apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282842/+files/Lsusb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840438
Title:
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282847/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840438
Title:
The verification of the Stable Release Update for nginx has completed
successfully and the package has now been released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282846/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840438
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282841/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840438
Title:
apport information
** Attachment added: "HookError_generic.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282840/+files/HookError_generic.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1840438/+attachment/5282839/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
There are currently no SSL enabled autopkgtests. It has been discussed
that we should consider writing such tests to make sure things work as
intended regarding SSL during updates/upgrades in the NGINX autopkgtests
** Affects: nginx (Ubuntu)
Importance: Wishlist
I have tested the packages currently in bionic-proposed. and they pass
the security team test script, and also no longer offer TLSv1.3 when not
requested. ACK on releasing.
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-signed
Status: Fix Committed => Fix
Tested kernel 4.19.0-041900-generic and also results into flickering
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838644
Title:
Booting into desktop results in flickering
To manage notifications
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Summary changed:
- bionic/linux-oem: 4.15.0-1051.59 -proposed tracker
+ bionic/linux-oem: 4.15.0-1051.60 -proposed tracker
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839980
Title:
Ubuntu 18.04.3 LTS
Kernel 4.15.0-58-generic
Totem 3.26.0
Wrong ratio when video opened on rotated (pivot) monitor - issue still
exists.
PS. If I move Totem window from rotated monitor to another, not rotated
one and open video, ratio is correct. I can then move app window to the
rotated monitor
** Tags added: disco eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840028
Title:
NULL pointer dereference when Inserting the VIMC module
To manage notifications about this bug go to:
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1840438
and then change the status of the bug to 'Confirmed'.
If, due to the
There were quite a few changes in the i915 driver related to idle
condition and states. Is it confirmed v4.19 exhibits the issue whilst
v4.18 does not? If so then the candidate commits causing the regression
could be in this list:
$ gitlog --reverse --grep=idle v4.18..v4.19 --
Hello Bryan, or anyone else affected,
Accepted nginx into bionic-proposed. The package will build now and be
available at
https://launchpad.net/ubuntu/+source/nginx/1.14.0-0ubuntu1.5 in a few
hours, and then in the -proposed repository.
Please help us by testing this new package. See
Public bug reported:
linux-image-4.4.0-159-generic produces "BUG unable to handle kernel NULL
pointer dereference" with bcache module
the kernel never boots then.
blacklisting the bcache module resolves the problem.
For more strings please see attached image
Ubuntu 4.4.0-159.187-generic
Whoops, this is fallout from openssl 1.1.1 in bionic not being in
-security yet, resulting in this security update having been built with
openssl 1.1 only.
The packages need to be rebuilt with openssl 1.1.1.
** Also affects: nginx (Ubuntu Bionic)
Importance: Undecided
Status: New
**
No they don't have same MAC but the difference is just one bit.
I'm using network-manager and I didn't changed systemd-networkd configuration
manually.
May be it was changed during Upgrade LTS 18.04 -> 19.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Using bionic as a base, and upgrading all the way to disco:
(bionic-amd64)root@ottawa:~# echo PURGE | debconf-communicate libpam0g:amd64
0
(bionic-amd64)root@ottawa:~# echo PURGE | debconf-communicate libpam0g
0
(bionic-amd64)root@ottawa:~# echo PURGE | debconf-communicate libc6:amd64
0
what's your network configuration? are you using netplan? or network-
manager? or have you configured systemd-networkd manually?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840359
Title:
Just encountered this.
Ubuntu 18.04 server.
Version in repo: pure-ftpd-mysql-1.0.46-1build1
TLS completely broken in this version.
Can confirm that manually installing packages from Ubuntu 19.04 repo
fixes issues for me.
```
wget
I can no longer reproduce this issue with kernel linux-oem-osp1 - 5.0.0-1018.20
on a previously reproducible system with kernel 4.15.0-1042-oem.
I tried to reproduce 10 times, the reproduce rate is 0/10 with linux-oem-osp1 -
5.0.0-1018.20.
--
You received this bug notification because you are
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: In Progress => Fix Committed
**
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu Bionic)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840437
> This breaks a number of current jackd setups, for example.
please provide steps to reproduce the problem.
** Changed in: systemd (Ubuntu)
Status: New => Incomplete
** Bug watch added: github.com/systemd/systemd/issues #13331
https://github.com/systemd/systemd/issues/13331
** Also
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
+
Note to comment #16: I tried to reproduce 10 times, the reproduce rate
is 0/10 with linux-oem - 4.15.0-1050.57.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835001
Title:
System does not auto
The cond_resched() patch should make its way into the 5.4 merge window
(see bcache maintainer's reponse at [0]).
[0] https://lore.kernel.org/lkml/74950e24-245a-c627-0e2e-
32ac0b304...@suse.de/
** Also affects: linux
Importance: Undecided
Status: New
** Changed in: linux
Status:
I can no longer reproduce this issue with kernel linux-oem -
4.15.0-1050.57 on a previously reproducible system with kernel
4.15.0-1042-oem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1835001
** Changed in: ubuntu-z-systems
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837577
Title:
[19.10 FEAT] Provide optimized libatlas libraries for
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: In Progress => Fix Committed
**
** Changed in: kernel-sru-workflow/prepare-package
Status: New => Confirmed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
Do they have same MAC address?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840359
Title:
systemd-networkd-wait-online & two ethernet on board
To manage notifications about this bug go to:
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1840437
and then change the status of the bug to 'Confirmed'.
If, due to the
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Invalid
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Invalid
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the
** Summary changed:
- trusty/linux-azure: -proposed tracker
+ trusty/linux-azure: 4.15.0-1056.61~14.04.1 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical
Public bug reported:
[Impact]
We ship the armhf flavour of the Bionic kernel which supports the iMX6Q based
Nitrogen6x board.
The cpufreq, thermal sensors and cooling cells should be enabled for this board.
[Fix]
Backport upstream device tree patches to define the device nodes properly.
[Test]
This bug was fixed in the package atlas - 3.10.3-8ubuntu5
---
atlas (3.10.3-8ubuntu5) eoan; urgency=medium
* Enable z14 build at -march=z14, with cross-compile engine at
-march=z13. LP: #1837577
-- Dimitri John Ledkov Thu, 15 Aug 2019 15:34:03
+0100
** Changed in: atlas
** Changed in: ubuntu-z-systems
Importance: Critical => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840420
Title:
[UBUNTU] 18.04.3 - hash verification error with SHA-512 HMAC running
** Changed in: ubuntu-z-systems
Importance: Critical => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840419
Title:
[Ubuntu] 18.04.3 - CKR_SIGNATURE_INVALID, CKR_FUNCTION_FAILED when
Please give the B/D KVM kernel here a try:
https://people.canonical.com/~phlin/kernel/lp-1811819-vxlan/B
https://people.canonical.com/~phlin/kernel/lp-1811819-vxlan/D
Changes for D-KVM:
+# CONFIG_OPENVSWITCH_VXLAN is not set
-# CONFIG_VXLAN is not set
+CONFIG_VXLAN=m
Changes for B-KVM:
+#
** Tags added: bionic disco eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/185165
Title:
Ubuntu does not open MS Windows internet shortcuts with 'url'
extension
To manage notifications about
--- Comment From christian.r...@de.ibm.com 2019-08-16 05:56 EDT---
Decrease severity to 'high' due to fix being available.
** Tags removed: severity-critical
** Tags added: severity-high
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Public bug reported:
Systemd >= 240 sets a clamp for RLIMIT_MEMLOCK, which is too low for
some realistic applications. This clamp should probably be increased.
This breaks a number of current jackd setups, for example.
See upstream bug: https://github.com/systemd/systemd/issues/13331.
This
--- Comment From christian.r...@de.ibm.com 2019-08-16 05:55 EDT---
Decrease severity to 'high' due to fix being available.
** Tags removed: severity-critical
** Tags added: severity-high
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: python-ldap (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1795989
Title:
** Tags added: bionic disco eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/555380
Title:
cautious-launcher untranslated and untranslatable
To manage notifications about this bug go to:
Systemd 240 and newer introduced a clamp to RLIMIT_MEMLOCK in
c8884aceefc85245b9bdfb626e2daf27521259bd. See
https://github.com/systemd/systemd/issues/13331.
** Bug watch added: github.com/systemd/systemd/issues #13331
https://github.com/systemd/systemd/issues/13331
--
You received this bug
By adding the tag rls-bb-incoming in comment #9 I am requesting that it
be considered for inclusion in 18.04. I think.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
Date and time
https://lists.ubuntu.com/archives/kernel-team/2019-August/103163.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1696558
Title:
Enable CONFIG_SECURITY_DMESG_RESTRICT
To manage notifications
I`ve tested kernel version 4.15.0.59.61 on bionic i386. The problem
seems to be solved.
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
[Summary]
It generally looks good already for being at such an early stage, the following
list covers what I think need to be added/improved to make it acceptable.
- go issue of embedded libs, can we resolve reduce this?
Please answer my questions below.
- I know it makes no sense in a
:) All the more reason for Ubuntu 18.04 to receive the fix? Any timeline
planned?
My bad for mixing 16.04 end of life with 18.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
Date
Public bug reported:
Currently ubuntu-updates ships with 3.0.3
https://discuss.linuxcontainers.org/t/lxd-3-0-4-has-been-released/5078
It fixes many important bugs related to clustering, it would be great to
have it in updates repository.
** Affects: lxd (Ubuntu)
Importance: Undecided
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Summary changed:
- bionic/linux-oem-osp1: -proposed tracker
+ bionic/linux-oem-osp1: 5.0.0-1019.21 -proposed tracker
** Changed in: kernel-sru-workflow/prepare-package
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/prepare-package
Assignee: Canonical Kernel
** No longer affects: linux-aws (Ubuntu Eoan)
** Tags added: bionic disco trusty xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1696558
Title:
Enable CONFIG_SECURITY_DMESG_RESTRICT
To
Ubuntu 18.04 has 4 years of free support remaining, and 9 years of paid
support remaining.
https://wiki.ubuntu.com/Releases
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
Date and
** Also affects: linux-aws (Ubuntu Eoan)
Importance: Medium
Assignee: Po-Hsu Lin (cypressyew)
Status: Triaged
** Changed in: linux-aws (Ubuntu Eoan)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: linux-oem-osp1 (Ubuntu Bionic)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1826716
Title:
Include Sunix serial/parallel driver
To manage
test this build:
https://aaltoset.kapsi.fi/32bit-debug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838698
Title:
Cannot boot ISO unless using nomodeset
To manage notifications about this bug
Hi,
this is tracked in
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-0197.html
but the priority currently is low.
There seems to be all kind of http2 effort right now.
I'll ping the security team to be aware of your bug to close it once a fix is
released.
** Changed in:
Any chance that this bug will be fixed for Ubuntu 18.04? It still has
about 1.5 years of support life to it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1553802
Title:
Date and time jump around
** Description changed:
- Description will follow
+ Problem description (Tested with 18.04.2 but need be fixed with 18.04.3)
+ Summary
+ ===
+ Ubuntu 18.04.2 system installed ( 4.15.0-55-generic kernel ) providing
+ opencryptoki version 3.9.0, and libica version 3.2.1
+ The digest_tests being
The fault returned and I swapped out monitor/pc with other units to
narrow down the fault to the monitor. A new monitor has fixed the
problem of losing the screen after 3 seconds or so.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package-lrm
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel
Add: this problem only happens in new kernel version. I can boot system
with the old kernel version.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1792294
Title:
Generates unbootable initrd: Out of
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
--- Comment From heinz-werner_se...@de.ibm.com 2019-08-16 04:12 EDT---
Problem description (Tested with 18.04.2 but need be fixed with 18.04.3)
Summary
===
Ubuntu 18.04.2 system installed ( 4.15.0-55-generic kernel ) providing
opencryptoki version 3.9.0, and libica version 3.2.1
The
Public bug reported:
When I add an event to my calendar (microsoft exchange via office 365)
The event first spans over two days.
Then when I change to a specific time, the time is wrong.
I am in CEST, but it adds one hour to the time. If I correct the time,
it goes back one hour too much. If I
I was just trying to be strictly accurate with the version numbers.
Actually Ubuntu 19.04 is the only version with the fix that's currently
supported.
** Tags added: rls-bb-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags added: rls-bb-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840353
Title:
Encrypted drive password dialog is non-responsive
To manage notifications about this bug go to:
** Changed in: kernel-sru-workflow/prepare-package
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: In Progress => Fix Committed
**
** Also affects: ubuntu-z-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840420
Title:
[UBUNTU] 18.04.3 - hash verification error with SHA-512
Thank you for taking the time to report this issue and helping to make
Ubuntu better.
Examining the information you have given us, this does not appear to be
a bug report so we are closing it and converting it to a question in the
support tracker. We understand the difficulties you are facing,
Public bug reported:
Hi all,
I want to upgrade the system's kernel version to 4.20.
After compiling the Kernel 4.20, I update-grub and reboot. However, boot
failed, it says: "Loading initial ramdisk... Error: Out of memory".
I can successfully boot the system by using the old kernel version.
Please notice that it's requited to always run on the latest Ubuntu level, for
example run:
sudo apt update && sudo apt full-upgrade
(and depending on a newer kernel don't forget to restart to activate it)
opencryptoki and libica3 are fine in this case, but the kernel is not the
latest.
As of
** Description changed:
- Description will follow
+ Problem description (Tested with 18.04.2 but need be fixed with 18.04.3)
+ ===
+ Ubuntu 18.04.2 system installed ( 4.15.0-55-generic kernel ) providing
+ opencryptoki version 3.9.0, and libica version 3.2.1
+ The rsa_tests being part of the
Hi Kai-Chuang Yan,
I have the same problem when I want to change the system's kernel
version.
After compiling the Kernel 4.20, I update-grub and reboot. However, it
says: "Loading initial ramdisk... Error: Out of memory".
What did you mean that this bug is fixed in the 0.131ubuntu15?
Thanks!
Public bug reported:
Description will follow
** Affects: opencryptoki (Ubuntu)
Importance: Undecided
Assignee: Skipper Bug Screeners (skipper-screen-team)
Status: New
** Tags: architecture-s39064 bugnameltc-180486 severity-critical
targetmilestone-inin---
** Tags added:
The problem is really hard to reproduce.
The test scenario is:
1. Connect wi-fi
2. Play 4k video on Youtube
Monitor the scenario for more than one week, and discover this problem
once.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--- Comment From heinz-werner_se...@de.ibm.com 2019-08-16 03:50 EDT---
Solution
Backport of following git-commits
- CKR_SIGNATURE_INVALID error
=>
https://github.com/opencryptoki/opencryptoki/commit/02a5840afef2fd3b5879d4bed35e17c809341cf0
that came after 3.9.0.
- CKR_MECHANISM_INVALID
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
derivatives: bug 1840013
I would like to nominate the fix be made available to Ubuntu 18.04. It
seems strange the fix isn't made available to a LTS version which is
more highly used than a .10 version.
I tried pressing the nomination button, but it complained that: "You do
not have permission to nominate this bug."
I
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
--- Comment From heinz-werner_se...@de.ibm.com 2019-08-16 03:47 EDT---
Problem description (Tested with 18.04.2 but need be fixed with 18.04.3)
===
Ubuntu 18.04.2 system installed ( 4.15.0-55-generic kernel ) providing
opencryptoki version 3.9.0, and libica version 3.2.1
The rsa_tests
compare the failed case and passed case , it seems the clue is 2nd kernel
trigging
wlp2s0: deauthenticated from 3c:ce:73:48:04:60
# from journalctl.log:
八 16 13:13:38 u-XPS-13-9380 kernel: wlp2s0: deauthenticated from
3c:ce:73:48:0e:40 (Reason: 1=UNSPECIFIED)
八 16 13:13:39 u-XPS-13-9380
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/security-signoff
Assignee: Canonical Security Team (canonical-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member
Public bug reported:
Description will follow
** Affects: opencryptoki (Ubuntu)
Importance: Undecided
Assignee: Skipper Bug Screeners (skipper-screen-team)
Status: New
** Tags: architecture-s39064 bugnameltc-180491 severity-critical
targetmilestone-inin---
** Tags added:
*** This bug is a duplicate of bug 1742894 ***
https://bugs.launchpad.net/bugs/1742894
this was fixed in libjogl2-java 2.3.2+dfsg-6
** This bug has been marked a duplicate of bug 1742894
Scilab does not start after some upgrades on Ubuntu Xenial
--
You received this bug notification
** Changed in: kernel-sru-workflow/prepare-package
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/prepare-package-meta
Status: Fix Committed => Fix Released
** Description changed:
This bug will contain status and test results related to a kernel source
** Attachment added: "sosreport-wi-fi-lost-20190816135009.tar.xz"
https://bugs.launchpad.net/oem-priority/+bug/1840416/+attachment/5282828/+files/sosreport-wi-fi-lost-20190816135009.tar.xz
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Public bug reported:
I'm not sure this issue caused by WIFI AP or WIFI module.
>From log, it looks the tested machine can not get new key from WIFI AP
>randomly.
ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: network-manager 1.10.6-2ubuntu1.1
ProcVersionSignature: Ubuntu
201 - 300 of 311 matches
Mail list logo