This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1846065
Title:
xenial/linux-fips: 4.4.0-1023.28
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of Kernel
Packages, which is
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1846119
Title:
bionic/linux-fips: 4.15.0-1018.21
A workaround found:
to add the following to the kernel boot arguments:
psmouse.elantech_smbus=0
** Attachment added: "dmesg on -31 kernel with psmouse.elantech_smbus=0"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1847212/+attachment/5296142/+files/dmesg31_smbus0.txt
--
You
** Summary changed:
- eoan/linux-oracle: -proposed tracker
+ eoan/linux-oracle: 5.3.0-1002.2 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296132/+files/ProcModules.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296126/+files/Lspci.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847540
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296131/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1846018
Title:
bionic/linux-oracle-edge:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
We have decided to can releasing this kernel as it has never made the
archive and we are about to want to rename this package source wise.
Killing off in this cycle.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/automated-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844378
Title:
bionic/linux-aws-fips:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-bionic
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
This also affects the mainline kernel. tested with linux-image-
unsigned-5.3.5-050305-lowlatency_5.3.5-050305.201910071830_amd64.deb
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847499
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296133/+files/PulseList.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296136/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296134/+files/RfKill.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Also affects: linux (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Bionic)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Bionic)
Status: New => In Progress
** Changed in: linux (Ubuntu)
Status: In Progress => Invalid
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296135/+files/UdevDb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-release
Status: Confirmed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1846219
Title:
Revert ESE DASD discard support
Status in
Manually setting "certification testing" status to "invalid"
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-oracle in Ubuntu.
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1845323
Title:
Trying to online dasd drive results in invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Confirmed
** Tags removed: block-proposed-disco
** Tags removed: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844668
Title:
Ubuntu 19.10 - Additional PCI patch and fix
** Changed in: ubuntu-power-systems
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1845572
Title:
udevadm trigger will fail when trying to add
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Please test latest mainline kernel:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4-rc2/
Particularly this commit:
commit 8ad8e02c2fa70cfddc1ded53ba9001c9d444075d
Author: Jan Kaisrlik
Date: Tue Aug 20 13:42:29 2019 +0200
Revert "mmc: core: do not retry CMD6 in __mmc_switch()"
--
You
Perhaps even more problematic is that the .430 driver does not have
support for the new T4 cards, whereas .418 does.
I am not an expert on Nvidia drivers, but it is very surprising to me
that the older version of the driver has support for a new piece of
hardware where the new driver does not,
** Changed in: virt-manager
Importance: Undecided => Low
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847105
Title:
very slow disk creation, snapshotting
Status in
This bug was fixed in the package mesa - 19.0.8-0ubuntu0~18.04.3
---
mesa (19.0.8-0ubuntu0~18.04.3) bionic; urgency=medium
* i965-sync-pciids.diff: Add missing pci-id's, fix descriptions. (LP:
#1845317)
-- Timo Aaltonen Thu, 26 Sep 2019 07:58:03 +0300
** Changed in: mesa
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package debian-installer - 20101020ubuntu592
---
debian-installer (20101020ubuntu592) eoan; urgency=medium
* Drop i386 build, as there is no kernel. LP: #1845714
debian-installer (20101020ubuntu591) eoan; urgency=medium
* Move master kernels to
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/promote-to-updates
Status: New => Invalid
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Invalid
** Changed in:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
All tasks have been completed and the bug is being set to Fix Released
** Changed in: kernel-sru-workflow
Status: In Progress => Fix Released
** Tags removed: kernel-release-tracking-bug-live
--
You received this bug notification because you are a member of Kernel
Packages, which is
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296127/+files/Lsusb.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847540
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296123/+files/CRDA.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847540
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296130/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296124/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296129/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296125/+files/IwConfig.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1847540/+attachment/5296128/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
apport information
** Tags added: apport-collected
** Description changed:
After updating an Ubuntu 19.04 installation (Brand new) a subsequent
update to 19.10 results in a system that panics on boot
Same panic occurs when attempting an install of 19.10 from current ISO
via USB stick
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
*** This bug is a duplicate of bug 1846641 ***
https://bugs.launchpad.net/bugs/1846641
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc:
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package debian-installer - 20101020ubuntu592
---
debian-installer (20101020ubuntu592) eoan; urgency=medium
* Drop i386 build, as there is no kernel. LP: #1845714
debian-installer (20101020ubuntu591) eoan; urgency=medium
* Move master kernels to
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
*** This bug is a duplicate of bug 1846641 ***
https://bugs.launchpad.net/bugs/1846641
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc:
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
*** This bug is a duplicate of bug 1846641 ***
https://bugs.launchpad.net/bugs/1846641
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc:
Tested also under Eoan last daily buld (kernel 5.3.0-13), touchpad
doesn't work.
** Tags added: eoan regression-release
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847212
Title:
--- Comment From heinz-werner_se...@de.ibm.com 2019-10-10 03:58 EDT---
IBM Bugzilla status -> closed, Fix Released with Eoan
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1844668
the tests now check for the existence of the package before installing
it.
** Changed in: snapd (Ubuntu)
Status: New => Incomplete
** Changed in: snapd (Ubuntu)
Status: Incomplete => Fix Released
** Changed in: snapd
Status: Incomplete => Fix Released
** Changed in:
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
Found similar bug:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1832963
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1845704
Title:
HDMI monitor is not detected as sound
I'm honestly not sure about libvirt side. I think it is worth a mail on
the list to discuss it more broadly.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847105
Title:
very slow
Ok, but maybe virt-manager should then get a switch to only create it as sparse
if the user wants it to be fast.
Many people use virt-manager to quickly test things, so I'd assume often disks
are created, only partially used for a very short time and then thrown away.
But I agree in general and
FYI - Discussion for libvirt started in https://www.redhat.com/archives
/libvir-list/2019-October/msg00467.html
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to zfs-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1847105
Title:
very
I think the discussion above summarizes this for virt-manager well.
I'll lower the prio of the remaining task for virt-manager which is "add a UI
switch to request creating images as sparse file"
@Daniel - for libvirt do you still consider reverting the changes around
c9ec7088 as it was a
The verification of the Stable Release Update for mesa has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
This bug was fixed in the package linux - 5.3.0-17.18
---
linux (5.3.0-17.18) eoan; urgency=medium
* eoan/linux: 5.3.0-17.18 -proposed tracker (LP: #1846641)
* CVE-2019-17056
- nfc: enforce CAP_NET_RAW for raw sockets
* CVE-2019-17055
- mISDN: enforce CAP_NET_RAW for
Apport was generated after booting the system with the previous kernel,
which works, but does not see my internal WiFi adapter
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is
I've recently just run into the same problem since recent updates, I've
had my XPS since October 2017 and am currently running Ubuntu 18.04.3.
No issues until last week. I think I may have selected "headset with
microphone" by accident once when inserting headphones without a
microphone, but no
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: linux-raspi2 (Ubuntu Bionic)
Importance: Undecided => Low
** Changed in: linux-raspi2 (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: linux-raspi2 (Ubuntu Bionic)
Assignee: (unassigned) => Juerg Haefliger (juergh)
--
You received this bug notification
** Changed in: linux-raspi2 (Ubuntu Bionic)
Assignee: (unassigned) => Juerg Haefliger (juergh)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1762835
Title:
Conflicting mmc
** Changed in: linux-raspi2 (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: linux-raspi2 (Ubuntu Bionic)
Importance: Undecided => High
** Changed in: linux-raspi2 (Ubuntu Bionic)
Assignee: (unassigned) => Juerg Haefliger (juergh)
--
You received this bug notification
een on hdmi
Status in linux-raspi2 package in Ubuntu:
New
Bug description:
Eoan daily: 20191010
Ubuntu Server arm64+raspi3
HW: Raspberrypi 3 B+
Initial boot ok but as soon as changing to the high resolution
framebuffer, the whole screen consists mostly of bright yellow and
darker yel
** Changed in: kernel-sru-workflow/promote-to-security
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1847596
Title:
rpi3b+: corrupted screen on hdmi
Status in linux-raspi2 package in Ubuntu:
New
Bug description:
Eoan daily: 20191010
Ubuntu Server arm64+raspi3
HW: Raspberrypi 3 B+
Initial boot ok but as soon as changing to the high
-raspi2 package in Ubuntu:
New
Bug description:
Eoan daily: 20191010
Ubuntu Server arm64+raspi3
HW: Raspberrypi 3 B+
Initial boot ok but as soon as changing to the high resolution
framebuffer, the whole screen consists mostly of bright yellow and
darker yellow vertical stipes. Further
of Kernel
Packages, which is subscribed to linux-raspi2 in Ubuntu.
https://bugs.launchpad.net/bugs/1847596
Title:
rpi3b+: corrupted screen on hdmi
Status in linux-raspi2 package in Ubuntu:
New
Bug description:
Eoan daily: 20191010
Ubuntu Server arm64+raspi3
HW: Raspberrypi 3 B
** Changed in: kernel-sru-workflow/promote-to-security
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1024.27
---
linux-oem-osp1 (5.0.0-1024.27) bionic; urgency=medium
* bionic/linux-oem-osp1: -proposed tracker
(LP: #1846023)
* alsa/sof: fix the hang issue on Dell Nebula MP platforms (LP: #1845904)
- ALSA: hda:
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1024.27
---
linux-oem-osp1 (5.0.0-1024.27) bionic; urgency=medium
* bionic/linux-oem-osp1: -proposed tracker
(LP: #1846023)
* alsa/sof: fix the hang issue on Dell Nebula MP platforms (LP: #1845904)
- ALSA: hda:
** Changed in: kernel-sru-workflow/promote-to-updates
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-updates
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
This bug was fixed in the package linux-oracle - 5.0.0-1004.8
---
linux-oracle (5.0.0-1004.8) disco; urgency=medium
* disco/linux-oracle: 5.0.0-1004.8 -proposed tracker (LP: #1846019)
* 5.0-based linux-oracle kernels can't run ADT (LP: #1845434)
- [config] CONFIG_VIRTIO=y
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1024.27
---
linux-oem-osp1 (5.0.0-1024.27) bionic; urgency=medium
* bionic/linux-oem-osp1: -proposed tracker
(LP: #1846023)
* alsa/sof: fix the hang issue on Dell Nebula MP platforms (LP: #1845904)
- ALSA: hda:
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1024.27
---
linux-oem-osp1 (5.0.0-1024.27) bionic; urgency=medium
* bionic/linux-oem-osp1: -proposed tracker
(LP: #1846023)
* alsa/sof: fix the hang issue on Dell Nebula MP platforms (LP: #1845904)
- ALSA: hda:
*** This bug is a duplicate of bug 1846019 ***
https://bugs.launchpad.net/bugs/1846019
This bug was fixed in the package linux-oracle - 5.0.0-1004.8
---
linux-oracle (5.0.0-1004.8) disco; urgency=medium
* disco/linux-oracle: 5.0.0-1004.8 -proposed tracker (LP: #1846019)
*
1 - 100 of 282 matches
Mail list logo