Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
@Tobias, that bug is 15 years old. Perhaps you meant another one?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2054296
Title:
Don't restrict to linux-laptop
Status in protection-domain
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of K
** Changed in: linux-hwe-6.5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2063009
Title:
package linux-headers-6.5.0-28-generic 6.5.0-28.
*** This bug is a duplicate of bug 2061851 ***
https://bugs.launchpad.net/bugs/2061851
** This bug has been marked a duplicate of bug 2061851
linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression with new apparmor
profiles/features
--
You received this bug notification because you ar
Hello, input/output errors like this are usually an indicator of failing
hardware. Make sure your backups are in good working order, and make
sure you don't overwrite backups with bad data.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to l
I had a similar problem. Flip the mouse over and look for a hair in the
sensor. If that isn't it, try replacing the mouse, it might be a bad
cable or similar. (That worked for me.)
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you ar
I added llvm and gcc toolchains to the affected packages list here based
on some internet reports, not my own testing:
https://stackoverflow.com/questions/77894856/possible-bug-in-gcc-sanitizers
https://stackoverflow.com/questions/77826203/addresssanitizer-randomly-throws-sigsegv-with-no-explanati
** Also affects: llvm-toolchain-15 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-16 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-17 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-
Public bug reported:
Hello, a pal recently mentioned some debugging printk statements in our
kernels, eg:
evict_inodes inode d69da69b, i_count = 1, was skipped!
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2037214 has some
additional details.
https://bugs.launchpad.net/ubuntu/+s
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-meta-hwe-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2052961
Title:
Error: OCI runtime error: crun: chm
Hello Andrew, this is confusing, based on the segfault from the
maintainer scripts, I was expecting to see more evidence of memory
failure or disk failure in your logs, but they look reasonable enough.
It might still be worth running memtest86 overnight or over the weekend,
just to be sure.
Thank
** Changed in: dkms (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/2051414
Title:
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15
*** This bug is a duplicate of bug 2051414 ***
https://bugs.launchpad.net/bugs/2051414
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 2051414
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15 failed to
install/upgrade: ru
*** This bug is a duplicate of bug 2051414 ***
https://bugs.launchpad.net/bugs/2051414
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 2051414
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15 failed to
install/upgrade: ru
Hello, thanks for the bug report. This looks like something to report to
the Anbox upstream developers for help.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in U
Hello, thanks for the report. This looks like it might be an issue with
the synosnap DKMS package. You might want to contact whoever supplied
this to help fix it.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of
Robie, good idea, I've added a note about pptpd and bcrelay being
removed, with a link back here:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2041751
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
As far as I know, no one has made an effort to try to improve the
situation lately. There's some discussion at
https://lists.ubuntu.com/archives/apparmor/2024-February/013091.html
that may be enlightening, if not encouraging.
Thanks
--
You received this bug notification because you are a member
Hello, I suspect this is more likely a program on your computer acting
poorly.
I suggest trying a few different tools from the bpfcc-tools package:
- opensnoop-bpfcc
- filelife-bpfcc
- dirtop-bpfcc
- filetop-bpfcc
Thanks
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You re
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2049768
Title:
my computer doesnt start
Status in linux package in Ubuntu:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983153
Title:
cpu timer UAF
Status in linux package in Ubuntu:
New
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983154
Title:
nft allows references to objects on different tables
S
Microsoft has implemented an IPSec stack:
https://learn.microsoft.com/en-us/windows/win32/fwp/ipsec-
configuration#how-to-use-wfp-to-configure-ipsec-policies
"The Microsoft implementation of IPsec uses Windows Filtering Platform
to setup IPsec policies."
This page is a bit thin on which applicati
Hello FACELLO, a few thoughts:
This bug is specifically due to these log messages. Try installing the
packages that the error messages have identified:
make -j12 KERNELRELEASE=6.2.0-37-generic all
INCLUDEDIR=/lib/modules/6.2.0-37-generic/build/include
KVERSION=6.2.0-37-generic DKMS_BUILD=1...(b
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
There's over 2k instances of errors like this in the terminal log:
dpkg: 경고: files list file for package 'libctf0:amd64' missing; assuming
package has no files currently installed
This is not a happy installation. I recommend a fresh install when
convenient.
As for the prompt, the history log su
xnox, rincebrain came to the conclusion that the conditions for this bug
have existed since 0.6.2:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30dc73 and
robn thinks the conditions for this bug was introduced in 2006:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30d
It looks like you're still working with rincebrain to figure out the
root cause; please do update this if you come to a conclusion. (On the
one hand, I'm optimistic, he's really good at this stuff. On the other
hand, the encryption stuff feels more brittle than than usual.)
Thanks
** Changed in:
Hello Victor, I suspect you may have a hardware problem. I suggest
running memtest86+ overnight or over the weekend as a first step.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is sub
*** This bug is a duplicate of bug 2044657 ***
https://bugs.launchpad.net/bugs/2044657
** This bug has been marked a duplicate of bug 2044657
zfs block cloning file system corruption
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
*** This bug is a duplicate of bug 2044657 ***
https://bugs.launchpad.net/bugs/2044657
** This bug has been marked a duplicate of bug 2044657
zfs block cloning file system corruption
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Please use ubuntu-bug to file bug reports, that will include a lot more
useful information. Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Package changed: linux (Ubuntu) => ubuntu
--
You received this bug n
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2041951
Title:
package linux-tools-common 5.15.0-86.96 failed to install/upgrad
> +ksmd
I'm concerned about this change. Historically, the page-merging code has
allowed cross-VM snooping, including even recovery of GnuPG private
keys: https://eprint.iacr.org/2013/448.pdf
Unless something has changed to mitigate the cross-domain privacy leaks
in ksmd, it ought to be opt-in f
After running updates, this no longer occurs for me.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/2024250
Title:
package linux-image-6.2.0-23-generic 6.2.0-23.23 failed to
install/upg
Ah, I figured out what's going on: the upper limit of
special_small_blocks is checked against the currently value of
recordsize. But, the pool doesn't actually have a recordsize set at this
point, because the pool doesn't even exist. So, the setting that was
given immediately before on the command
Public bug reported:
Hello, I'm trying to create a new zfs pool using the special allocation
vdevs and I get an error message that doesn't make sense to me:
cannot create 'newsrv': invalid 'special_small_blocks=262144' property:
must be zero or a power of 2 from 512B to 128K
$ echo "2 ^ 18" | bc
Thank you for taking the time to report this bug and helping to make
Ubuntu better. It seems that there was an error on your system when
trying to update the kernel on your system due to a lack of free space
in your boot partition. Please resolve this situation manually and try
the update again.
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
I'm very confused about this report, hopefully you can clarify a few
things:
Package: linux-headers-6.2.0-20-generic 6.2.0-20.20
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.19.0-40-generic
root=UUID=3757a187-5a56-49cb-b5b3-1ee6159919aa ro quiet splash vt.handoff=7
Setting up linux-image-6.2.0
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020091
Title:
package linux-headers-6.2.0-20-generic 6.2.0-20.20 failed to
i
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-restricted-modules-oracle in
Ubuntu.
https://bugs.launchpad.net/bugs/2019956
Title:
package linux-modules-nvidia-515-oracl
Hello, what does "increase" mean in "increase dropped when I check
ifconfig"?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2015518
Title:
ifconfig increase dropped value
Statu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008823
Title:
/sys/kernel/boot_params/data leaks random data
Status
Oh yes, an ec2 instance I have that has non-zero content at the end of
the file:
Linux ip-172-26-15-115 4.4.0-1154-aws #169-Ubuntu SMP Fri Feb 17
11:05:27 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribe
Hello, please check your host system's logs for things like hard drive
failure. I don't know vmware, I'm not sure what exactly they would look
like.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packag
Aha, cool, thanks Mike; I started with xxd myself, and got stuff that
looked enough like ELF objects that I was prepared to trust file's
assessment of them as ELF objects.
My machine with non-zero content at the end:
Linux hunt 4.15.0-201-generic #212-Ubuntu SMP Mon Nov 28 11:29:59 UTC 2022
x86_6
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2007840
Title:
Cheese camera needs update
Status in linux package in Ubuntu:
Thanks Dann, please use CVE-2023-0881 for this issue.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0881
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bug
** Information type changed from Private Security to Public
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lowlatency in Ubuntu.
https://bugs.launchpad.net
Hello Charles, the development release isn't intended for production
use; a lot of the things common to security updates in supported
releases just won't be present for the development release. It'll
eventually get a new kernel package based on a new upstream series and
we'll address whatever remai
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2003588
Title:
CVE 2022-4378 fix is in Kinetic, needed on Lunar
Statu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/200
Title:
Mainline Ubuntu Linux kernel builds failing for >= 6.0.11 Throug
Public bug reported:
Hello, on my power9 system apt-get build-dep linux doesn't work:
[sarnold@fitzhume:/tmp/linux-6.1.4] 20s $ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 22.04.1 LTS
Release:22.04
Codename: jammy
[sarnold@fitzhume:/tmp
Thanks Nilson, excellent find on the bugzilla report.
The linked linux-hardening thread makes me think this is 'just' an
undefined-but-safe operation: the sort of thing that's good to fix, in
case a future compiler makes an unsafe optimization, but not likely to
be a cause for concern today.
Than
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993821
Title:
salida ficticia
Status in linux package in Ubuntu:
New
Bug d
Just a heads-up that SGX has been deprecated by Intel:
https://edc.intel.com/content/www/us/en/design/ipla/software-
development-platforms/client/platforms/alder-lake-desktop/12th-
generation-intel-core-processors-datasheet-volume-1-of-2/004/deprecated-
technologies/
===
The processor has deprec
You may wish to try suspend to ram, instead of hibernation; please save
any open work before testing, some systems don't handle suspend to ram
well.
sudo systemctl suspend
Hopefully this just works and suffices for your needs. It's not the same
as hibernation, but might reduce power use enough to
I've been asked to prepare a summary of the current status of this bug:
- there's a grub2 security update that's been published and then pulled:
https://launchpad.net/ubuntu/+source/grub2-unsigned/2.06-2ubuntu10/+publishinghistory
https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/19
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990236
Title:
5.19.0-17.17: kernel NULL pointer dereference, address:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988108
Title:
kernal 5.15.0-46 error out of memory when boosting
Status in li
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Kernel folks, what's the deal with this message? I thought I deleted my
current kernel occasionally but I can't recall seeing this screen
before.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
http
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1987148
Title:
package linux-image-5.15.0-43-generic 5.15.0-43.
Marked invalid as packages for a newer upstream release are already
available.
** Changed in: wireless-regdb (Ubuntu Bionic)
Status: In Progress => Invalid
** Changed in: wireless-regdb (Ubuntu)
Status: In Progress => Invalid
** Changed in: wireless-regdb (Ubuntu Focal)
Stat
*** This bug is a duplicate of bug 1980145 ***
https://bugs.launchpad.net/bugs/1980145
Fixed by LP: #1980145 which updated to the 2022.06.06 release. Marking
as a duplicate of that bug.
** This bug has been marked a duplicate of bug 1980145
New upstream release 2022.06.06
--
You received
** Changed in: wireless-regdb (Ubuntu Impish)
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to wireless-regdb in Ubuntu.
https://bugs.launchpad.net/bugs/1980145
Title:
New upstream release 2022.06.
I tested the jammy, focal, and bionic patches as described in the test
case from the description. The kernel was able to load the database, and
I was able to successfully query and change the regulatory domain.
Marking verification as done.
** Tags removed: verification-needed verification-needed-
The autopkgtest failure for linux-oracle is a timeout during the rebuild
test. Clearly this isn't caused by the wireless-regdb update, so the
test should be retried or hinted (I can do neither).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed
I can see how that's a bit confusing; possibly I should be handling the
backport changelogs differently. But yes, I did not remove the Suggests:
crda in the backports except in jammy where the crda package had also
been removed.
--
You received this bug notification because you are a member of Ke
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977699
Title:
zfs icp has deselected all optimized aes & gcm i
** Package changed: ubuntu-release-upgrader (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1981185
Title:
soft lockup -CPU#11 struck for 186s!
Status in linux
Probably a dup of https://bugs.launchpad.net/ubuntu/+source/linux-
aws-5.13/+bug/1977919
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-gcp-5.13 in Ubuntu.
** Changed in: linux-oem-5.14 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1976181
Title:
CVE-2021-28711 and CVE-2021-28712
Status in
Hello Luís, we released a fix for this CVE for linux-azure-fde on 22
February 2022 in USN-5294-2:
https://ubuntu.com/security/notices/USN-5294-2
The linux-azure-fde source package is actually just some scripts, and
our kernel update tooling shows incorrect results on the webpage as a
result. Hopef
I'm sorry, this doesn't make enough sense for me to know where to re-
assign this. I suggest giving a lot more details about what applications
you're using, etc.
Thanks
** Information type changed from Private Security to Public
** Package changed: linux (Ubuntu) => ubuntu
--
You received this
The tell-tale sign is the following repeated output in dmesg:
[ 478.477931] ata3.00: configured for PIO0
[ 483.532822] ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
[ 483.542269] ata3.00: configured for PIO0
[ 486.564367] ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300)
... repe
I'm seeing the exact same problem -- I've filed bug #1970136, which can
be duped to this one.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1968155
Title:
Multiple errors with DVD drive
Public bug reported:
Optical drive is a HL-DT-ST BDDVDRW GGC-H20L, 1.00; Problem is identical
to Bug #1968155.
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: linux-image-5.4.0-109-generic 5.4.0-109.123
ProcVersionSignature: Ubuntu 5.4.0-109.123-generic 5.4.178
Uname: Linux 5.4.0-109-generi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1964827
Title:
zfs-linux upstream at 2.1.4, jammy has 2.1.2
Status in zfs-l
I have seen this bug too.
System: Dell R740xd
I have tried booting using both EFI and legacy BIOS.
I have tried using the latest 22.04 server beta and daily release.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
Hello, the tail end of the dpkg terminal log suggests mesa-amdgpu-vdpau-
drivers might be to blame; I don't see that package on my local mirror,
did this come from outside Ubuntu? If so, you may need to report the
issue there.
Thanks
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Linux Mint replaces the kernel; if you're having errors with basic
kernel operations you'll need to seek support from the Mint community.
Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug noti
nable to use wireless channels that
they were able to use previously. Regulatory rules may have also changed
for the user's region, which could also make some channels unusable, but
this would not be a bug.
** Affects: wireless-regdb (Ubuntu)
Importance: Medium
Assignee: Seth For
It looks like I lost track of this browser tab a lot longer than I
expected.
Thanks Hangyu Hua for the fixes! :)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
Sounds good, thanks:
[0.00] Linux version 5.11.0-49-generic (buildd@lcy02-amd64-054)
(gcc (Ubuntu 10.3.0-1ubuntu1) 10.3.0, GNU ld (GNU Binutils for Ubuntu)
2.36.1) #55-Ubuntu SMP Wed Jan 12 17:36:34 UTC 2022 (Ubuntu
5.11.0-49.55-generic 5.11.22)
btw, there were a bunch of memory allocati
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: vlc (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1958787
Title:
CRASH - [drm
Yes, hopefully you can do that without resorting to a rescue image.
Booting with `init=/bin/bash` may help if you can't uninstall it gently.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
Nguyen, do you have any antivirus tools installed? That's the usual
cause of errors like this.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1956585
Title:
OOB write on BPF_RING
1 - 100 of 4077 matches
Mail list logo