** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834714 (trusty/li
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Also affects: linux-hwe (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-hwe (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825222
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
Reviewed: https://review.opendev.org/667436
Committed:
https://git.openstack.org/cgit/openstack/nova/commit/?id=75985e25bc147369efb90d4fa9f046631766c14c
Submitter: Zuul
Branch:stable/rocky
commit 75985e25bc147369efb90d4fa9f046631766c14c
Author: Kashyap Chamarthy
Date: Mon Feb 25 13:26:24
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Changed in: linux-oem-osp1 (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834415
Title:
Intel WiFi (CNVi) 9462/9560 on Comet Lake FW error in S
** Description changed:
- I have a VPS with Ubuntu 18.04 (pure software implementation, Digital
- Ocean) and I connect through Windows 10 with an X server, Xming, and I
- run google-chrome remote. It works well and opens the chrome remote on
- my Windows, although quite slow, but it works. However
Public bug reported:
When growpart attempts to determine the partition to resize, it uses
this logic:
$ sed -n '266,275p' $(which growpart)
dpart="${DISK}${PART}" # disk and partition number
if [ -b "${DISK}p${PART}" -a "${DISK%[0-9]}" != "${DISK}" ]; then
# for bl
** Summary changed:
- linux-kvm: -proposed tracker
+ linux-kvm: 5.0.0-1011.12 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-te
That does help. The package description doesn't mention this package is
meant for the most common assumed scenario, nor what that most-common
scenario would be -- good thing I wasn't installing packages unattended.
Took me a few guesses to figure out what I could install so I'd have php
for nginx
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834898 (bionic/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
On 7/2/19 8:39 AM, Aere Greenway wrote:
> On 6/27/19 10:46 PM, Kai-Heng Feng wrote:
>> Ah, please try kernel parameter "nopti".
>>
> As I indicated in my earlier feedback, I tried that, and it didn't
> affect the problem.
>
I tried adding the nopti kernel parameter today, in particular, to the
def
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Changed in: kernel-sru-workflow/promote-to-updates
Status: In Progress => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
Fixed since Bionic
** Changed in: zeromq3 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1602900
Title:
libzmq3 crashes when 'getifaddrs()' is unava
Actually with kernel 5.1.15 and if i don't make a mistake, this commit is
merged since 2018-07-16;
A first speedtest-net gives me this outpout=
tg3 :03:00.0 eno1: 0: Host status block
[0001:00d5:(:0443:):(:00bc)]
tg3 :03:00.0 eno1: 0: NAPI info
[00d5:00d5:(011
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834916 (trusty/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834898 (bionic/li
** Bug watch added: Calamares Issues #1191
https://github.com/calamares/calamares/issues/1191
** Also affects: calamares via
https://github.com/calamares/calamares/issues/1191
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ub
** Summary changed:
- linux-kvm: -proposed tracker
+ linux-kvm: 4.18.0-1017.18 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel Team (canonical-kernel-t
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
- https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
+ https://wiki.ubuntu.com/Kernel/ker
On 18.04, package cryptsetup provides /etc/cryptsetup-initramfs/conf-
hook which states:
# WARNING: If the initramfs image is to include private key material,
# you'll want to create it with a restrictive umask in order to keep
# non-privileged users at bay. For instance, set UMASK=0077 in
# /etc
** Changed in: calamares
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835095
Title:
Lubuntu initrd images leaking cryptographic secret when disk
encryption is used
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package
** Changed in: gnome-shell (Ubuntu)
Assignee: (unassigned) => Marco Trevisan (Treviño) (3v1n0)
** Changed in: gnome-shell (Ubuntu)
Status: Incomplete => In Progress
** Changed in: gnome-shell (Ubuntu)
Status: In Progress => Won't Fix
** Also affects: mutter (Ubuntu)
Importa
After trying a random assortment of fixes to get my Amazon Echo Show to
connect as a speaker using bluetooth to my Linux Mint 19.2 box I found
the solution far too simple. The magic reboot! I rebooted the Echo and
that must have cleared the bluetooth connections... ha
--
You received this bug n
You can go ahead and close this bug as I can no longer reproduce it.
I had this issue replicated in a dockerfile environment and had been
debugging the issue all weekend long (new instance each step).
For whatever reason now reverting back to the exact same configuration
(using git checkout) it i
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834903 (bionic/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
All autopkgtests for the newly accepted python-eventlet (0.24.1-0ubuntu3.1) for
disco have finished running.
There have been regressions in tests triggered by the package. Please visit the
sru report page and investigate the failures.
https://people.canonical.com/~ubuntu-archive/pending-sru.html
** Bug watch added: gitlab.gnome.org/GNOME/mutter/issues #660
https://gitlab.gnome.org/GNOME/mutter/issues/660
** Also affects: mutter via
https://gitlab.gnome.org/GNOME/mutter/issues/660
Importance: Unknown
Status: Unknown
** Changed in: gnome-shell (Ubuntu Disco)
Status:
Verified the test case.
** Tags removed: verification-needed verification-needed-disco
** Tags added: verification-done verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1833592
T
Running a similar setup on a ext4 backing store can also trigger ooms
w/o the hangs, where as the first hang occurred when running on a ZFS
backing store.
Jul 2 19:18:52 mahobay kernel: [ 1579.086409] Call Trace:
Jul 2 19:18:52 mahobay kernel: [ 1579.086415] dump_stack+0x67/0x86
Jul 2 19:18:52
Joanna; hello
Provide some background information, please.
You show booting a 4.8 kernel on the xenial (16.04) release.
However !
linux-image-generic xenial == Version 4.4.0.154.162 (xenial)
linux-generic-hwe-16.04 == Version 4.15.0.54.56 (bionic)
xorg == Version 1:7.7+13ubuntu3.1 (xenial)
Mayb
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-xenial
** Tags added: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
F
The following CVE IDs have been issued for Calamares in this instance by
MITRE, IDs were requested via the CVE form:
CVE-2019-13178 was assigned for the race condition that Seth Arnold
identified in https://github.com/calamares/calamares/issues/1190
regarding unsafe UMask and file permissions duri
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
+ boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834903 (bionic/li
Can reproduce the crash with a fully up-to-date Ubuntu 16.04.
libqt5gui5:amd64 5.5.1+dfsg-16ubuntu7.6
wireshark-qt 2.6.8-1~ubuntu16.04.0
(gdb) bt
#0 QIconPrivate::~QIconPrivate (this=0x580aaf60, __in_chrg=) at image/qicon_p.h:64
#1 QIcon::~QIcon (this=, __in_chrg=) at
image/qicon.cpp:681
#
** Changed in: anki (Ubuntu Eoan)
Assignee: Thomas Ward (teward) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1825722
Title:
Anki fails to start because QWebEngineView is not d
Public bug reported:
If Ubuntu/Canonical's FIPS-compliant OpenSSL is initialized with
SSL_library_init, then Python2's hashlib bindings for MD5 can trigger a
SIGSEGV via a NULL pointer dereference (if calling the .update method)
or a SIGABRT (if passing input to the constructor or passing no input
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
*** This is an automated message ***
This bug is tagged needs-packaging which identifies it as a request for
a new package in Ubuntu. As a part of the managing needs-packaging bug
reports specification,
https://wiki.ubuntu.com/QATeam/Specs/NeedsPackagingBugs, all needs-
packaging bug reports have
Confirmed the test case for bionic and disco after having installed
- from bionic-proposed:
fonts-noto-cjk 1:20190409+repack1-0ubuntu0.18.04
fonts-noto-cjk-extra 1:20190409+repack1-0ubuntu0.18.04
language-selector-common 0.188.3
language-selector-gnome 0.188.3
- from disco-proposed:
Go ahead and close the bug. Its too bad that when they “implemented” the
NTFS they did not implement the Windows owner and group attributes.
On Tue, Jul 2, 2019 at 10:51 AM Mike Salvatore <1830...@bugs.launchpad.net>
wrote:
> Robert,
>
> > NTSF does provide owner and group permissions
>
> Right,
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
Call for testing
Since the proposed upgrade of fonts-noto-cjk affects most CJK users and
includes changes beyond the glyphs for rendering the Reiwa character, we
hope for help with testing by users who speak Chinese, Japanese and/or
Korean before the packages are made available to
How do I test it? I'm interested in seeing Chinese input method being able
to be activated and behaving the way it is expected in a LiveUSB,
preferably in Ubuntu 18.04.3 iso. Is there any pre-release version of the
18.04.3 iso available?
On Tue, Jul 2, 2019 at 8:52 AM Gunnar Hjalmarsson <
1786..
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
kernel-sta
Artful is EOL, and I just deleted the above mentioned PPA.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1710370
Title:
Cheese crashes on launch in Ubuntu 17.10 if no camera device is
present
To
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
As noted by the upstream maintainer, this was fixed in the migration to
vte3.
** Changed in: xfce4-terminal (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
This was fixed with the following upload:
xfce4-terminal (0.8.7.4-2) unstable; urgency=medium
* add build-dep on libutempter (closes: #904789)
* d/control: update standards version to 4.2.1
* d/watch: use https protocol
* d/lintian-overrides added, ignore warning about fortify
* d
** Changed in: gdk-pixbuf
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828720
Title:
eog (Ubuntu image viewer) consumes all memory when opening a tiff file
To manage
** Changed in: mutter
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834583
Title:
GNOME Shell hangs when closing a Java dialog; hung in g_private_get()
from thread_m
On 2019-07-03 02:16, Ping-Wu wrote:
> How do I test it? I'm interested in seeing Chinese input method
> being able to be activated and behaving the way it is expected in a
> LiveUSB, preferably in Ubuntu 18.04.3 iso. Is there any pre-release
> version of the 18.04.3 iso available?
Besides verify
** Changed in: gnome-control-center
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820862
Title:
/usr/bin/gnome-control-
center:11:cc_display_config_equal:update_app
As noted by upstream, fixed in the port to VTE3.
** Changed in: xfce4-terminal (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/399956
Title:
Opening ne
Looking over everything I have the only visible differences between the
day where I was having the issue and today was a kernel error related to
AER/ASPM. This appears to occur whenever docker setup networking for a
new container.
Today host error logs included a device of ID0008 not found which w
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports: bug 1834950 (xenial/li
Public bug reported:
Description:
Direct mapping is not good for accessing encrypted pages as all memory is
mapped with KeyID 0.
We need the temporary mapping with correct KeyID. kmap()/kmap_atomic()
API seems fill our needs.
Target Release: 19.10
Target Kernel: TBD
** Affects: intel
Impo
Public bug reported:
The Ubuntu Error Tracker has been receiving reports about a problem regarding
mozc. This problem was most recently seen with package version
2.23.2815.102+dfsg-4ubuntu1, the problem page at
https://errors.ubuntu.com/problem/b0745b3823bfaed66f7c5601ac0b576e8f1508fd
contain
** Changed in: libpgm (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820203
Title:
[MIR] libpgm as dependency of mailma
** Changed in: hyperkitty (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820196
Title:
[MIR] hyperkitty as dependency o
** Changed in: flufl.bounce (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820191
Title:
[MIR] flufl.bounce as dependen
** Changed in: djangorestframework (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820190
Title:
[MIR] djangorestframewo
** Changed in: libmatheval (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820202
Title:
[MIR] libmatheval as dependency
** Changed in: django-mailman3 (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820186
Title:
[MIR] django-mailman3 as de
** Changed in: uwsgi (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820227
Title:
[MIR] uwsgi as dependency of mailman3
** Changed in: mailmanclient (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820204
Title:
[MIR] mailmanclient as depend
** Changed in: django-allauth (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820181
Title:
[MIR] django-allauth as depe
** Changed in: django-guardian (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820183
Title:
[MIR] django-guardian as de
** Changed in: python-django-gravatar2 (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820216
Title:
[MIR] python-django
** Changed in: python-whoosh (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820224
Title:
[MIR] python-whoosh as depend
** Changed in: python-falcon (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820217
Title:
[MIR] python-falcon as depend
** Changed in: python3-openid (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820211
Title:
[MIR] python3-openid as depe
** Changed in: zope.schema (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820238
Title:
[MIR] zope.schema as dependency
** Changed in: zope.i18nmessageid (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820239
Title:
[MIR] zope.i18nmessageid
** Changed in: python-django-extensions (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820215
Title:
[MIR] python-djang
** Changed in: postorius (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820210
Title:
[MIR] postorius as dependency of
** Changed in: twitter-bootstrap3 (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820226
Title:
[MIR] twitter-bootstrap3
Powertop 2.11 (2019,Q2 scheduled)
** Changed in: intel
Status: Won't Fix => New
** Information type changed from Proprietary to Public
** Also affects: powertop (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
Description:
PCIe GEN4 adds a new register wh
** Changed in: norm (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820209
Title:
[MIR] norm as dependency of mailman3
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1835138
and then change the status of the bug to 'Confirmed'.
If, due to the nature
** Changed in: zope.event (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820236
Title:
[MIR] zope.event as dependency o
** Changed in: python-requests-oauthlib (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1820221
Title:
[MIR] python-reque
601 - 700 of 821 matches
Mail list logo