Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
There's a relevant thread here:
https://lore.kernel.org/all/27131a7fae2794a63f4f285a20e41116ba4198f3.ca...@gmail.com/T/
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1976556
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
seems to be fixed in linux-image-6.5.0-16-generic (frpm kernel ppa).
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2037214
Title:
evict_inodes inode xxx, i_count = 1, was
Mario, I would I do that, please?
(aka "Please add kernel log from both your old kernel and new kernel.")
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2042713
Title:
Pale Green blank
*** This bug is a duplicate of bug 2037214 ***
https://bugs.launchpad.net/bugs/2037214
** This bug has been marked a duplicate of bug 2037214
evict_inodes inode xxx, i_count = 1, was skipped!
--
You received this bug notification because you are a member of Kernel
Packages, which is
I've also been meeting this bug since kernel serie 6.2 (and 6.1 I think).
However I only have one monitor, but I use a HDMI switch.
It happens on every boot and the monitor is already awaken when reaching linux
boot. The crash happens a few seconds after the graphical target is reached
(whether
Public bug reported:
Since linux Kernel 5.15.0-86, when I only get a pale green blank screen after
login Linux Mint 21.2 Victoria / Cinnamon so I got to use 5.15.0-84.
N.B. I'm using a Graphic AMD processor with unconventional screens resolutions
(1280x1025 (5/4) & 1360x768 (16:9))
inxi :
CPU:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2027846
Title:
tmpfs: Deleted files keep reappearing
Status in linux
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
> The build at
https://launchpad.net/ubuntu/+source/mysql-8.0/8.0.33-0ubuntu2 passed
for armhf and MTR/CI did not fail. Why is it failing for users then?
The tests are disabled on armhf:
ifneq (,$(filter $(ARCH), amd64 i386))
TESTSUITE_FAIL_CMD:=exit 1
else
TESTSUITE_FAIL_CMD:=true
endif
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
And I with 5.14.0-1056-oem
Several process cannot get stopped including systemd -- also sd_[something]
I get an injunction to do:
echo 0 > /proc/sys/kernel/hung_task_timeout_secs
but I understand it is only to silence the warning...
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: linux-restricted-modules (Ubuntu)
Status: New => Fix Committed
** Changed in: linux-restricted-modules (Ubuntu Bionic)
Status: New => Fix Committed
** Changed in: linux-restricted-modules (Ubuntu Focal)
Status: New => Fix Committed
** Changed in:
** Changed in: openafs (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1914279
Title:
linux from security may force reboots without complete
** Changed in: nvidia-graphics-drivers-390 (Ubuntu)
Status: New => Fix Committed
** Changed in: nvidia-graphics-drivers-470 (Ubuntu)
Status: New => Fix Committed
** Changed in: nvidia-graphics-drivers-470-server (Ubuntu)
Status: New => Fix Committed
** Changed in:
This is also required:
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/profiles/audio/avdtp.c?id=0388794dc5fdb73a4ea88bcf148de0a12b4364d4
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
This bug is to track the security update that will contain these
possibly security-relevant commits:
https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?id=e2b0f0d8d63e1223bb714a9efb37e2257818268b
Public bug reported:
At automatic update, the system encountered an error and proposed to
report it
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: zfsutils-linux 0.8.3-1ubuntu12.14
ProcVersionSignature: Ubuntu 5.13.0-41.46~20.04.1-generic 5.13.19
Uname: Linux 5.13.0-41-generic x86_64
The security team doesn't track security updates using launchpad bugs.
The CVE tracker is where security updates are tracked:
https://ubuntu.com/security/cves
You can follow the progress on those CVEs here:
https://ubuntu.com/security/cve-2022-25258
https://ubuntu.com/security/cve-2022-25375
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I the same problem with several machines using Jabra Speak 710.
5.13.0-35 works perfectly on all though, while 5.13.0-37 produces distorted
sound.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.13 in Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1949186
Title:
Missing Linux Kernel mitigations for 'SSB -
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Fixed by doing the following:
# sudo apt install linux-oem-20.04d
This installed kernel 5.14.0-1022-oem which does not have the bug.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1952155
Same white noise issue on Lenovo IdeaPad 3 AMD Ryzen 5 5500U Processor, Radeon
7 graphics, running 20.04.3.
Happens when booting to kernel 5.13.0-25.
Does not happen when booting to kernel 5.11.0-46.
As with overlord_tm, graphics work fine up to the point where the disk decrypt
occurs.
--
You
Does this fix also work for Impish Indri (21.10) because I noticed the
same issue but I was not able to fix the issue by manually changing the
line within /usr/share/initramfs-tools/scripts/zfs.
--
You received this bug notification because you are a member of Kernel
Packages, which is
My assessment of the reason appears to be wrong, USB storage at boot
time isn't working for me under 5.13, but the modules seem like they're
present.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
I think this is affecting the latest 5.13 kernels, the usb-storage
modules appear to be missing, and USB storage isn't working, I get the
device detected when I plug it in, but modules to use it are missing
since the 5.13 update.
--
You received this bug notification because you are a member of
Marking this fixed, since the problem does not occur with the current
kernel for Ubuntu 20.04.
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
You are right! With the 5.11 kernel I am now seeing igmp packets over
ethernet. Thanks!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
Title:
igc driver for Comet Lake
> A test kernel is available here:
https://kernel.ubuntu.com/~juergh/lp1938013/
I found a laptop running bionic. Updated to the newest archive kernel
and rebooted. Hit the regression immediately, dmesg would show kernel
errors right after the wlan0 lines.
With the test kernel, I've been running
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
I agree this sounds like an undesirable scenario. I think all dkms
packages should get built in -security as part of the SRU process to
prevent this sort of thing from happening in the future.
Do we do test rebuilds of all the dkms modules before switching the
kernel meta package to a new
I can confirm that this goes away under 20.04 with the HWE stack (kernel
5.8+)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1880365
Title:
Dell Vostro 5391 trackpad loses
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440088/+files/acpidump.txt
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages,
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440087/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440086/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440085/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440078/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440081/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440082/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440084/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440080/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440083/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440079/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440075/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440076/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440073/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Tags added: apport-collected focal
** Description changed:
This is occurring on Ubuntu 20.04 with kernel 5.4.0-56-generic.
To demonstrate, run
$ sudo tcpdump -nv -ienp4s0 igmp
(adjusting the interface name appropriately).
The result will be 0 packets
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440077/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440074/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1906418/+attachment/5440072/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1906418
The line from dpkg.log reporting installation of this kernel package is:
2020-12-01 06:19:50 status installed linux-image-5.4.0-56-generic:amd64
5.4.0-56.62
** Package changed: ubuntu => linux (Ubuntu)
** Description changed:
This is occurring on Ubuntu 20.04 with kernel 5.4.0-56-generic.
Public bug reported:
Hi,
When trying to connect me to the bluetooth from a microcontroller I get :
$ bluetoothctl
Agent registered
[bluetooth]# show
No default controller available
[bluetooth]# devices
No default controller available
[bluetooth]#
Could you explain how to solve
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Maybe the issue is heat, and the chip slows down of it overheats, and
some manufacturers did not include a heatsink on it, some did.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1269883
Just found by Google search to this post. I have the same issue on
Windows 10 with a AX88179 adapter. The adapter randomly crashes / driver
crashes under heavy load or the bandwidth suddenly drops down from
500mbit/s to around 3mbit/s. You can see the issue happening here:
since I migrated to 18.04 Fn keys all work, Flip screen and Touch
keyboard work
Ubuntu 20.04 gives directly the Drivers for the extra Nvidia videocard
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Hello Daniel,
since I migrated to 18.04 Fn keys all work, Flip screen and Touch
keyboard work
Ubuntu 20.04 gives directly the Drivers for the extra Nvidia videocard
So I am good :) Thank you for you inquiry
/Marc
Op 12.10.20 om 09:14 schreef Daniel van Vugt:
> This is two separate iss
you run into the same issue and has this been fixed for you on 5.4.0-48 as
well?
Kind regards,
Marc
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1886277
Title:
Regression on NFS
I issued the same bug.
Creating the file /etc/sysctl.d/90-override.conf with the input kernel.pid_max
= 32768 solved the issue for me.
Thanks for the advice!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
That is great to hear @marianrh!
I switched the entire workforce to the 5.8 kernel after the bug was
introduced on those machines that are still on 18.04 and have HWE
installed. Now I installed two machines for testing purposes with Ubuntu
20.04 and the problem reappeared quite quickly, so I put
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Ok, actually the slider is in fact to disable bluetooth completely,
please ignore my previous comment.
** Changed in: bluez (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are
Hi,
Could you please attach a screenshot of the slider you are referring to?
I believe you are confusing the slider's purpose. The slider is to make your
bluetooth computer visible to be able to pair new devices, it does not
disconnect existing devices.
** Changed in: linux (Ubuntu)
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
OK. I'm running Ubuntu under Wayland now, and after the laptop wakes up,
the mouse cursor tracks -really- quickly on the trackpad and I lose
multitouch and right-click. I can still mouse-around and click, but no
more context menus or two-finger scrolling. A restart fixes it. I guess
it runs deeper
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I have encountered this issue on Ubuntu 18.04 and now again on 19.10.
ASUS PCie AC88
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bcmwl in Ubuntu.
https://bugs.launchpad.net/bugs/1574196
Title:
Card with chipset BCM4360 [14e4:43a0]
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Do our driver packages actually contain the NVIDIA Virtual GPU Manager?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to nvidia-graphics-drivers-418 in Ubuntu.
https://bugs.launchpad.net/bugs/1852315
Title:
CVE‑2019‑5696 5697 5698
** Changed in: bluez (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1791405
Title:
bluetooth always in discoverable mode (security issue)
1 - 100 of 481 matches
Mail list logo