-generic /srv/tftp/ $ sudo cp /boot/initrd.img-4.15.0-33-generic /srv/tftp/ Then I put this in my config for pxelinux: $ cat pxelinux.cfg/default label ubuntu kernel vmlinuz-4.15.0-33-generic initrd initrd.img-4.15.0-33-generic append root=/dev/vda1 Starting the guest from that: $ virsh start netboot --console Domain netboot started Connected to domain netboot Escape character is ^] Using MAC address: 52:54:00:1e:b5:2a Requesting information via DHCP: done Using IPv4 address: 192.168.122.222 Using TFTP server: 192.168.122.1 Bootfile name: 'pxelinux.0' Receiving data: 0 KBytes TFTP error: file not found: pxelinux.0 Trying pxelinux.cfg files... Receiving data: 0 KBytes TFTP: Received pxelinux.cfg/default (113 bytes) Loading pxelinux.cfg entry 'ubuntu' Receiving data: 4292 KBytes TFTP: Received vmlinuz-4.15.0-33-generic (4292 KBytes) Receiving data: 16763 KBytes TFTP: Received initrd.img-4.15.0-33-generic (16763 KBytes) Network loading done, starting kernel... [0.425566] Linux version 4.15.0-33-generic (buildd@bos02-s390x-010) (gcc version 7.3.0 (Ubuntu 7.3.0-16ubuntu3)) #36-Ubuntu SMP Wed Aug 15 13:42:17 UTC 2018 (Ubuntu 4.15.0-33.36-generic 4.15.18) [0.425572] setup.289988: Linux is running under KVM in 64-bit mode You know much better than I do how to control the PXE details. I think this gets you going without massive PPAs/Backport needs at all right? I will set "invalid" (as no source change is needed) and modify the title a bit to match the solution. I'll keep my test env up for the sprint so that we can try more if you need. But actually I think you can start as-is by providing that extra ROM just as you would provide any other updated data file to the target you want to deploy to. [1]: http://ubuntu-on-big-iron.blogspot.com/2017/12/pxe-netboot-kvm- s390x.html ** Summary changed: - Backporting s390x pxelinux style network booting from qemu 3.0 to bionic + How to use s390x pxelinux style network booting from qemu 3.0 in bionic ** Changed in: qemu (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790901 Title: How to use s390x pxelinux style network booting from qemu 3.0 in bionic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1790901/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791690] [NEW] nautilus crashed with SIGSEGV
Public bug reported: after turn on pc ProblemType: Crash DistroRelease: Ubuntu 18.10 Package: nautilus 1:3.26.4-0ubuntu3 ProcVersionSignature: Ubuntu 4.17.0-9.10-generic 4.17.17 Uname: Linux 4.17.0-9-generic x86_64 ApportVersion: 2.20.10-0ubuntu9 Architecture: amd64 CurrentDesktop: ubuntu:GNOME Date: Mon Sep 10 18:52:31 2018 Disassembly: No registers. ExecutablePath: /usr/bin/nautilus GsettingsChanges: b'org.gnome.nautilus.window-state' b'geometry' b"'890x550+387+256'" InstallationDate: Installed on 2018-09-10 (0 days ago) InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Alpha amd64 (20180908) ProcCmdline: /usr/bin/nautilus --gapplication-service ProcEnviron: SHELL=/bin/bash XDG_RUNTIME_DIR= PATH=(custom, no user) LANG=en_US.UTF-8 Registers: The program has no registers now. SegvAnalysis: Failure: invalid literal for int() with base 16: 'program' Signal: 11 SourcePackage: nautilus Stacktrace: No stack. StacktraceTop: ThreadStacktrace: Title: nautilus crashed with SIGSEGV UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip libvirt lpadmin plugdev sambashare sudo usr_lib_nautilus: ** Affects: nautilus (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-crash apport-failed-retrace cosmic ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791690 Title: nautilus crashed with SIGSEGV To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1791690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791373] Re: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54
okey dokey -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791373 Title: [FFe] Update gnome-terminal to 3.30.0 and vte to 0.54 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1791373/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791489] Re: [FFe] Update to 3.30 - Sync from Debian
There is an icon name change but I filed https://launchpad.net/bugs/1790754 for it. Upstream lists these updates: - Tweaks to the avatar selector UI - Several fixes for the Flatpak build - OARS content ratings -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791489 Title: [FFe] Update to 3.30 - Sync from Debian To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-contacts/+bug/1791489/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791697] [NEW] pkcs #7 signature not signed with a trusted key
Public bug reported: after install nvidia-drivers-396 and virt-manager, virtualbox package and reboot system, in boot my system show to me this message: "pkcs #7 signature not signed with a trusted key" and system not booting(freeze maybe) I purged Nvidia and Intel packages in recovery mode, The problem was resolved temporarily... i use ubuntu 18.10 development branch, ubuntu is UEFI boot. same problem when upgrading ubuntu 18.04 to 18.10. and now when reinstalling ubuntu 18.10! ** Affects: ubuntu Importance: Undecided Status: New ** Tags: cosmic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791697 Title: pkcs #7 signature not signed with a trusted key To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1791697/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1773457] Re: Full-system encryption needs to be supported out-of-the-box including /boot and should not delete other installed systems
On 9/7/2018 3:06 AM, Paddy Landau wrote: > If you are arguing that /boot shouldn't be encrypted, this is a direct > contradiction of what you wrote earlier that malware can be loaded into > the ESP; so why couldn't malware be loaded into /boot? It can. Encrypting it does not stop that. > Please would you explain why you think that we should NOT encrypt /boot? > The rest of us here are mystified; we should encrypt as much as possible > in order to increase the barriers to black hats. Because encryption does not prevent tampering. It protects private data. With no private data in /boot, there is no need to protect it. On 9/9/2018 5:40 PM, Javier Paniagua Laconich wrote: > Well, not entirely correct. Encryption is also for tamper resistance, so it > is still very useful even if nothing in /boot is private. No, it isn't. This belief that encryption prevents tampering strikes me as similar to people thinking that RAID is a substitute for backups. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1773457 Title: Full-system encryption needs to be supported out-of-the-box including /boot and should not delete other installed systems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1773457/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791691] Re: PATH broken in systemd units
http://cloud-images.ubuntu.com/cosmic/20180906/unpacked/cosmic- daily.changelog outlines the changed packages between the two images. I strongly suspect that the root cause of this is the systemd environment generator added in the latest version of snapd, so I've added snapd to this bug. The changelog for the latest snapd version: snapd (2.35.1+18.10) cosmic; urgency=medium * New upstream release, LP: #1786438 - packaging/fedora: Merge changes from Fedora Dist-Git - snapcraft: do not use --diry in mkversion.sh - cmd: add systemd environment generator - snap-confine: map /var/lib/extrausers into snaps mount-namespace - tests: cherry-pick test fixes from master for 2.35 - systemd: do not run "snapd.snap-repair.service.in on firstboot bootstrap - interfaces: retain order of inserted security backends - selftest: detect if apparmor is unusable and error -- Michael Vogt Mon, 03 Sep 2018 14:44:06 +0200 ** Also affects: snapd (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791691 Title: PATH broken in systemd units To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/1791691/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788563] Re: L1TF mitigation not effective
Bionic SRU request submitted: https://lists.ubuntu.com/archives/kernel-team/2018-September/095319.html ** Description changed: + == SRU Justification == + This regression has been reported in multiple bugs and affects Trust, + Xenial and Bionic. All releases need different backports, so T and X + will be sent in separate SRU requests. + + Due to this regression L1TF mitigation not effective. + + == Fixes == + 9df9516940a6 ("x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit") + b0a182f87568 ("x86/speculation/l1tf: Fix off-by-one error when warning that system has too much RAM") + cc51e5428ea5 ("x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+") + + == Regression Potential == + Low. These are security fixes and have all been cc'd to upstream + stable, so they have had additional upstream review. + + == Test Case == + A test kernel was built with these patches and tested by the original bug reporter. + The bug reporter states the test kernel resolved the bug. + + Lenovo Thinkpad W530 system with 32 GB RAM dmesg | grep -i l1tf [0.038386] L1TF: System has more than MAX_PA/2 memory. L1TF mitigation not effective. [ 2652.469669] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. Related: https://bugzilla.opensuse.org/show_bug.cgi?id=1105536 ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: linux-image-4.15.0-32-generic 4.15.0-32.35 ProcVersionSignature: Ubuntu 4.15.0-32.35-generic 4.15.18 Uname: Linux 4.15.0-32-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.2 Architecture: amd64 AudioDevicesInUse: - USERPID ACCESS COMMAND - /dev/snd/controlC0: pgera 2809 F pulseaudio + USERPID ACCESS COMMAND + /dev/snd/controlC0: pgera 2809 F pulseaudio CurrentDesktop: Unity:Unity7:ubuntu Date: Thu Aug 23 03:38:40 2018 InstallationDate: Installed on 2018-08-11 (12 days ago) InstallationMedia: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) MachineType: LENOVO 24382LU ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.15.0-32-generic root=UUID=e2607c8a-4bd1-49fe-ad07-83046492fac5 ro quiet splash vt.handoff=1 RelatedPackageVersions: - linux-restricted-modules-4.15.0-32-generic N/A - linux-backports-modules-4.15.0-32-generic N/A - linux-firmware 1.173.1 + linux-restricted-modules-4.15.0-32-generic N/A + linux-backports-modules-4.15.0-32-generic N/A + linux-firmware 1.173.1 SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 06/11/2018 dmi.bios.vendor: LENOVO dmi.bios.version: G5ETB2WW (2.72 ) dmi.board.asset.tag: Not Available dmi.board.name: 24382LU dmi.board.vendor: LENOVO dmi.board.version: NO DPK dmi.chassis.asset.tag: No Asset Information dmi.chassis.type: 10 dmi.chassis.vendor: LENOVO dmi.chassis.version: Not Available dmi.modalias: dmi:bvnLENOVO:bvrG5ETB2WW(2.72):bd06/11/2018:svnLENOVO:pn24382LU:pvrThinkPadW530:rvnLENOVO:rn24382LU:rvrNODPK:cvnLENOVO:ct10:cvrNotAvailable: dmi.product.family: ThinkPad W530 dmi.product.name: 24382LU dmi.product.version: ThinkPad W530 dmi.sys.vendor: LENOVO -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788563 Title: L1TF mitigation not effective in some CPU and RAM combinations To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788563/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1739263] Re: Gnome terminal always open new window in gnome shell
** Changed in: gnome-terminal (Ubuntu) Status: Triaged => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1739263 Title: Gnome terminal always open new window in gnome shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-terminal/+bug/1739263/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788765] Re: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788765 Title: linux-lts-trusty: 3.13.0-158.208~precise2 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788766] Re: linux: 4.4.0-135.161 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788766 Title: linux: 4.4.0-135.161 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788766/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788764] Re: linux: 3.13.0-158.208 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788764 Title: linux: 3.13.0-158.208 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788764/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788755] Re: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker
Testing looks good ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788755 Title: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788755/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788761] Re: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788761 Title: linux-hwe-edge: 4.15.0-34.37~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788761/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791716] Re: FFe: sync java packages from Debian to fix OpenJDK 10/11 issues in Cosmic
** Tags added: upgrade-software-version -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791716 Title: FFe: sync java packages from Debian to fix OpenJDK 10/11 issues in Cosmic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/java-common/+bug/1791716/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791552] Re: package gstreamer1.0-libav:amd64 1.14.1-1~ubuntu18.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configurati
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791552 Title: package gstreamer1.0-libav:amd64 1.14.1-1~ubuntu18.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configuration To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gst-libav1.0/+bug/1791552/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791576] Re: package initramfs-tools 0.130ubuntu3.1 failed to install/upgrade: installed initramfs-tools package post-installation script subprocess returned error exit status 1
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791576 Title: package initramfs-tools 0.130ubuntu3.1 failed to install/upgrade: installed initramfs-tools package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1791576/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791642] Re: salt-minion won't start after upgrade to cosmic
** Bug watch added: Debian Bug tracker #896921 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896921 ** Also affects: salt (Debian) via https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=896921 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791642 Title: salt-minion won't start after upgrade to cosmic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/salt/+bug/1791642/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787090] Re: [AEP-bug] libnvdimm: Fix a bug that overwrites and corrupts user memory in an ARS_STATUS command
Commit 286e87718103acdf85f4ed323a37e4839a8a7c05 is now in the 18.10 kernel version: Ubuntu-4.18.0-8.9 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** Changed in: linux (Ubuntu) Status: Fix Released => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787090 Title: [AEP-bug] libnvdimm: Fix a bug that overwrites and corrupts user memory in an ARS_STATUS command To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1787090/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker
Testing looks good ** Changed in: kernel-sru-workflow/stakeholder-signoff Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788751 Title: linux-azure: 4.15.0-1023.24 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1615612] Re: systemd-inhibit authentication ignored by suspend request
I have checked the Xfce bug tracker and found this report: https://bugzilla.xfce.org/show_bug.cgi?id=10581 It describes the issue with the bad positioning of the authentication window. So, the problem in 18.04 is that the restart/logout/suspend dialog remains visible/glitched after initiating the suspend process, correct? ** Bug watch added: Xfce Bugzilla #10581 https://bugzilla.xfce.org/show_bug.cgi?id=10581 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1615612 Title: systemd-inhibit authentication ignored by suspend request To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xfce4-session/+bug/1615612/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1529460] Re: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3
** Changed in: nautilus-python (Debian) Status: Unknown => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1529460 Title: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus-python/+bug/1529460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791687] [NEW] package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed acpid package post-installation script subprocess returned error exit status 1
Public bug reported: Upgrading from 16.04 LTS to 18.04 LTS using apt dist-upgrade. Upgrade failed to boot image 4.15.0-33-generic. Had to revert to 4.4.0-134-generic to get to the desktop. ProblemType: Package DistroRelease: Ubuntu 18.04 Package: acpid 1:2.0.28-1ubuntu1 ProcVersionSignature: Ubuntu 4.4.0-134.160-generic 4.4.140 Uname: Linux 4.4.0-134-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.3 AptOrdering: xscreensaver:amd64: Remove NULL: ConfigurePending Architecture: amd64 Date: Mon Sep 10 14:28:26 2018 DpkgHistoryLog: Start-Date: 2018-09-10 14:28:18 Remove: xscreensaver:amd64 (5.36-1ubuntu1) ErrorMessage: installed acpid package post-installation script subprocess returned error exit status 1 InstallationDate: Installed on 2017-04-27 (500 days ago) InstallationMedia: Ubuntu-Server 16.04.2 LTS "Xenial Xerus" - Release amd64 (20170215.8) Python3Details: /usr/bin/python3.6, Python 3.6.5, python3-minimal, 3.6.5-3ubuntu1 PythonDetails: /usr/bin/python2.7, Python 2.7.15rc1, python-minimal, 2.7.15~rc1-1 RelatedPackageVersions: dpkg 1.19.0.5ubuntu2 apt 1.6.3ubuntu0.1 SourcePackage: acpid Title: package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed acpid package post-installation script subprocess returned error exit status 1 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: acpid (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package bionic need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791687 Title: package acpid 1:2.0.28-1ubuntu1 failed to install/upgrade: installed acpid package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/1791687/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791688] [NEW] package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade: installed avahi-daemon package post-installation script subprocess returned error exit status 1
Public bug reported: Upgrading from 16.0 LTS to 18.04 LTS using apt dist-upgrade. Kernel panic booting to 4.15.0-33-generic. Had to revert to 4.4.0-134 to get to desktop. ProblemType: Package DistroRelease: Ubuntu 18.04 Package: avahi-daemon 0.7-3.1ubuntu1.1 ProcVersionSignature: Ubuntu 4.4.0-134.160-generic 4.4.140 Uname: Linux 4.4.0-134-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.3 AptOrdering: xscreensaver:amd64: Remove NULL: ConfigurePending Architecture: amd64 Date: Mon Sep 10 14:28:26 2018 DpkgHistoryLog: Start-Date: 2018-09-10 14:28:18 Remove: xscreensaver:amd64 (5.36-1ubuntu1) ErrorMessage: installed avahi-daemon package post-installation script subprocess returned error exit status 1 InstallationDate: Installed on 2017-04-27 (500 days ago) InstallationMedia: Ubuntu-Server 16.04.2 LTS "Xenial Xerus" - Release amd64 (20170215.8) Python3Details: /usr/bin/python3.6, Python 3.6.5, python3-minimal, 3.6.5-3ubuntu1 PythonDetails: /usr/bin/python2.7, Python 2.7.15rc1, python-minimal, 2.7.15~rc1-1 RelatedPackageVersions: dpkg 1.19.0.5ubuntu2 apt 1.6.3ubuntu0.1 SourcePackage: avahi Title: package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade: installed avahi-daemon package post-installation script subprocess returned error exit status 1 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: avahi (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package bionic need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791688 Title: package avahi-daemon 0.7-3.1ubuntu1.1 failed to install/upgrade: installed avahi-daemon package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/avahi/+bug/1791688/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1785675] Re: Security fix: check if IOMMU page is contained in the pinned physical page
** Changed in: linux (Ubuntu) Status: Triaged => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1785675 Title: Security fix: check if IOMMU page is contained in the pinned physical page To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1785675/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker
** Changed in: kernel-sru-workflow/snap-release-to-candidate Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788751 Title: linux-azure: 4.15.0-1023.24 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1731417] Re: Installed network printer removed automatically when turned off
I have the same problem in Ubuntu 18.04.1 with a Laserjet CP1025nw... very annoying,,, is there a fix for that bug? How can I get it? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1731417 Title: Installed network printer removed automatically when turned off To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cups-filters/+bug/1731417/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791706] [NEW] /lib/systemd/systemd-journald:6:journal_file_append_data:journal_file_append_entry:write_to_journal:dispatch_message_real:server_dispatch_message
Public bug reported: The Ubuntu Error Tracker has been receiving reports about a problem regarding systemd. This problem was most recently seen with package version 237-3ubuntu10.3, the problem page at https://errors.ubuntu.com/problem/82f6ccb214b5973176f89848a8f79045e422806c contains more details, including versions of packages affected, stacktrace or traceback, and individual crash reports. If you do not have access to the Ubuntu Error Tracker and are a software developer, you can request it at http://forms.canonical.com/reports/. ** Affects: systemd (Ubuntu) Importance: Undecided Status: New ** Tags: artful bionic cosmic kylin-15.04 vivid wily xenial yakkety zesty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791706 Title: /lib/systemd/systemd- journald:6:journal_file_append_data:journal_file_append_entry:write_to_journal:dispatch_message_real:server_dispatch_message To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1791706/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1789471] Re: installation process crashed with this error
Can you run sudo efibootmgr -vv and post the output? ** Changed in: grub-installer (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1789471 Title: installation process crashed with this error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1789471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1785434] Re: VLC under Wayland causes system freezes in fullscreen mode
Me three. Intel Iris pro 5200. Xorg is fine. Wayland crashes on full screen. Ubuntu 18.04.1. VLC 3.0.3. Wayland 2:1.19.6-1ubuntu4. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1785434 Title: VLC under Wayland causes system freezes in fullscreen mode To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/vlc/+bug/1785434/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1771124] Re: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash
without this patch I get a segfault -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1771124 Title: [SRU] libpcl cflags -march=native -msse4.2 makes user-compiled programs crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pcl/+bug/1771124/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791691] Re: PATH broken in systemd units
This is a security issue too. ** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791691 Title: PATH broken in systemd units To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/1791691/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1789319] Re: Unable to load shimx64.efi using iPXE over UEFI
Isn't that just a workaround? There is still an underlying bug in the iPXE network driver isn't there? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1789319 Title: Unable to load shimx64.efi using iPXE over UEFI To manage notifications about this bug go to: https://bugs.launchpad.net/maas/+bug/1789319/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791731] [NEW] linux-kvm: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-kvm (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-kvm (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-kvm (Ubuntu Bionic) Importance: Undecided Status: New ** Tags added: bionic ** Changed in: linux-kvm (Ubuntu Bionic) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/certification-testing Status: New => Invalid ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/promote-to-proposed Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/promote-to-proposed
[Bug 1791728] [NEW] linux-gcp: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791719 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/snap-release-to-beta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-candidate Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-edge Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-stable Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-gcp (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-gcp (Ubuntu Bionic) Importance: Medium Status: Confirmed ** Tags: bionic kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791719 ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-gcp (Ubuntu Bionic) Importance: Undecided Status: New ** Tags added: bionic ** Changed in: linux-gcp (Ubuntu Bionic) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-beta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-candidate Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-edge Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-stable Importance: Undecided Status: New ** Also
[Bug 1787649] Re: ubuntu-release-upgrader crashed with SystemError: E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages.
Hello errors.ubuntu.com, or anyone else affected, Accepted ubuntu-release-upgrader into bionic-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source /ubuntu-release-upgrader/1:18.04.26 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed.Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested and change the tag from verification-needed-bionic to verification-done-bionic. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification-failed-bionic. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance! ** Changed in: ubuntu-release-upgrader (Ubuntu Bionic) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-bionic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787649 Title: ubuntu-release-upgrader crashed with SystemError: E:Error, pkgProblemResolver::Resolve generated breaks, this may be caused by held packages. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1787649/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788755] Re: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-xenial ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788755 Title: linux-azure: 4.15.0-1023.24~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788755/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788760] Re: linux-hwe: 4.15.0-34.37~16.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-xenial ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788760 Title: linux-hwe: 4.15.0-34.37~16.04.1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788747] Re: linux-raspi2: 4.15.0-1022.24 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788747 Title: linux-raspi2: 4.15.0-1022.24 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788747/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787280] Re: python3-pandas-lib missing in armhf version
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: pandas (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787280 Title: python3-pandas-lib missing in armhf version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1787280/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1787280] Re: python3-pandas-lib missing in armhf version
** Tags added: unmetdeps -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1787280 Title: python3-pandas-lib missing in armhf version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pandas/+bug/1787280/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788753] Re: linux-kvm: 4.15.0-1021.21 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788753 Title: linux-kvm: 4.15.0-1021.21 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788753/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1670291] Re: Landscape: Upgrade 14.04.5 to 16.04.2 fails unable to reboot
Note to self, I wonder if: https://github.com/systemd/systemd/commit/c68867da320de296917820e5a76e902a8a86be5a https://github.com/systemd/systemd/commit/7f96539d45028650f2ba9452095473a9c455d84b are related. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1670291 Title: Landscape: Upgrade 14.04.5 to 16.04.2 fails unable to reboot To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/landscape-client/+bug/1670291/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788750] Re: linux-aws: 4.15.0-1021.21 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788750 Title: linux-aws: 4.15.0-1021.21 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1786229] Re: SRU 1.4 tracking bug
This bug was fixed in the package ubuntu-image - 1.4+16.04ubuntu2 --- ubuntu-image (1.4+16.04ubuntu2) xenial; urgency=medium * Demote the qemu-user-static dependency to Suggests, modify the code to gracefully handle the lack of qemu binaries for cross-compilation. (LP:1788177) * Add missing information about UBUNTU_IMAGE_QEMU_USER_STATIC_PATH to the manpage. * SRU tracking number LP: #1786229 ubuntu-image (1.4+16.04ubuntu1) xenial; urgency=medium * Add support for classic cross-compilation, add qemu-user-static as a dependency. (LP:1772061) * Work-around the API rate limit exceeded failures from github in the haschangelog test case by re-writing it not to use python3-github anymore and instead check for the PR trivial label manually. (LP:1690081) * Work-around Permission denied errors printing to stderr whenever parted is imported, causing some of our basic autopkgtests failing. (LP:1775085) * Fix some coverage and autopkgtest failures per changes in the environment. Switch to using deb-packaged voluptuous. (LP:1782313) * Add the new connections: stanza to the gadget.yaml parser. (LP:1780217) * SRU tracking number LP: #1786229 -- Łukasz 'sil2100' Zemczak Tue, 21 Aug 2018 15:25:59 +0200 ** Changed in: ubuntu-image (Ubuntu Xenial) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1786229 Title: SRU 1.4 tracking bug To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-image/+bug/1786229/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788744] Re: linux: 4.15.0-34.37 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788744 Title: linux: 4.15.0-34.37 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788751] Re: linux-azure: 4.15.0-1023.24 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788751 Title: linux-azure: 4.15.0-1023.24 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788751/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788752] Re: linux-gcp: 4.15.0-1019.20 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: New => Confirmed ** Changed in: kernel-sru-workflow/promote-to-updates Status: New => Confirmed ** Tags removed: block-proposed-bionic ** Tags removed: block-proposed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788752 Title: linux-gcp: 4.15.0-1019.20 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788752/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1529460] Re: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3
** Tags added: upgrade-software-version -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1529460 Title: Update nautilus-python to latest upstream version - 1.2.x - migrate to Python 3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus-python/+bug/1529460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791271] Re: FFe release 1.8.16
This bug was fixed in the package network-manager-applet - 1.8.16-1ubuntu1 --- network-manager-applet (1.8.16-1ubuntu1) cosmic; urgency=low * Merge from Debian unstable. Remaining changes: (LP: #1791271) - debian/control, debian/rules: + Drop gir1.2-nmgtk-1.0 as part of the libnm-gtk removal process + use libappindicator for now, it is tested and in main and the new ayatana variant from Debian hasn't been reviewed yet. + Run dh_translations - debian/control, debian/rules, debian/libnm-gtk*.symbols: + Add legacy libnm-gtk packages, until unity-control-center is ported (see LP 1744619) - Add lp341684_device_sensitive_disconnect_notify.patch: + Show correct notification messages for disconnect events, to be in line with the other *connect*text patches. - Add lp460144_correctly_update_notification.patch: cleaner notification messages, and allow for messages to be updated instead of cleared. - Add Have-the-appindicator-enabled-by-default.patch: + enable appindicator by default. - Add applet-wifi-menu-before-vpn.patch: + Show Create New and Connect to Hidden wifi menu items with the other Wifi items, rather than separated by the VPN menus. - Allow-to-create-and-connect-to-Ad-Hoc-RSN-networks.patch: + Enable Ad-Hoc using WPA RSN - Make-sure-the-behavior-for-policykit-restricted-acti.patch, Support-hiding-rather-than-desensitizing-disallowed-items.patch, + provide methods to desensitize and hide menu items which are useless given the current policykit policy level of the user. network-manager-applet (1.8.16-1) unstable; urgency=medium * New upstream version 1.8.16 * Rebase patches * Add Build-Depends on mobile-broadband-provider-info. This is required to get the database path at build time network-manager-applet (1.8.14-1) unstable; urgency=medium * New upstream version 1.8.14 * Rebase patches * Update install path for AppStream metadata files network-manager-applet (1.8.12-2) unstable; urgency=medium * NMNetworkMenuItem: Don't double-free priv->dupes (Closes: #900869) network-manager-applet (1.8.12-1) unstable; urgency=medium * New upstream version 1.8.12 * Rebase patches * Update symbols file for libnma -- Didier Roche Thu, 06 Sep 2018 12:31:31 +0200 ** Changed in: network-manager-applet (Ubuntu) Status: Triaged => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791271 Title: FFe release 1.8.16 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager-applet/+bug/1791271/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791690] nautilus crashed with SIGSEGV
Stacktrace: No stack. StacktraceSource: StacktraceTop: ThreadStacktrace: ** Tags added: apport-failed-retrace ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791690 Title: nautilus crashed with SIGSEGV To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1791690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1788748] Re: linux-oem: 4.15.0-1018.21 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1788748 Title: linux-oem: 4.15.0-1018.21 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1788748/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791709] Re: systemd dependency loop with systemd-update-utmp.service
If there is any question about the systemd version being an in house version. We only backported a bug fix from upstream. That being said it might be a cause of the issue however we only had issues with auditd and no other services, therefore we still think this bug is relevant. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1791709 Title: systemd dependency loop with systemd-update-utmp.service To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/auditd/+bug/1791709/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1791747] [NEW] linux-lts-xenial: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791745 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-lts-xenial (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-lts-xenial (Ubuntu Trusty) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-backport-of-1791745 kernel-sru-cycle-2018.09.10 trusty ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-lts-xenial (Ubuntu Trusty) Importance: Undecided Status: New ** Tags added: trusty ** Changed in: linux-lts-xenial (Ubuntu Trusty) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/automated-testing Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/certification-testing Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/certification-testing Assignee: (unassigned) => Canonical Hardware Certification (canonical-hw-cert) ** Changed in: kernel-sru-workflow/prepare-package Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package Assignee: (unassigned) => Canonical Kernel Team (canonical-kernel-team) ** Changed in: kernel-sru-workflow/prepare-package-meta Importance: Undecided => Medium ** Changed in: kernel-sru-workflow/prepare-package-meta Assignee: (unassigned) =>
[Bug 1791749] [NEW] linux-aws: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow -- swm properties -- kernel-stable-master-bug: 1791745 ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: Invalid ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/snap-release-to-beta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-candidate Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-edge Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-stable Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux-aws (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux-aws (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-derivative-of-1791745 xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux-aws (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux-aws (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-beta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-candidate Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-edge Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-stable Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/upload-to-ppa Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/verification-testing Importance: Undecided Status: New ** Changed in: kernel-sru-workflow/automated-testing Importance: Undecided
[Bug 1791745] [NEW] linux: -proposed tracker
Public bug reported: This bug is for tracking the upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow backports: bug 1791746 (linux-aws), bug 1791747 (linux-lts-xenial) derivatives: bug 1791749 (linux-aws), bug 1791750 (linux-euclid), bug 1791751 (linux-kvm), bug 1791752 (linux-raspi2), bug 1791753 (linux-snapdragon) ** Affects: kernel-sru-workflow Importance: Medium Status: In Progress ** Affects: kernel-sru-workflow/automated-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/prepare-package Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: Confirmed ** Affects: kernel-sru-workflow/prepare-package-meta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/prepare-package-signed Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/promote-to-proposed Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-security Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/promote-to-updates Importance: Medium Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) Status: New ** Affects: kernel-sru-workflow/regression-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/security-signoff Importance: Medium Assignee: Canonical Security Team (canonical-security) Status: New ** Affects: kernel-sru-workflow/snap-certification-testing Importance: Medium Assignee: Canonical Hardware Certification (canonical-hw-cert) Status: New ** Affects: kernel-sru-workflow/snap-release-to-beta Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-candidate Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-edge Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/snap-release-to-stable Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: kernel-sru-workflow/upload-to-ppa Importance: Medium Status: Invalid ** Affects: kernel-sru-workflow/verification-testing Importance: Medium Assignee: Canonical Kernel Team (canonical-kernel-team) Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Xenial) Importance: Medium Status: Confirmed ** Tags: kernel-release-tracking-bug kernel-release-tracking-bug-live kernel-sru-cycle-2018.09.10 kernel-sru-master-kernel xenial ** Tags added: kernel-release-tracking-bug ** Tags added: kernel-release-tracking-bug-live ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Tags added: xenial ** Changed in: linux (Ubuntu Xenial) Status: New => Confirmed ** Also affects: kernel-sru-workflow/automated-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-meta Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/prepare-package-signed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-proposed Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-security Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/promote-to-updates Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/regression-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/security-signoff Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-certification-testing Importance: Undecided Status: New ** Also affects: kernel-sru-workflow/snap-release-to-beta