error on the preseed/url=
Wget: not a http or ftp url
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849684
Title:
casper preseed url not working
To manage notifications about this bug go to:
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
The verification of the Stable Release Update for grub2 has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
This bug was fixed in the package grub2-signed - 1.115.1
---
grub2-signed (1.115.1) disco; urgency=medium
* Rebuild against grub2 2.02+dfsg1-12ubuntu2.1. (LP: #1851897)
-- dann frazier Sat, 09 Nov 2019 08:44:52 -0700
--
You received this bug notification because you are a
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
Public bug reported:
Dell XPS 15 7590 2019 version.
Apt linux kernel update from 5.3.0-23 to 5.3-0-24 and boot failed, kernel panic.
Attached file with booting with 5.3.0-24 debug display
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Attachment added:
** Attachment added: "handoff=7.jpg"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855264/+attachment/5310009/+files/handoff%3D7.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855264
This bug was fixed in the package grub2 - 2.02+dfsg1-12ubuntu2.1
---
grub2 (2.02+dfsg1-12ubuntu2.1) disco; urgency=medium
* Apply patch from Peter Jones to forbid the "devicetree" command when
Secure Boot is enabled. (LP: #1851897)
-- dann frazier Sun, 10 Nov 2019 11:17:51
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in:
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in:
This bug was fixed in the package ddcci-driver-linux - 0.3.1-2ubuntu0.1
---
ddcci-driver-linux (0.3.1-2ubuntu0.1) bionic; urgency=medium
* Fix build for kernel 5.3 (LP: #1842671).
- d/p/0001-Fix-incorrect-check-on-null-pointer-after-a-kzalloc.patch
-
I have a XPS 15 (7590), Intel® Core™ i9-9980HK (16 MB cache, tot 5,0 GHz, 8
cores).
I installed Ubuntu 19.04, then upgraded when 19.10 became available. On Nov 18
there was a bios upgrade. This morning, the laptop wouldn't boot. I can type
the disk password, than there's a flash and a black
The verification of the Stable Release Update for broadcom-sta has
completed successfully and the package is now being released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
This bug was fixed in the package grub2 - 2.02-2ubuntu8.14
---
grub2 (2.02-2ubuntu8.14) bionic; urgency=medium
* Fix kexec on ACPI/UEFI ARM systems w/ crashkernel reserved memory
beyond the 4GiB boundary. (LP: #1851190)
* Apply patch from Peter Jones to forbid the
This bug was fixed in the package grub2 - 2.02-2ubuntu8.14
---
grub2 (2.02-2ubuntu8.14) bionic; urgency=medium
* Fix kexec on ACPI/UEFI ARM systems w/ crashkernel reserved memory
beyond the 4GiB boundary. (LP: #1851190)
* Apply patch from Peter Jones to forbid the
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in:
Verified linux/disco-proposed version 5.0.0-38.41.
** Tags removed: verification-needed-disco verification-needed-eoan
** Tags added: verification-done-disco
** Tags added: verification-needed-eoan
** Description changed:
+ [SRU Justification]
+
+ [Impact]
+ Intel RAPL (running average power
The verification of the Stable Release Update for grub2 has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
The verification of the Stable Release Update for bcmwl has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
The verification of the Stable Release Update for ddcci-driver-linux has
completed successfully and the package is now being released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you
This bug was fixed in the package broadcom-sta - 6.30.223.271-8ubuntu0.1
---
broadcom-sta (6.30.223.271-8ubuntu0.1) bionic; urgency=medium
* Fix build failures for i386 and 5.3 (LP: #1830042).
- Added d/p/22-linux51.patch
- Updated d/p/20-linux414.patch
-- Marcelo
This bug was fixed in the package bcmwl - 6.30.223.271+bdcom-
0ubuntu5~18.04.1
---
bcmwl (6.30.223.271+bdcom-0ubuntu5~18.04.1) bionic; urgency=medium
[ Seth Forshee ]
* debian/dkms.conf.in,
debian/patches/0027-add-support-for-linux-5.1.patch (LP: #1827100):
- Add support
Shim measuring duplicate EV_EFI_VARIABLE_AUTHORITY events (one for GRUB
and one for the kernel) when both executables are verified with the same
certificate is actually a bug - although there should be an
EV_EFI_BOOT_SERVICES_APPLICATION event for each executable, there should
only be a single
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Tried to upload data but could not:
janice@Janice-Dell:~$ apport-collect 1855264
The authorization page:
(https://launchpad.net/+authorize-token?oauth_token=zl65K19jf59zrFR5rhdj_permission=DESKTOP_INTEGRATION)
should be opening in your browser. Use your browser to authorize
this program to
Verified linux/disco-proposed version 5.0.0-38.41.
** Tags removed: verification-needed-disco
** Tags added: verification-done-disco
** Description changed:
+ [SRU Justification]
+
+ [Impact]
+ Cometlake -S 6+2 is using a different CPU Model number: DEC 165, HEX
+ A5, and turbostat doesn't
This bug was fixed in the package grub2-signed - 1.93.15
---
grub2-signed (1.93.15) bionic; urgency=medium
* Rebuild against grub2 2.02-2ubuntu8.14. (LP: #1851190) (LP:
#1851897)
-- dann frazier Sat, 09 Nov 2019 08:50:43 -0700
** Changed in: grub2-signed (Ubuntu Bionic)
This bug was fixed in the package gnome-software -
3.20.5-0ubuntu0.16.04.13
---
gnome-software (3.20.5-0ubuntu0.16.04.13) xenial; urgency=medium
* debian/patches/0020-Add-a-basic-permissions-system.patch:
* debian/patches/0021-Add-a-Snap-plugin.patch:
- Fix interface
This bug was fixed in the package grub2-signed - 1.93.15
---
grub2-signed (1.93.15) bionic; urgency=medium
* Rebuild against grub2 2.02-2ubuntu8.14. (LP: #1851190) (LP:
#1851897)
-- dann frazier Sat, 09 Nov 2019 08:50:43 -0700
** Changed in: grub2-signed (Ubuntu Bionic)
The verification of the Stable Release Update for systemd has completed
successfully and the package is now being released to -updates.
Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a
This bug was fixed in the package gnome-software -
3.20.5-0ubuntu0.16.04.13
---
gnome-software (3.20.5-0ubuntu0.16.04.13) xenial; urgency=medium
* debian/patches/0020-Add-a-basic-permissions-system.patch:
* debian/patches/0021-Add-a-Snap-plugin.patch:
- Fix interface
I made a small example to reproduce the bug with Bionic:
https://github.com/MichaelGrupp/grpc_test_bionic
Re-building the Ubuntu package without -Wl,-Bsymbolic-functions in the
LDFLAGS (as mentioned in https://github.com/grpc/grpc/issues/11195)
fixes it.
As an experiment we also replaced the
This bug was fixed in the package systemd - 229-4ubuntu21.23
---
systemd (229-4ubuntu21.23) xenial; urgency=medium
* d/p/core-use-an-AF_UNIX-SOCK_DGRAM-socket-for-cgroup-age.patch:
- prevent logind from leaking session files (LP: #1846787)
-- Heitor Alves de Siqueira Mon,
Verified linux/disco-proposed version 5.0.0-38.41.
** Description changed:
+ [SRU Justification]
+
+ [Impact]
+ There is no way to access information under /sys/kernel/debug/pmc_core
+ on Comet Lake platforms.
+
+ [Fix]
+ * https://lkml.org/lkml/2019/11/18/713 ("platform/x86: intel_pmc_core:
In the absence of a reply to comment #5 and due to the time elapsed
since the report, closing.
** Changed in: ubuntu
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1855264
and then change the status of the bug to 'Confirmed'.
If, due to the
Could we please backport it and make it available to Bionic?
I faced that again for another customer deployment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838607
Title:
vaultlocker service
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Public bug reported:
With pcre 10.32-5, rspamd starts up just fine. Update pcre to 10.34-3
and this command starts to segfault:
root@focal-rspamd:~# rspamadm configtest
Segmentation fault (core dumped)
This is also happening in debian, see
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
This bug only is present on Wayland.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850874
Title:
gnome-shell (via Mesa/LLVMpipe in a virtual machine) uses all CPU
cores just to update the screen
-- GitLab Migration Automatic Message --
This bug has been migrated to freedesktop.org's GitLab instance and has
been closed from further activity.
You can subscribe and participate further through the new bug through
this link to our GitLab instance:
** Changed in: telepathy-gabble
Status: Incomplete => Unknown
** Bug watch added: gitlab.freedesktop.org/telepathy/telepathy-gabble/issues
#199
https://gitlab.freedesktop.org/telepathy/telepathy-gabble/issues/199
--
You received this bug notification because you are a member of
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
A simple rebuild with 10.34 picks that up as an updated verisoned dep,
but the segfault still happens.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1855269
Title:
segfault with pcre10.34-3
To
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
** Changed in: kernel-sru-workflow/certification-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/verification-testing
Status: New => Confirmed
** Changed in:
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Tried to upload data but could not:
janice@Janice-Dell:~$ apport-collect 1855264
The authorization page:
(https://launchpad.net/+authorize-token?oauth_token=zl65K19jf59zrFR5rhdj_permission=DESKTOP_INTEGRATION)
should be opening in your browser. Use your browser to authorize
this program to
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
I downloading & booted Xubuntu 20.04 daily and played there.
same hp dc7700 (c2d-e6320, 5gb, nvidia quadro nvs 290)
on same box. adding xscreensaver & using 'flurry', I got the same jerky/choppy
response here once packages added & running.
I could see the xscreensaver dialog box where I click
This has also been reported here: #1854764
fixed by upgrading to 3.20191115.1ubuntu0.19.10.2:
Published on 2019-12-04
Copied from ubuntu eoan in PPA for Ubuntu Security Proposed by Ubuntu
Archive Robot
Changelog
intel-microcode (3.20191115.1ubuntu0.19.10.2) eoan-security;
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Thanks for providing the best solution regarding the code_fix. Other
Solutions are available here:
https://www.tingoc.com/monster-hunter-2020-world-crack/
And Second Best Solution that I real appreciate on this website
https://tingosoft.com/letasoft-sound-booster-2020-cracked/
Best of Luck!!!
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/verification-testing
Status: New => Confirmed
** Changed in:
Kernel deb testing completes, no regressions found. Ready for Updates.
Results here: https://trello.com/c/3bwit46l/256-disco-linux-
image-500-38-generic-500-3841
** Changed in: kernel-sru-workflow/certification-testing
Status: Confirmed => Fix Released
--
You received this bug
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: New => Confirmed
** Tags added: block-proposed-bionic
** Tags added: block-proposed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
+
** Changed in: kernel-sru-workflow/automated-testing
Status: In Progress => Incomplete
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow
Hello Mauricio, or anyone else affected,
Accepted stress-ng into eoan-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/stress-
ng/0.10.07-1ubuntu2 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
The i386 dep8 test seems to pass just because the pcre2 library isn't
updated, probably related to the i386 removal we are going through:
>From
Adding a pcre2 task since it could be a bug in the new release, as the
segfault happens inside that library.
** Also affects: pcre2 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: rspamd (Ubuntu)
Importance: High => Undecided
--
You received this bug notification because
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
Hello Mauricio, or anyone else affected,
Accepted stress-ng into disco-proposed. The package will build now and
be available at https://launchpad.net/ubuntu/+source/stress-
ng/0.09.57-0ubuntu4 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Confirmed => In Progress
** Changed in: kernel-sru-workflow/promote-to-proposed
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Andy
Whitcroft (apw)
--
You received this bug notification because you are a
Hello Mauricio, or anyone else affected,
Accepted stress-ng into bionic-proposed. The package will build now and
be available at https://launchpad.net/ubuntu/+source/stress-
ng/0.09.25-1ubuntu5 in a few hours, and then in the -proposed
repository.
Please help us by testing this new package. See
Related to https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1852001
Disabling swap helps.
A new kernel will likely solve the problem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1851349
Title:
Public bug reported:
[Impact]
* /etc/update-motd.d snippets throw errors when a nomal user runs them.
* This prevents showing MOTD when the user is dropped to a regular user's
shell in WSL.
[Test Case]
* Run update-motd's autopkgtest and observe update-notifier's scripts
not throwing
** Description changed:
When installing the haproxy package from the current Ubuntu 18.04 Bionic
repos, the package does not install the directory /run/haproxy. This
directory is mentioned in the default config file
/etc/haproxy/haproxy.cfg:
stats socket /run/haproxy/admin.sock mode
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
-- swm properties --
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854781
Title:
disco/linux-oracle: 5.0.0-1009.14 -proposed
Why is the version kept at v2.0.3 ? v3.0 is out!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1748861
Title:
Upgrade package to libwebsockets >= 2.3.0 for 18.04 LTS
To manage notifications about
Public bug reported:
[Impact]
* Information of HWE kernels are shown in containers despite this information
is useless most of the time since containers use the host systems' kernels.
* The check for HWE kernels is noticably slow OTOH, taking around 0.2s on my
intel i5 laptop.
[Test Case]
** Changed in: kernel-sru-workflow/security-signoff
Status: New => Confirmed
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: In Progress => Fix Committed
** Description changed:
This bug will contain status and test results related to a kernel source
(or snap) as stated in the title.
For an explanation of the tasks and the associated
** Changed in: ubiquity (Ubuntu)
Importance: Undecided => Low
** Changed in: ubiquity (Ubuntu)
Status: Confirmed => Fix Committed
** Changed in: ubiquity (Ubuntu)
Assignee: (unassigned) => Sebastien Bacher (seb128)
--
You received this bug notification because you are a member
** Changed in: kernel-sru-workflow/automated-testing
Status: New => Confirmed
** Changed in: kernel-sru-workflow/promote-to-proposed
Status: Fix Committed => Fix Released
** Changed in: kernel-sru-workflow/regression-testing
Status: New => Confirmed
** Changed in:
** Also affects: lvm2 (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: initramfs-tools (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: lvm2 (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects: initramfs-tools
We have the same issue on a Intel NUC7i5BN on Ubuntu 18.04. This was
working in 16.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1849830
Title:
usb_set_interface failed (-110) when connecting a
** Changed in: lvm2 (Ubuntu Xenial)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854981
Title:
system doesn't properly boot as expected if /usr is on its own LV
generated configuration apport-bug --save bug.txt linux
** Attachment added: "bug.txt"
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855264/+attachment/5310015/+files/bug.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: kernel-sru-workflow/security-signoff
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854781
Title:
disco/linux-oracle: 5.0.0-1009.14 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854766
Title:
disco/linux-raspi2: 5.0.0-1024.25 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854784
Title:
disco/linux-snapdragon: 5.0.0-1028.30 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854771
Title:
disco/linux-azure: 5.0.0-1028.30 -proposed tracker
** Description changed:
+ ## DRAFT in progress ##
+
+ [Impact]
+ In summary, the problem is a LVM 'auto-activation' issue. Basically the LVM
activation doesn't occurs during the boot process (except for LVM root
partition) and since /usr is an important component before the 'pivot'[0], the
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854781
Title:
disco/linux-oracle: 5.0.0-1009.14 -proposed
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854777
Title:
disco/linux-gcp: 5.0.0-1027.28 -proposed tracker
** Changed in: kernel-sru-workflow/security-signoff
Status: In Progress => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854778
Title:
disco/linux-kvm: 5.0.0-1024.26 -proposed tracker
1 - 100 of 916 matches
Mail list logo