Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
@Tobias, that bug is 15 years old. Perhaps you meant another one?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to qrtr in Ubuntu.
https://bugs.launchpad.net/bugs/2054296
Title:
Don't restrict to linux-laptop
Status in protection-domain
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of K
** Changed in: linux-hwe-6.5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-hwe-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2063009
Title:
package linux-headers-6.5.0-28-generic 6.5.0-28.
*** This bug is a duplicate of bug 2061851 ***
https://bugs.launchpad.net/bugs/2061851
** This bug has been marked a duplicate of bug 2061851
linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression with new apparmor
profiles/features
--
You received this bug notification because you ar
Hello, input/output errors like this are usually an indicator of failing
hardware. Make sure your backups are in good working order, and make
sure you don't overwrite backups with bad data.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to l
I had a similar problem. Flip the mouse over and look for a hair in the
sensor. If that isn't it, try replacing the mouse, it might be a bad
cable or similar. (That worked for me.)
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you ar
I added llvm and gcc toolchains to the affected packages list here based
on some internet reports, not my own testing:
https://stackoverflow.com/questions/77894856/possible-bug-in-gcc-sanitizers
https://stackoverflow.com/questions/77826203/addresssanitizer-randomly-throws-sigsegv-with-no-explanati
** Also affects: llvm-toolchain-15 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-16 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-17 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-
Public bug reported:
Hello, a pal recently mentioned some debugging printk statements in our
kernels, eg:
evict_inodes inode d69da69b, i_count = 1, was skipped!
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2037214 has some
additional details.
https://bugs.launchpad.net/ubuntu/+s
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-meta-hwe-6.5 in Ubuntu.
https://bugs.launchpad.net/bugs/2052961
Title:
Error: OCI runtime error: crun: chm
Hello Andrew, this is confusing, based on the segfault from the
maintainer scripts, I was expecting to see more evidence of memory
failure or disk failure in your logs, but they look reasonable enough.
It might still be worth running memtest86 overnight or over the weekend,
just to be sure.
Thank
** Changed in: dkms (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in Ubuntu.
https://bugs.launchpad.net/bugs/2051414
Title:
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15
*** This bug is a duplicate of bug 2051414 ***
https://bugs.launchpad.net/bugs/2051414
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 2051414
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15 failed to
install/upgrade: ru
*** This bug is a duplicate of bug 2051414 ***
https://bugs.launchpad.net/bugs/2051414
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 2051414
package linux-image-unsigned-6.5.0-15-generic 6.5.0-15.15 failed to
install/upgrade: ru
Hello, thanks for the bug report. This looks like something to report to
the Anbox upstream developers for help.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to dkms in U
Hello, thanks for the report. This looks like it might be an issue with
the synosnap DKMS package. You might want to contact whoever supplied
this to help fix it.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of
Robie, good idea, I've added a note about pptpd and bcrelay being
removed, with a link back here:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2041751
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https:
As far as I know, no one has made an effort to try to improve the
situation lately. There's some discussion at
https://lists.ubuntu.com/archives/apparmor/2024-February/013091.html
that may be enlightening, if not encouraging.
Thanks
--
You received this bug notification because you are a member
Hello, I suspect this is more likely a program on your computer acting
poorly.
I suggest trying a few different tools from the bpfcc-tools package:
- opensnoop-bpfcc
- filelife-bpfcc
- dirtop-bpfcc
- filetop-bpfcc
Thanks
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You re
** Changed in: linux (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2049768
Title:
my computer doesnt start
Status in linux package in Ubuntu:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983153
Title:
cpu timer UAF
Status in linux package in Ubuntu:
New
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1983154
Title:
nft allows references to objects on different tables
S
Microsoft has implemented an IPSec stack:
https://learn.microsoft.com/en-us/windows/win32/fwp/ipsec-
configuration#how-to-use-wfp-to-configure-ipsec-policies
"The Microsoft implementation of IPsec uses Windows Filtering Platform
to setup IPsec policies."
This page is a bit thin on which applicati
Hello FACELLO, a few thoughts:
This bug is specifically due to these log messages. Try installing the
packages that the error messages have identified:
make -j12 KERNELRELEASE=6.2.0-37-generic all
INCLUDEDIR=/lib/modules/6.2.0-37-generic/build/include
KVERSION=6.2.0-37-generic DKMS_BUILD=1...(b
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
There's over 2k instances of errors like this in the terminal log:
dpkg: 경고: files list file for package 'libctf0:amd64' missing; assuming
package has no files currently installed
This is not a happy installation. I recommend a fresh install when
convenient.
As for the prompt, the history log su
xnox, rincebrain came to the conclusion that the conditions for this bug
have existed since 0.6.2:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30dc73 and
robn thinks the conditions for this bug was introduced in 2006:
https://gist.github.com/rincebrain/e23b4a39aba3fadc04db18574d30d
It looks like you're still working with rincebrain to figure out the
root cause; please do update this if you come to a conclusion. (On the
one hand, I'm optimistic, he's really good at this stuff. On the other
hand, the encryption stuff feels more brittle than than usual.)
Thanks
** Changed in:
Hello Victor, I suspect you may have a hardware problem. I suggest
running memtest86+ overnight or over the weekend as a first step.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is sub
*** This bug is a duplicate of bug 2044657 ***
https://bugs.launchpad.net/bugs/2044657
** This bug has been marked a duplicate of bug 2044657
zfs block cloning file system corruption
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
*** This bug is a duplicate of bug 2044657 ***
https://bugs.launchpad.net/bugs/2044657
** This bug has been marked a duplicate of bug 2044657
zfs block cloning file system corruption
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
Please use ubuntu-bug to file bug reports, that will include a lot more
useful information. Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Incomplete
** Package changed: linux (Ubuntu) => ubuntu
--
You received this bug n
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2041951
Title:
package linux-tools-common 5.15.0-86.96 failed to install/upgrad
> +ksmd
I'm concerned about this change. Historically, the page-merging code has
allowed cross-VM snooping, including even recovery of GnuPG private
keys: https://eprint.iacr.org/2013/448.pdf
Unless something has changed to mitigate the cross-domain privacy leaks
in ksmd, it ought to be opt-in f
Ah, I figured out what's going on: the upper limit of
special_small_blocks is checked against the currently value of
recordsize. But, the pool doesn't actually have a recordsize set at this
point, because the pool doesn't even exist. So, the setting that was
given immediately before on the command
Public bug reported:
Hello, I'm trying to create a new zfs pool using the special allocation
vdevs and I get an error message that doesn't make sense to me:
cannot create 'newsrv': invalid 'special_small_blocks=262144' property:
must be zero or a power of 2 from 512B to 128K
$ echo "2 ^ 18" | bc
Thank you for taking the time to report this bug and helping to make
Ubuntu better. It seems that there was an error on your system when
trying to update the kernel on your system due to a lack of free space
in your boot partition. Please resolve this situation manually and try
the update again.
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: arnold 3640 F wireplumber
/dev/snd/seq:arnold 3637 F pipewire
CasperMD5CheckResult: unknown
Date: Thu May 18 12:23:51 2023
ErrorMessage: subproces van pakket linux-headers-6.2.0-20-generic werd script
I'm very confused about this report, hopefully you can clarify a few
things:
Package: linux-headers-6.2.0-20-generic 6.2.0-20.20
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.19.0-40-generic
root=UUID=3757a187-5a56-49cb-b5b3-1ee6159919aa ro quiet splash vt.handoff=7
Setting up linux-image-6.2.0
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2020091
Title:
package linux-headers-6.2.0-20-generic 6.2.0-20.20 failed to
i
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.26.1-0ubuntu2
AptOrdering:
libqt5websockets5:amd64: Install
qownnotes:amd64: Install
NULL: ConfigurePending
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: arnold 3640 F wireplumber
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-restricted-modules-oracle in
Ubuntu.
https://bugs.launchpad.net/bugs/2019956
Title:
package linux-modules-nvidia-515-oracl
Hello, what does "increase" mean in "increase dropped when I check
ifconfig"?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2015518
Title:
ifconfig increase dropped value
Statu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2008823
Title:
/sys/kernel/boot_params/data leaks random data
Status
Oh yes, an ec2 instance I have that has non-zero content at the end of
the file:
Linux ip-172-26-15-115 4.4.0-1154-aws #169-Ubuntu SMP Fri Feb 17
11:05:27 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribe
Hello, please check your host system's logs for things like hard drive
failure. I don't know vmware, I'm not sure what exactly they would look
like.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packag
Aha, cool, thanks Mike; I started with xxd myself, and got stuff that
looked enough like ELF objects that I was prepared to trust file's
assessment of them as ELF objects.
My machine with non-zero content at the end:
Linux hunt 4.15.0-201-generic #212-Ubuntu SMP Mon Nov 28 11:29:59 UTC 2022
x86_6
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2007840
Title:
Cheese camera needs update
Status in linux package in Ubuntu:
Thanks Dann, please use CVE-2023-0881 for this issue.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-0881
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-bluefield in Ubuntu.
https://bugs.launchpad.net/bug
** Information type changed from Private Security to Public
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lowlatency in Ubuntu.
https://bugs.launchpad.net
Hello Charles, the development release isn't intended for production
use; a lot of the things common to security updates in supported
releases just won't be present for the development release. It'll
eventually get a new kernel package based on a new upstream series and
we'll address whatever remai
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2003588
Title:
CVE 2022-4378 fix is in Kinetic, needed on Lunar
Statu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/200
Title:
Mainline Ubuntu Linux kernel builds failing for >= 6.0.11 Throug
Public bug reported:
Hello, on my power9 system apt-get build-dep linux doesn't work:
[sarnold@fitzhume:/tmp/linux-6.1.4] 20s $ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 22.04.1 LTS
Release:22.04
Codename: jammy
[sarnold@fitzhume:/tmp
Thanks Nilson, excellent find on the bugzilla report.
The linked linux-hardening thread makes me think this is 'just' an
undefined-but-safe operation: the sort of thing that's good to fix, in
case a future compiler makes an unsafe optimization, but not likely to
be a cause for concern today.
Than
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1993821
Title:
salida ficticia
Status in linux package in Ubuntu:
New
Bug d
Just a heads-up that SGX has been deprecated by Intel:
https://edc.intel.com/content/www/us/en/design/ipla/software-
development-platforms/client/platforms/alder-lake-desktop/12th-
generation-intel-core-processors-datasheet-volume-1-of-2/004/deprecated-
technologies/
===
The processor has deprec
You may wish to try suspend to ram, instead of hibernation; please save
any open work before testing, some systems don't handle suspend to ram
well.
sudo systemctl suspend
Hopefully this just works and suffices for your needs. It's not the same
as hibernation, but might reduce power use enough to
I've been asked to prepare a summary of the current status of this bug:
- there's a grub2 security update that's been published and then pulled:
https://launchpad.net/ubuntu/+source/grub2-unsigned/2.06-2ubuntu10/+publishinghistory
https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/19
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1990236
Title:
5.19.0-17.17: kernel NULL pointer dereference, address:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1988108
Title:
kernal 5.15.0-46 error out of memory when boosting
Status in li
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Kernel folks, what's the deal with this message? I thought I deleted my
current kernel occasionally but I can't recall seeing this screen
before.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
http
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.15 in Ubuntu.
https://bugs.launchpad.net/bugs/1987148
Title:
package linux-image-5.15.0-43-generic 5.15.0-43.
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1977699
Title:
zfs icp has deselected all optimized aes & gcm i
** Package changed: ubuntu-release-upgrader (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1981185
Title:
soft lockup -CPU#11 struck for 186s!
Status in linux
Probably a dup of https://bugs.launchpad.net/ubuntu/+source/linux-
aws-5.13/+bug/1977919
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-gcp-5.13 in Ubuntu.
** Changed in: linux-oem-5.14 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.14 in Ubuntu.
https://bugs.launchpad.net/bugs/1976181
Title:
CVE-2021-28711 and CVE-2021-28712
Status in
Hello Luís, we released a fix for this CVE for linux-azure-fde on 22
February 2022 in USN-5294-2:
https://ubuntu.com/security/notices/USN-5294-2
The linux-azure-fde source package is actually just some scripts, and
our kernel update tooling shows incorrect results on the webpage as a
result. Hopef
I'm sorry, this doesn't make enough sense for me to know where to re-
assign this. I suggest giving a lot more details about what applications
you're using, etc.
Thanks
** Information type changed from Private Security to Public
** Package changed: linux (Ubuntu) => ubuntu
--
You received this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1964827
Title:
zfs-linux upstream at 2.1.4, jammy has 2.1.2
Status in zfs-l
Hello, the tail end of the dpkg terminal log suggests mesa-amdgpu-vdpau-
drivers might be to blame; I don't see that package on my local mirror,
did this come from outside Ubuntu? If so, you may need to report the
issue there.
Thanks
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Linux Mint replaces the kernel; if you're having errors with basic
kernel operations you'll need to seek support from the Mint community.
Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug noti
It looks like I lost track of this browser tab a lot longer than I
expected.
Thanks Hangyu Hua for the fixes! :)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux i
Sounds good, thanks:
[0.00] Linux version 5.11.0-49-generic (buildd@lcy02-amd64-054)
(gcc (Ubuntu 10.3.0-1ubuntu1) 10.3.0, GNU ld (GNU Binutils for Ubuntu)
2.36.1) #55-Ubuntu SMP Wed Jan 12 17:36:34 UTC 2022 (Ubuntu
5.11.0-49.55-generic 5.11.22)
btw, there were a bunch of memory allocati
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: vlc (Ubuntu) => linux (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1958787
Title:
CRASH - [drm
Yes, hopefully you can do that without resorting to a rescue image.
Booting with `init=/bin/bash` may help if you can't uninstall it gently.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.ne
Nguyen, do you have any antivirus tools installed? That's the usual
cause of errors like this.
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1956585
Title:
OOB write on BPF_RING
Hello Alberto, any chance for a fix for this issue? Users are still
finding this issue. In #ubuntu, 25 December 2021:
Sat 25 00:12:58 < sem> if you're curious this is the dryrun:
https://pastebin.ubuntu.com/p/N7kP5Z4mRj/
Sat 25 00:15:32 < Bashing-om> sem: I do want to know - looking ^ ,
Sat 25 00
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953518
Title:
CPU stuck
Status in linux package in Ubuntu:
Confirm
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953514
Title:
BUG_ON(!PagePrivate(page))
Status in linux package in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1953520
Title:
NULL pointer dereference in tcp_splice_read
Status in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Users are still finding this issue. In #ubuntu, 3 November 2021:
https://justpaste.it/97emx
Thanks
** Also affects: nvidia-graphics-drivers-340 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subs
Stefan, do filesystems affected by this need to be rebuilt in order to
be used by other OpenZFS distributions or releases of Ubuntu that
predate the introduction of the bug?
Thanks
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1947853
Title:
ubuntu20.04 crash
Status in linux package in Ubuntu:
Confirmed
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oem-5.13 in Ubuntu.
https://bugs.launchpad.net/bugs/1937004
Title:
Add additional Mediatek MT7921 WiFi/BT device IDs
Statu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-signed-hwe-5.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1947469
Title:
i am not able to use touchpad and inbuilt sound a
1 - 100 of 625 matches
Mail list logo