Incidentally, probably http://www.askubuntu.com/ would be a better place
for this question.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1341604
Title:
12.4 Ubuntu version wifi
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1329177
Title:
CONFIG_RANDOMIZE_BASE is not enabled in utopic kernel
*** This bug is a security vulnerability ***
Public security bug reported:
CONFIG_RANDOMIZE_BASE is not enabled in the utopic kernel; apparently it
does not play nicely with CONFIG_HIBERNATE.
** Affects: linux (Ubuntu)
Importance: Undecided
Status: Incomplete
--
You received this
Anders, you can try installing the 'thermald' package; it might be a
reasonable bandaid.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/751689
Title:
[Lenovo Thinkpad x201s] Overheat due
Kernel stack traces in the dmesg.
** Package changed: xorg (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1321553
Title:
Flash errors when i start ubuntu
Sta
This can be complicated to fix, but it's not impossible.
This AskUbuntu answer provides a good blueprint:
http://askubuntu.com/a/317871/33812
Remove the metapackages that reference the 'newest' kernels, dpkg
--purge some kernels (keeping a known-working kernel, and preferably one
other), re-add t
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1311598
Title:
[Lenovo ThinkPad X201 Tablet] Ultrabase x200 Audio doesn't work
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1240940
Title:
Need support for Realtek Wifi card rtl8723be [10ec:b723]
Status
Public bug reported:
My 14.04 LTS laptop no longer plays audio, where earlier releases played
audio fine.
A strace on alsamixer shows several failures:
open("/dev/snd/controlC0", O_RDONLY|O_CLOEXEC) = -1 EACCES (Permission denied)
open("/dev/aloadC0", O_RDONLY|O_CLOEXEC) = -1 ENOENT (No such file
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Re-assigning to linux, a freeze during suspend feels more likely to be
in linux than ubuntu-release-upgrader. (I might still have the package
incorrect, but this will be a start.)
Please run apport-collect 1313382 -- I suspect more log files will be
needed to debug this, and hopefully it'll recogn
Public bug reported:
My pandaboard ES runs irssi in a tmux session for me; irssi has died of
segfaults twice recently, and dmesg had these warnings:
[395523.456237] PLL GO bit not set
[395523.456604] omapdss HDMI error: failed to power on device
[395523.458251] [drm] Cannot find any crtc or sizes
And again, no more instances of this warning in my dmesg when resuming
this morning. I suspect this has already been handled.
Thanks
** Changed in: linux (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is s
I just updated to 3.13.0-24-generic and didn't see this warning after a
single suspend/resume cycle. If we're lucky this has already been
addressed.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.laun
** Tags added: kernel-fixed-upstream
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1309684
Title:
WARNING in intel_
Public bug reported:
I spotted the following warning in my dmesg:
[110593.204346] PM: Syncing filesystems ... done.
[110593.324940] PM: Preparing system for mem sleep
[110593.325213] Freezing user space processes ... (elapsed 0.001 seconds) done.
[110593.327069] Freezing remaining freezable tasks
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This is a security measure intended to prevent username enumeration --
this is an explicit design decision.
For more details, see e.g.
https://www.owasp.org/index.php/Testing_for_User_Enumeration_and_Guessable_User_Account_
(OWASP-AT-002)
Thanks
** Information type changed from Private Security
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
>From a recent apt-get -u dist-upgrade of my pandaboard omap4:
Setting up linux-image-3.5.0-239-omap4 (3.5.0-239.55) ...
Running depmod.
WARNING: found 3 modules in dependency cycles!
WARNING: /lib/modules/3.5.0-239-omap4/kernel/drivers/usb/otg/nop-usb-xceiv.ko
in dependency
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Hello,
"unexpected end of file or stream"
and
[ 5720.073418] python3[10129]: segfault at 10055 ip 0811fe8b sp bfb80930 error
4 in python3.2mu[8048000+235000]
[ 5755.725747] lsb_release[10136]: segfault at 6f20666c ip 6f20666c sp
bf899d5c error 14
I wonder if you have memory or motherboard prob
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1098216 ***
https://bugs.launchpad.net/bugs/1098216
It's not a script? How did you even find this bug? :)
The raring SRU completed successfully, and saucy (which I'm running now)
didn't exhibit this problem thanks to the bughunting done before the
raring SRU
*** This bug is a duplicate of bug 1098216 ***
https://bugs.launchpad.net/bugs/1098216
Christopher, why did your scripts inspect this bug? It was marked as a
duplicate of another bug and I cannot see any good reason for removing
the duplicate status. I am putting the duplicate back, so that th
This error message looks like you ran out of hard drive space; check df
-h output to see for sure if you've filled your filesystems.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I saw some errors in dmesg about your NICs, but I don't know if these
are why you've filed the bug report; can you add some details about what
you're seeing?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://
Seth Forshee, good news, bluntly restarting NetworkManager allowed me to
continue without the reboot:
$ sudo service network-manager restart
[sudo] password for sarnold:
network-manager stop/waiting
network-manager start/running, process 6165
I didn't see anything in my logs that suggests what t
** Description changed:
Wireless networking did not work when I resumed from suspend.
Using the indicator/applet to "Enable Networking" didn't associate my
wireless with the AP. Plugging in an Ethernet cable did not bring back
- networking.
+ networking. The hardware rfkill switch did not
Public bug reported:
Wireless networking did not work when I resumed from suspend.
Using the indicator/applet to "Enable Networking" didn't associate my
wireless with the AP. Plugging in an Ethernet cable did not bring back
networking.
A reboot allowed me to associate as I expected.
Thanks
Pro
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
If this happens in other applications than Firefox, it probably
shouldn't be filed against firefox. I'm selecting kernel at a guess; the
other choice might be xorg. I'm not sure which one would be more likely
to have a fix...
How many mouse devices have you seen this problem with? was there any
co
If it can be fixed with a Linux kernel check in, probably the 'linux'
package is a better target than the 'iptables' package.
** Changed in: iptables (Ubuntu)
Status: Fix Committed => New
** Package changed: iptables (Ubuntu) => linux (Ubuntu)
--
You received this bug notification becaus
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1241251
Title:
Some kernel modules are failing digital signature checks during boot -
kernel
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1221771 ***
https://bugs.launchpad.net/bugs/1221771
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1220226 ***
https://bugs.launchpad.net/bugs/1220226
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
If the 3.8.0-26.38-generic kernel is working well for you, I believe the
best approach to this problem might be to remove the linux-image-
extra-3.8.0-19-generic package entirely. Try this:
apt-get purge linux-image-extra-3.8.0-19-generic linux-
image-3.8.0-19-generic linux-headers-3.8.0-19-generi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Christpher, thanks, but I need to buy a CD-ROM drive before I can test a
BIOS update. :(
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1207059
Title:
[Lenovo ThinkPad T530 2359] Specifi
Joseph, because this bug report looks so similar to bug 1208532 I tested
the kernels in http://kernel.ubuntu.com/~jsalisbury/lp1208532/509384a/
-- and those allowed me to start the problematic VMs (raring i386,
raring amd64) without crashing.
I do not use my VMs as extensively as that other bug re
Joseph, I'm not sure how to record my results. 3.11.0-031100rc4-generic
could not start my VMs at all:
Error starting domain: unsupported configuration:
Domain requires KVM, but it is not available. Check
that virtualization is enabled in the host BIOS, and host
configuration is se
I've booted back into kernel 3.8.0-26-generic and have successfully had
eight VMs, including two of the troublesome ones, running for at least
ten minutes. This might be a regression in the -27 kernels.
--
You received this bug notification because you are a member of Kernel
Packages, which is su
Turning off ksm (echo 0 > /sys/kernel/mm/ksm/run) changed the crash I
got.
With ksm off, the crash is now in Xorg. I had to use the vnc viewer to
get the KVM instances past grub's boot prompt.
** Attachment added: "/var/log/kern.log"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/120705
This is reproducable without adding VMs nine and ten -- one or the other
of those VMs on its own is sufficient to kill my machine.
And this time, we got lucky, I have stack traces. I've trimmed my log to
show the crash up close, then the rest of a reboot.
** Summary changed:
- Eight KVM instance
Public bug reported:
With my linux-generic package at 3.8.0.27.45 I had a lockup while
running eight KVM instances; the soundcard continued to loop the little
tiny sample of audio it was on.
The only lines that made it to /var/log/kern.log:
Jul 31 11:11:18 hunt kernel: [10420.003674] device vnet
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
501 - 580 of 580 matches
Mail list logo