** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivativ
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivativ
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivativ
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivativ
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
backports:
derivativ
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
boot-testi
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Tags added: hirsute
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
Title:
arm64 eMAG system o
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494400/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
Ti
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494399/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
Title:
ar
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494397/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494398/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494396/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494395/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494394/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
Title:
arm6
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1926955/+attachment/5494393/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926955
apport information
** Tags added: apport-collected ec2-images impish
** Description changed:
We recently installed some new arm64 Ampere eMAG hardware in the
ScalingStack region which we use to run autopkgtests.
Guests (currently impish VMs on OpenStack) which we spawn often fail to
r
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package distro-info-data - 0.8ubuntu0.21
---
distro-info-data (0.8ubuntu0.21) precise-security; urgency=medium
* Add Ubuntu 20.10, Groovy Gorilla. (LP: #1874843)
-- leo.barb...@canonical.com (Leonidas S. Barbosa) Wed, 04 Nov 2020
19:04:48 -0300
** Chang
This bug was fixed in the package linux-meta - 3.2.0.150.164
---
linux-meta (3.2.0.150.164) precise; urgency=medium
* Bump ABI 3.2.0-150
-- Thadeu Lima de Souza Cascardo Mon, 05 Apr
2021 15:02:41 -0300
** Changed in: linux-meta (Ubuntu Precise)
Status: Won't Fix => Fix R
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux-base - 4.5ubuntu1~12.04.1
---
linux-base (4.5ubuntu1~12.04.1) precise; urgency=low
* Update precise to the latest linux-base. (LP: #1766728)
-- Andy Whitcroft Wed, 25 Jul 2018 17:30:21 +0100
** Changed in: linux-base (Ubuntu Precise)
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package clamav - 0.102.4+dfsg-0ubuntu0.12.04.1
---
clamav (0.102.4+dfsg-0ubuntu0.12.04.1) precise-security; urgency=medium
* Updated to 0.102.2 to fix security issues
- debian/libclamav9.symbols: updated for new version.
- debian/rules: bumped CL_FL
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package bzip2 - 1.0.6-1ubuntu0.2
---
bzip2 (1.0.6-1ubuntu0.2) precise-security; urgency=medium
* SECURITY REGRESSION: bzip2 update for CVE-2019-12900 causes some files
raises
incorrect CRC error. (LP: #1834494)
- debian/patches/Accept-as-many-selec
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package linux - 3.2.0-150.197
---
linux (3.2.0-150.197) precise; urgency=medium
* precise/linux: 3.2.0-150.197 -proposed tracker (LP: #1919172)
* CVE-2021-27365
- scsi: iscsi: Verify lengths on passthrough PDUs
- sysfs: Add sysfs_emit and sysfs_e
This bug was fixed in the package glib2.0 - 2.32.4-0ubuntu1.4
---
glib2.0 (2.32.4-0ubuntu1.4) precise-security; urgency=medium
* SECURITY REGRESSION: regression in last security update (LP: #1838890)
- debian/patches/CVE-2019-13012-regression.patch: fix a
memory leak intro
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
This bug was fixed in the package linux-lts-trusty -
3.13.0-185.236~12.04.1
---
linux-lts-trusty (3.13.0-185.236~12.04.1) precise; urgency=medium
* precise/linux-lts-trusty: 3.13.0-185.236~12.04.1 -proposed tracker
(LP: #1919170)
* Packaging resync (LP: #1786013)
- [Packa
I have the same issue as comment #6 on Ubuntu Server 20.04.1 installer
that booted from a flash drive.
HW:
00:00.0 Host bridge: Intel Corporation 8th Gen Core Processor Host Bridge/DRAM
Registers (rev 07)
00:02.0 VGA compatible controller: Intel Corporation UHD Graphics 630 (Desktop)
00:14.0 USB
** Project changed: canonical-identity-provider => fcitx (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926825
Title:
Fcitx and googlepinyin cause infinite frozen startup screen
To manage
This is an automated cleanup. This bug report has been moved to QEMU's
new bug tracker on gitlab.com and thus gets marked as 'expired' now.
Please continue with the discussion here:
https://gitlab.com/qemu-project/qemu/-/issues/95
** Changed in: qemu
Status: Confirmed => Expired
** Bug
*** This bug is a duplicate of bug 1918733 ***
https://bugs.launchpad.net/bugs/1918733
** This bug has been marked a duplicate of bug 1918733
file integrity check provides no feedback to the user
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
Public bug reported:
We recently installed some new arm64 Ampere eMAG hardware in the
ScalingStack region which we use to run autopkgtests.
Guests (currently impish VMs on OpenStack) which we spawn often fail to
reboot, repeating this over and over:
IRQ Exception at 0x9BC11F38
(stand
You have been subscribed to a public bug:
So installing the fcitx- googlepinyin I noticed that my Lenovo T490 laptop was
unable to start up. It got stuck on the startup screen and just stayed there.
$sudo apt install fcitx-googlepinyin
To recover my system I had to hardboot (hold powerbutto
Thank you for taking the time to report this bug and helping to make
Ubuntu better. It seems that your bug report is not filed about a
specific source package though, rather it is just filed against Ubuntu
in general. It is important that bug reports be filed about source
packages so that people
Thank you for taking the time to report this bug and helping to make
Ubuntu better. It seems that your bug report is not filed about a
specific source package though, rather it is just filed against Ubuntu
in general. It is important that bug reports be filed about source
packages so that people
Hello Sebastien, or anyone else affected,
Accepted update-notifier into hirsute-proposed. The package will build
now and be available at https://launchpad.net/ubuntu/+source/update-
notifier/3.192.40.2 in a few hours, and then in the -proposed
repository.
Please help us by testing this new packag
Awaiting response from SF#00308561
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926184
Title:
locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
To manage notifications about this bug
This used to happen with PHP too. I don't know how the Launchpad
builders do it but it does work as we want there. The FTBFS happens with
local sbuild defaults only and you have to override locally as you
found. So not an issue for the archive unless you're seeing behaviour
that contradicts my assu
All autopkgtests for the newly accepted apport (2.20.11-0ubuntu50.6) for groovy
have finished running.
The following regressions have been reported in tests triggered by the package:
ubuntu-release-upgrader/1:20.10.15 (armhf)
Please visit the excuses page listed below and investigate the failur
All autopkgtests for the newly accepted apport (2.20.11-0ubuntu50.6) for groovy
have finished running.
The following regressions have been reported in tests triggered by the package:
ubuntu-release-upgrader/1:20.10.15 (armhf)
Please visit the excuses page listed below and investigate the failur
All autopkgtests for the newly accepted apport (2.20.11-0ubuntu50.6) for groovy
have finished running.
The following regressions have been reported in tests triggered by the package:
ubuntu-release-upgrader/1:20.10.15 (armhf)
Please visit the excuses page listed below and investigate the failur
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~20.10.1)
for groovy have finished running.
The following regressions have been reported in tests triggered by the package:
ubuntu-advantage-tools/27.0~20.10.1 (i386)
Please visit the excuses page listed below and investigate t
Thanks for test it Tim!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926300
Title:
clamdscan - MULTISCAN parameter causes Segmentation fault error
To manage notifications about this bug go to:
h
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~20.10.1)
for groovy have finished running.
The following regressions have been reported in tests triggered by the package:
ubuntu-advantage-tools/27.0~20.10.1 (i386)
Please visit the excuses page listed below and investigate t
This will be fixed when mesa 21.0.x is backported (see #1925434).
Closing this ticket.
** Changed in: mesa (Ubuntu)
Status: New => Invalid
** Changed in: hundredpapercuts
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
* Impact
That's the current GNOME stable update, including some fixes and translation
updates
https://gitlab.gnome.org/GNOME/gnome-system-monitor/-/blob/gnome-40/NEWS
* Test case
The update is part of GNOME stable updates
https://wiki.ubuntu.com/StableReleaseUpdates/GNOME
** Tags added: rls-hh-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926316
Title:
lxappearance crashes on launch
To manage notifications about this bug go to:
https://bugs.launchpad.net/u
Please downgrade libc6 to the version in focal-updates. The one
installed has been removed from -updates because it caused regressions
and the new version superseding 2.31-0ubuntu9.3 is not yet released.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
https://github.com/snapcore/core-initrd/issues/17
** Bug watch added: github.com/snapcore/core-initrd/issues #17
https://github.com/snapcore/core-initrd/issues/17
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
Thanks Utkarsh. TIL that by default the apt resolver ignores the
alternative build-dependencies, considering only the first one. The
package builds with the apt resolver specifying --resolve-alternatives.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
I've copied 2.31-0ubuntu9.3 to https://launchpad.net/~ci-train-ppa-
service/+archive/ubuntu/4547 until the new update can be released
including this fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
I've copied 2.31-0ubuntu9.3 to https://launchpad.net/~ci-train-ppa-
service/+archive/ubuntu/4547 until the new update can be released
including this fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
I've copied 2.31-0ubuntu9.3 to https://launchpad.net/~ci-train-ppa-
service/+archive/ubuntu/4547 until the new update can be released
including this fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
** Also affects: glibc (Ubuntu Groovy)
Importance: Undecided
Status: New
** Also affects: glibc (Ubuntu Hirsute)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
** Changed in: systemd (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926547
Title:
Add Dell Privacy Mic Mute Key mapping
To manage notifications about this b
Hello Daniel,
I uninstalled the first extension, the second one wasn't installed. Find
attached the requested file.
On Mon, May 3, 2021 at 9:50 AM Daniel van Vugt <1926...@bugs.launchpad.net>
wrote:
> Thanks for the bug report.
>
> Please start by uninstalling these extensions and then reboot:
hirsute does not have Ubuntu Core images ;)
It seems to be solvable via a simple defconfig change according to:
https://github.com/raspberrypi/linux/issues/4205
We have at least one UC customer implementing a CM4 baseboard with TPM
for Full disk encryption and secureboot in UC20, for this the cl
** Description changed:
- LSB Version:
-
core-11.1.0ubuntu2-noarch:printing-11.1.0ubuntu2-noarch:security-11.1.0ubuntu2-noarch
+ Affected version
+ LSB Version:
core-11.1.0ubuntu2-noarch:printing-11.1.0ubuntu2-noarch:security-11.1.0ubuntu2-noarch
+ Gnome Version: 3.38.4
+ Occurs in: Xorg and
Public bug reported:
Hello,
[Problem]
=
It looks like apt isn't able to resolve `dh-systemd | debhelper (>=
13.3)`. Whilst the line in logical and makes sense, that is, use dh-
systemd for Groovy and older releases (since it's not present in Hirsute
and thereafter) and use debhelper (...
** Package changed: ubuntu => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926799
Title:
Multiple issues with zoom in accessibility
To manage notifications about this bug go
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: xinput (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827407
Title:
Tou
This is an automated cleanup. This bug report has been moved to QEMU's
new bug tracker on gitlab.com and thus gets marked as 'expired' now.
Please continue with the discussion here:
https://gitlab.com/qemu-project/qemu/-/issues/88
** Changed in: qemu
Status: Confirmed => Expired
** Bug
Hirsute looks fine:
$ uname -a
Linux rpi-cm4-rev1d0-e428 5.11.0-1005-raspi #5 SMP PREEMPT Mon Apr 19 09:04:31
UTC 2021 armv7l armv7l armv7l GNU/Linux
$ sudo dmesg | grep rtc
[0.00] Kernel command line: coherent_pool=1M 8250.nr_uarts=1
snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable_h
Seem focal:
$ uname -a
Linux rpi-cm4-rev1d0-e428 5.4.0-1034-raspi #37-Ubuntu SMP PREEMPT Mon Apr 12
23:14:49 UTC 2021 aarch64 aarch64 aarch64 GNU/Linux
$ sudo dmesg | grep rtc
[0.00] Kernel command line: coherent_pool=1M 8250.nr_uarts=1
snd_bcm2835.enable_compat_alsa=0 snd_bcm2835.enable
ogra@CM4:~$ snap list pi-kernel
Name VersionRev Tracking Publisher Notes
pi-kernel 5.4.0-1035.38 282 20/edge canonical✓ kernel
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926
** Description changed:
Hello
Google - translator:
A new test still shows a bug in GTK-SWT-JDK.
The error can already be seen since version 20.04.
Wrong display of windows, missing buttons.
The first window is already displayed incorrectly.
See photo
-
- A function is only possible
Which kernel?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926911
Title:
hctosys not reading hardware clock on CM4
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/
(In reply to PGillespie from comment #43)
> Forgive my ignorance, but will this fix be backported to 5.18.x? Or will the
> fix only apply to 5.20.3?
> Am currently on Kubuntu 20.04 with version 5.18.5.
And what systemd version does Kubuntu 20.04 have?
According to my testing on the upcoming openSU
I can confirm that as of now it runs fine against
- impish
- impish + UA from proposed
- imposh proposed
The test installs all users of update-motd
It does not list ubuntu-advantage-tools but since they are in the image
one would think that it still would be there.
The test intention is:
1. run
Could it be that the Sunplus Innovation Technology Inc. Optical Mouse is
the one with wrote Trust on the backside ?
This one looks like "made in China", that's why I ask. Those are used to
imitate everything.
I think my brother might have said the mouse he has is a real one and the
other, an imitat
Public bug reported:
I have just installed XUbubtu 20.04 LTS on a system based on a Gigabyte
J3455-D3H motherboard and a 120Gb SSD.
Following installation the system will not boot and fails well before I
can use it to report the bug via Apport. The last meesage displayed on
screen is:
[ 2.27155
is this not a duplicate of bug 1918733
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1918733 ??
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923563
Title:
Checking disks msg does not show
It appears the problem stopped happening in newer GNOME versions so "Fix
Released".
** Changed in: gnome-shell (Ubuntu)
Status: Expired => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
301 - 400 of 468 matches
Mail list logo