[Bug 2064482] [NEW] impossible to start ubuntu after upgrade from 22.04 to23.10
Public bug reported: impossible to start ubuntu after upgrade from 22.04 to 23.10 ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: ubiquity 18.04.14.6 ProcVersionSignature: Ubuntu 4.15.0-29.31-generic 4.15.18 Uname: Linux 4.15.0-29-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.2 Architecture: amd64 CasperVersion: 1.394 Date: Wed May 1 06:16:38 2024 InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/ubuntu.seed boot=casper quiet splash --- LiveMediaBuild: Ubuntu 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) SourcePackage: ubiquity UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: ubiquity (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic ubiquity-18.04.14.6 ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064482 Title: impossible to start ubuntu after upgrade from 22.04 to23.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2064482/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2046844] Re: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP
Before I saw your post about the environment variable, I edited the profile in /etc/apparmor.d/firefox to reflect /opt/firefox. If I launch from a mate desktop icon, or from the menu, all is well. If I click on a link, from say an email, I get the tab crashed bug again. Is there a way to work around this? I'm using Thunderbird, installed the same way, for my email. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2046844 Title: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/2046844/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2046844] Re: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP
I have read in a couple other pages that I can edit /etc/apparmor.d/firefox. Since I'm using version 124 beta 9, and my firefox is installed in /opt/firefox, do I just adjust the path in that file to make it work? Thanks much in advance for the help. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2046844 Title: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/2046844/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2046844] Re: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP
I am seeing this also, as of updating all packages, about fifteen minutes ago. Is there a definite fix released? This doesn't mean we have to resort to using firefox from snap, right? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2046844 Title: AppArmor user namespace creation restrictions cause many applications to crash with SIGTRAP To manage notifications about this bug go to: https://bugs.launchpad.net/apparmor/+bug/2046844/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975396] Re: I am trying to download programming from my baofeng uv5r, using Chirp on Ubuntu 22.04. After the progress bar gets to 100%, I receive the error module 'collections' has no attribute
Not sure if I put the problem description in the right place, so putting it here as well. I am trying to download programming from my baofeng uv5r, using Chirp on Ubuntu 22.04. After the progress bar gets to 100%, I receive the error message "module 'collections' has no attribute callable." -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975396 Title: I am trying to download programming from my baofeng uv5r, using Chirp on Ubuntu 22.04. After the progress bar gets to 100%, I receive the error module 'collections' has no attribute callable. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chirp/+bug/1975396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975396] [NEW] I am trying to download programming from my baofeng uv5r, using Chirp on Ubuntu 22.04. After the progress bar gets to 100%, I receive the error module 'collections' has no attribut
Public bug reported: No further information to add, accept that I am using Chirp from apt, instead of snap or flatpack. ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: chirp 1:20200227+py3+20200213-3 ProcVersionSignature: Ubuntu 5.15.0-30.31-generic 5.15.30 Uname: Linux 5.15.0-30-generic x86_64 ApportVersion: 2.20.11-0ubuntu82.1 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: MATE Date: Sat May 21 18:31:49 2022 InstallationDate: Installed on 2021-11-08 (194 days ago) InstallationMedia: Ubuntu-MATE 21.04 "Hirsute Hippo" - Release amd64 (20210420) PackageArchitecture: all ProcEnviron: LANGUAGE=en_US PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash SourcePackage: chirp UpgradeStatus: Upgraded to jammy on 2022-05-13 (7 days ago) ** Affects: chirp (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975396 Title: I am trying to download programming from my baofeng uv5r, using Chirp on Ubuntu 22.04. After the progress bar gets to 100%, I receive the error module 'collections' has no attribute callable. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chirp/+bug/1975396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1962314] Re: grub 2 custom.cfg colors not all used in Advanced options
** Description changed: 1) Ubuntu MATE 21.10 2) grub 2.04-1ubuntu47 3) I use text-mode for Grub, so made the following changes in /etc/default/grub: GRUB_TIMEOUT_STYLE=timeout GRUB_TERMINAL=console I then created a /boot/grub/custom.cfg with the following entries: color_normal="light-gray/blue" color_highlight="white/blue" menu_color_normal="light-gray/blue" menu_color_highlight="yellow/magenta" I expect these colors to be used on both the initial menu showing the OS version, Advanced options, and two Memory test options; and also on the Advanced options submenu showing the list of available kernels. 4) What I'm seeing is that these colors are accurately reflected on the initial text menu. However, if I select Advanced Options to show the list of kernels, then the first three color specs are shown properly. But the last one, for the highlighted menu entry is not respected. Instead, the color_highlight combination of white/blue is used instead. Perhaps menu_color_highlight is not used on submenus, but I cannot find anything that states this restriction. + + After some searching, I found a suggestion to manually update the + /boot/grub/grub.cfg file to add the menu_color options to the Advanced + options submenu, like so: + + submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-43548515-6ad7-4cdb-b295-f880ef847d12' { + menu_color_normal="light-gray/blue" + menu_color_highlight="yellow/magenta" + + menuentry 'Ubuntu, with Linux 5.13.0-30-generic' ... + + This does indeed produce the desired result, in that the highlighted + menu item now has the desired colors. But of course these changes will + be lost the next time a new kernel is installed. + + Since the submenu inherits color_normal and color_hightlight from the + top level menu, would be great if the menu_color_normal and + menu_color_highlight were also inherited. I don't believe the submenu + can be modified via custom.cfg, since custom.cfg is simply sourced from + grub.cfg at the very end, after all the menu and submenu entries have + been created. ** Description changed: 1) Ubuntu MATE 21.10 2) grub 2.04-1ubuntu47 3) I use text-mode for Grub, so made the following changes in /etc/default/grub: GRUB_TIMEOUT_STYLE=timeout GRUB_TERMINAL=console I then created a /boot/grub/custom.cfg with the following entries: color_normal="light-gray/blue" color_highlight="white/blue" menu_color_normal="light-gray/blue" menu_color_highlight="yellow/magenta" I expect these colors to be used on both the initial menu showing the OS version, Advanced options, and two Memory test options; and also on the Advanced options submenu showing the list of available kernels. 4) What I'm seeing is that these colors are accurately reflected on the initial text menu. However, if I select Advanced Options to show the list of kernels, then the first three color specs are shown properly. But the last one, for the highlighted menu entry is not respected. Instead, the color_highlight combination of white/blue is used instead. - Perhaps menu_color_highlight is not used on submenus, but I cannot find - anything that states this restriction. - After some searching, I found a suggestion to manually update the /boot/grub/grub.cfg file to add the menu_color options to the Advanced options submenu, like so: - submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux-advanced-43548515-6ad7-4cdb-b295-f880ef847d12' { - menu_color_normal="light-gray/blue" - menu_color_highlight="yellow/magenta" + submenu 'Advanced options for Ubuntu' $menuentry_id_option 'gnulinux- + advanced-43548515-6ad7-4cdb-b295-f880ef847d12' { - menuentry 'Ubuntu, with Linux 5.13.0-30-generic' ... + menu_color_normal="light-gray/blue" + menu_color_highlight="yellow/magenta" + + menuentry 'Ubuntu, with Linux 5.13.0-30-generic' ... This does indeed produce the desired result, in that the highlighted menu item now has the desired colors. But of course these changes will be lost the next time a new kernel is installed. Since the submenu inherits color_normal and color_hightlight from the top level menu, would be great if the menu_color_normal and menu_color_highlight were also inherited. I don't believe the submenu can be modified via custom.cfg, since custom.cfg is simply sourced from grub.cfg at the very end, after all the menu and submenu entries have been created. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1962314 Title: grub 2 custom.cfg colors not all used in Advanced options To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1962314/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com
[Bug 1962314] Re: grub 2 custom.cfg colors not all used in Advanced options
** Description changed: 1) Ubuntu MATE 21.10 2) grub 2.04-1ubuntu47 3) I use text-mode for Grub, so made the following changes in /etc/default/grub: GRUB_TIMEOUT_STYLE=timeout GRUB_TERMINAL=console I then created a /boot/grub/custom.cfg with the following entries: color_normal="light-gray/blue" color_highlight="white/blue" menu_color_normal="light-gray/blue" menu_color_highlight="yellow/magenta" I expect these colors to be used on both the initial menu showing the OS version, Advanced options, and two Memory test options; and also on the - Advanced options showing the list of available kernels. + Advanced options submenu showing the list of available kernels. 4) What I'm seeing is that these colors are accurately reflected on the initial text menu. However, if I select Advanced Options to show the list of kernels, then the first three color specs are shown properly. But the last one, for the highlighted menu entry is not respected. Instead, the color_highlight combination of white/blue is used instead. + + Perhaps menu_color_highlight is not used on submenus, but I cannot find + anything that states this restriction. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1962314 Title: grub 2 custom.cfg colors not all used in Advanced options To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1962314/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1962314] Re: grub 2 custom.cfg colors not all used in Advanced options
** Description changed: 1) Ubuntu MATE 21.10 2) grub 2.04-1ubuntu47 - 3) I created a /boot/grub/custom.cfg with the following entries: + 3) I use text-mode for Grub, so made the following changes in /etc/default/grub: + + GRUB_TIMEOUT_STYLE=timeout + GRUB_TERMINAL=console + + I then created a /boot/grub/custom.cfg with the following entries: color_normal="light-gray/blue" color_highlight="white/blue" menu_color_normal="light-gray/blue" menu_color_highlight="yellow/magenta" I expect these colors to be used on both the initial menu showing the OS version, Advanced options, and two Memory test options; and also on the Advanced options showing the list of available kernels. 4) What I'm seeing is that these colors are accurately reflected on the initial text menu. However, if I select Advanced Options to show the list of kernels, then the first three color specs are shown properly. But the last one, for the highlighted menu entry is not respected. - Instead, the default combination of white/blue is used instead. + Instead, the color_highlight combination of white/blue is used instead. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1962314 Title: grub 2 custom.cfg colors not all used in Advanced options To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1962314/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Ubuntu-QC] Nouveau sur la liste
Bonjour à tous, Je suis nouveau sur la liste Ubuntu-Québec. Étant donné le nom de la liste, je me demandais si jes discussions portaient uniquement sur Ubuntu. J'utilise principalement des distributions dérivées d'ubuntu tel que Kubuntu, Xubuntu et Mint. J'aime bien donnée une seconde vie à des vieux ordinateurs à l'aide de linux. Je devrai bientôt me tourner vers Debian dans certains cas puisque Ubuntu et les distributions dérivées ne supporteront plus les processeurs 32 bits. Guy, -- Ubuntu-quebec mailing list Ubuntu-quebec@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-quebec
[Bug 1962314] [NEW] grub 2 custom.cfg colors not all used in Advanced options
Public bug reported: 1) Ubuntu MATE 21.10 2) grub 2.04-1ubuntu47 3) I created a /boot/grub/custom.cfg with the following entries: color_normal="light-gray/blue" color_highlight="white/blue" menu_color_normal="light-gray/blue" menu_color_highlight="yellow/magenta" I expect these colors to be used on both the initial menu showing the OS version, Advanced options, and two Memory test options; and also on the Advanced options showing the list of available kernels. 4) What I'm seeing is that these colors are accurately reflected on the initial text menu. However, if I select Advanced Options to show the list of kernels, then the first three color specs are shown properly. But the last one, for the highlighted menu entry is not respected. Instead, the default combination of white/blue is used instead. ** Affects: grub2 (Ubuntu) Importance: Undecided Status: New ** Tags: color grub2 mate menu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1962314 Title: grub 2 custom.cfg colors not all used in Advanced options To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1962314/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959473] Re: Evolution: Migrate to People API to retain programmatic access to Google Contacts.
Norbert, thank you for the quick response. I'm very impressed with apport automatically updating this bug report with requested info! I will try the FlatPak version when I have some time, since the next LTS release isn't until April 2022. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959473 Title: Evolution: Migrate to People API to retain programmatic access to Google Contacts. To manage notifications about this bug go to: https://bugs.launchpad.net/evolution/+bug/1959473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959473] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1959473/+attachment/5558143/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959473 Title: Evolution: Migrate to People API to retain programmatic access to Google Contacts. To manage notifications about this bug go to: https://bugs.launchpad.net/evolution/+bug/1959473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959473] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1959473/+attachment/5558142/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959473 Title: Evolution: Migrate to People API to retain programmatic access to Google Contacts. To manage notifications about this bug go to: https://bugs.launchpad.net/evolution/+bug/1959473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959473] Re: Evolution: Migrate to People API to retain programmatic access to Google Contacts.
apport information ** Tags added: apport-collected third-party-packages ** Description changed: I'm running Ubuntu MATE 20.04; I stick with LTS for this system. I use Evolution for email and calendar. Tonight I got this message: = Failed to connect address book “guy.rouill...@gmail.com : Contacts” Invalid request URI or header, or unsupported nonstandard parameter: Contacts API is being deprecated. Migrate to People API to retain programmatic access to Google Contacts. See https://developers.google.com/people/contacts-api-migration. == I went to report this on the GNOME bug tracker and found this existing issue: https://gitlab.gnome.org/GNOME/evolution/-/issues/1655 That issue was closed with this comment: == "Andre Klapper Issue found on latest Evolution in Debian 11 (3.38.3-1) That version is ancient and not maintained anymore by GNOME developers. Feel free to file a bug report in your distribution's issue tracker." The version in MATE is even older: 3.36.5-0ubuntu1 - So apparently Evolution in MATE is currently not functional. We need to - update to a later release. I will update to the newer LTS of MATE when - it is released. + So apparently Evolution in MATE is currently not functional. We need to update to a later release. I will update to the newer LTS of MATE when it is released. + --- + ProblemType: Bug + ApportVersion: 2.20.11-0ubuntu27.21 + Architecture: amd64 + CasperMD5CheckResult: skip + CurrentDesktop: MATE + DistroRelease: Ubuntu 20.04 + InstallationDate: Installed on 2018-10-05 (1212 days ago) + InstallationMedia: Ubuntu-MATE 18.04.1 LTS "Bionic Beaver" - Release amd64 (20180725) + Package: evolution-data-server + PackageArchitecture: amd64 + ProcVersionSignature: Ubuntu 5.4.0-92.103-generic 5.4.157 + Tags: third-party-packages focal + Uname: Linux 5.4.0-92-generic x86_64 + UpgradeStatus: Upgraded to focal on 2020-05-17 (622 days ago) + UserGroups: adm cdrom dip lpadmin plugdev sambashare sudo + _MarkForUpload: True ** Attachment added: "Dependencies.txt" https://bugs.launchpad.net/bugs/1959473/+attachment/5558141/+files/Dependencies.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959473 Title: Evolution: Migrate to People API to retain programmatic access to Google Contacts. To manage notifications about this bug go to: https://bugs.launchpad.net/evolution/+bug/1959473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1939210] Re: When using HWE, zfs-kmod and zfs user tools versions must match
This affects https://bugs.launchpad.net/ubuntu/+source/zsys/+bug/index.php?1959017 (for some reason couldn't link the bug URL) GitHub URL is: https://github.com/ubuntu/zsys/issues/220 ** Also affects: zsys (Ubuntu) Importance: Undecided Status: New ** Bug watch added: github.com/ubuntu/zsys/issues #220 https://github.com/ubuntu/zsys/issues/220 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939210 Title: When using HWE, zfs-kmod and zfs user tools versions must match To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1939210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959017] [NEW] zsys-commit.service will fail when zfs tools don't match DKMS version
Public bug reported: Originally reported the bug in [zsys's github issues](https://github.com/ubuntu/zsys/issues/220), wanting to link to zfs-linux bug, reporting it here to link it. **Describe the bug** This isn't a bug in `zsys` so much as a bug in the way Ubuntu manages ZFS packages which `zsys` relies on. The root cause is already reported at: > https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1939210 When using HWE based kernel, the zfs-kmod is updated (currently to 2.x) while the LTS zfs packages are at 0.8.3 Currently the solution is to update the tools, the bug linked above points to a 3rd party ppa with updated tools. The reason for reporting the bug here - it affects the `zfs promote` command, which is used after a restore from a previous state occurs. So I thought this would be a good place to document this issue. - I also suggest that `zsysctl` should test for this discrepancy and warn about it. - Hoping an Ubuntu insider would help addressing this issue with the original bug maintainers for next LTS version (coming up in a couple of months) **To Reproduce** Steps to reproduce the behavior: 1. Make sure your system uses HWE kernel 2. Run `zfs version` and get a discrepancy in versions: > ``` > zfs-0.8.3-1ubuntu12.13 > zfs-kmod-2.0.6-1ubuntu2 > ``` 2. Make sure you have a saved zsys state in your GRUB menu. 3. Reboot to GRUB and select a saved state 4. Run `systemctl status zsys-commit` to see the error. `zsys-commit` service runs the equivalent of `sudo zsysctl boot commit` which marks the boot as successful. > ``` > ● zsys-commit.service - Mark current ZSYS boot as successful > Loaded: loaded (/lib/systemd/system/zsys-commit.service; enabled; vendor > preset: enabled) > Active: failed (Result: exit-code) since Sun 2022-01-23 23:21:41 EST; 10h > ago > Main PID: 12287 (code=exited, status=1/FAILURE) > > Jan 23 23:21:40 hostname systemd[1]: Starting Mark current ZSYS boot as > successful... > Jan 23 23:21:41 hostname zsysctl[12287]: level=error msg="couldn't commit: > couldn't promote dataset \"rpool/ROOT/ubuntu_ssfirw\": couldn't promote > \"rpool/ROOT/ubuntu_ssfirw\": not a cloned filesystem" > Jan 23 23:21:41 hostname systemd[1]: zsys-commit.service: Main process > exited, code=exited, status=1/FAILURE > Jan 23 23:21:41 hostname systemd[1]: zsys-commit.service: Failed with result > 'exit-code'. > Jan 23 23:21:41 hostname systemd[1]: Failed to start Mark current ZSYS boot > as successful. > ``` **Expected behavior** > ``` > ● zsys-commit.service - Mark current ZSYS boot as successful > Loaded: loaded (/lib/systemd/system/zsys-commit.service; enabled; vendor > preset: enabled) > Active: active (exited) since Mon 2022-01-24 18:51:11 EST; 15h ago >Main PID: 297120 (code=exited, status=0/SUCCESS) > Tasks: 0 (limit: 18951) > Memory: 0B > CGroup: /system.slice/zsys-commit.service > > Jan 24 18:51:10 Sygin systemd[1]: Starting Mark current ZSYS boot as > successful... > Jan 24 18:51:11 Sygin systemd[1]: Finished Mark current ZSYS boot as > successful. > ``` **ubuntu-bug output** I'm no longer in the broken state, and didn't run `ubuntu-bug` before. Bug report (mentioned above) contains much more info. **Installed versions:** - OS: Zorin OS 16 (based on Focal Fossa - Ubuntu 20.04 LTS) - Zsysd running version: 0.4.8 **Additional context** I've documented my ordeal as an askubuntu question which I ended up answering ([link](https://askubuntu.com/a/1389086/720005)). ** Affects: zsys (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959017 Title: zsys-commit.service will fail when zfs tools don't match DKMS version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/zsys/+bug/1959017/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1947568] Re: cannot promote clone: "not a cloned filesystem"
https://bugs.launchpad.net/ubuntu/+source/zfs- linux/+bug/1947568/comments/1 This is my exact issue as well, elbit using a focal based distro - Zorin: $ lsb_release -a No LSB modules are available. Distributor ID: Zorin Description:Zorin OS 16 Release:16 Codename: focal $ uname -r 5.13.0-27-generic $ apt-cache policy zfsutils-linux zfsutils-linux: Installed: 0.8.3-1ubuntu12.13 Candidate: 0.8.3-1ubuntu12.13 Version table: *** 0.8.3-1ubuntu12.13 500 500 http://us.archive.ubuntu.com/ubuntu focal-updates/main amd64 Packages 100 /var/lib/dpkg/status 0.8.3-1ubuntu12.9 500 500 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages 0.8.3-1ubuntu12 500 500 http://us.archive.ubuntu.com/ubuntu focal/main amd64 Packages -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1947568 Title: cannot promote clone: "not a cloned filesystem" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/zfs-linux/+bug/1947568/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1304067] Re: Mouse cursor changes size in some GTK2 applications
Confirm same issues with Kubuntu 20.04 (fully patched). Affects multiple applications inc. Konsole, Chromium, Firefox. Also confirm that following some of the suggestions in this archlinux HowTo *FIXED* the issues I was experiencing. NOTE that one does NOT have to reboot for these changes to take affect, simply logout and log back in (XWindows is not loaded before one boots, so changes to the X system configs requite logout/login). I modifed .Xresources, .xinitrc, .local/, and .icons Now the cursors are as I expect them to be. https://bbs.archlinux.org/viewtopic.php?id=271672 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1304067 Title: Mouse cursor changes size in some GTK2 applications To manage notifications about this bug go to: https://bugs.launchpad.net/elementaryos/+bug/1304067/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1954305] [NEW] Unable to upgrade Ubuntu 18.04 LTS to newer version
Public bug reported: I attempted to upgrade from Ubuntu 18.04 LTS to a newer LTS version, but the process keeps failing, even after PPA were removed. Please see output from terminal: (base) guy@EOA1:~$ sudo do-release-upgrade Checking for a new Ubuntu release Get:1 Upgrade tool signature [1,554 B] Get:2 Upgrade tool [1,340 kB] Fetched 1,342 kB in 0s (0 B/s) authenticate 'focal.tar.gz' against 'focal.tar.gz.gpg' extracting 'focal.tar.gz' Reading cache Checking package manager Reading package lists... Done Building dependency tree Reading state information... Done Hit http://ie.archive.ubuntu.com/ubuntu bionic InRelease Get:1 http://ie.archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB] Hit http://dl.google.com/linux/chrome/deb stable InRelease Hit https://deb.nodesource.com/node_13.x bionic InRelease Hit http://repository.spotify.com stable InRelease Hit https://packages.microsoft.com/repos/ms-teams stable InRelease Get:2 http://ie.archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB] Hit http://dl.google.com/linux/earth/deb stable InRelease Get:3 http://security.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB] Hit https://qgis.org/ubuntu bionic InRelease Hit https://packagecloud.io/AtomEditor/atom/any any InRelease Hit https://packagecloud.io/slacktechnologies/slack/debian jessie InRelease Fetched 252 kB in 0s (0 B/s) Reading package lists... Done Building dependency tree Reading state information... Done Checking for installed snaps Calculating snap size requirements Updating repository information Third party sources disabled Some third party entries in your sources.list were disabled. You can re-enable them after the upgrade with the 'software-properties' tool or your package manager. To continue please press [ENTER] Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Get:2 http://security.ubuntu.com/ubuntu focal-security/main i386 Packages [344 kB] Get:3 http://security.ubuntu.com/ubuntu focal-security/main amd64 Packages [1,064 kB] Get:4 http://ie.archive.ubuntu.com/ubuntu focal InRelease [265 kB] Get:5 http://security.ubuntu.com/ubuntu focal-security/main Translation-en [196 kB] Get:6 http://security.ubuntu.com/ubuntu focal-security/main amd64 DEP-11 Metadata [35.7 kB] Get:7 http://security.ubuntu.com/ubuntu focal-security/main DEP-11 48x48 Icons [18.3 kB] Get:8 http://security.ubuntu.com/ubuntu focal-security/main DEP-11 64x64 Icons [35.5 kB] Get:9 http://security.ubuntu.com/ubuntu focal-security/main amd64 c-n-f Metadata [9,080 B] Get:10 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 Packages [560 kB] Get:11 http://security.ubuntu.com/ubuntu focal-security/restricted i386 Packages [20.5 kB] Get:12 http://security.ubuntu.com/ubuntu focal-security/restricted Translation-en [80.2 kB] Get:13 http://security.ubuntu.com/ubuntu focal-security/restricted amd64 c-n-f Metadata [528 B] Get:14 http://security.ubuntu.com/ubuntu focal-security/universe i386 Packages [523 kB] Get:15 http://security.ubuntu.com/ubuntu focal-security/universe amd64 Packages [665 kB] Get:16 http://security.ubuntu.com/ubuntu focal-security/universe Translation-en [111 kB] Get:17 http://security.ubuntu.com/ubuntu focal-security/universe amd64 DEP-11 Metadata [64.6 kB] Get:18 http://security.ubuntu.com/ubuntu focal-security/universe DEP-11 48x48 Icons [32.5 kB] Get:19 http://security.ubuntu.com/ubuntu focal-security/universe DEP-11 64x64 Icons [66.4 kB] Get:20 http://security.ubuntu.com/ubuntu focal-security/universe amd64 c-n-f Metadata [12.9 kB] Get:21 http://security.ubuntu.com/ubuntu focal-security/multiverse i386 Packages [7,212 B] Get:22 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 Packages [21.9 kB] Get:23 http://security.ubuntu.com/ubuntu focal-security/multiverse Translation-en [4,948 B] Get:24 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 DEP-11 Metadata [2,464 B] Get:25 http://security.ubuntu.com/ubuntu focal-security/multiverse DEP-11 48x48 Icons [29 B] Get:26 http://security.ubuntu.com/ubuntu focal-security/multiverse DEP-11 64x64 Icons [2,638 B] Get:27 http://security.ubuntu.com/ubuntu focal-security/multiverse amd64 c-n-f Metadata [540 B] Get:28 http://ie.archive.ubuntu.com/ubuntu focal-updates InRelease [114 kB] Get:29 http://ie.archive.ubuntu.com/ubuntu focal-backports InRelease [108 kB] Get:30 http://ie.archive.ubuntu.com/ubuntu focal/main amd64 Packages [970 kB] Get:31 http://ie.archive.ubuntu.com/ubuntu focal/main i386 Packages [718 kB] Get:32
[Bug 1799319] Re: Upgrade to 18.10 fails: Please install all available updates
I had forgotten I had submitted this bug report, and just encountered this same issue when I upgraded from 21.04 to 21.10. I reported my problem with this latest upgrade on the Ubuntu Mate Community forum. At least I'm consistent: the post there reads almost exactly like my bug report here. :) See details here: https://ubuntu-mate.community/t/prompt-to-upgrade-21-04-to-21-10-does- nothing/24672 This is a little disheartening that the same issue continues 2 1/2 years later. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1799319 Title: Upgrade to 18.10 fails: Please install all available updates To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1799319/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1951326] [NEW] i cannot force dist-upgrade nor do-release-upgrade -d
Public bug reported: guy@x360:~$ sudo do-release-upgrade -d Checking for a new Ubuntu release Get:1 Upgrade tool signature [819 B] Get:2 Upgrade tool [1,272 kB] Fetched 1,273 kB in 0s (0 B/s) authenticate 'jammy.tar.gz' against 'jammy.tar.gz.gpg' extracting 'jammy.tar.gz' Reading cache Checking package manager Reading package lists... Done Building dependency tree Reading state information... Done Get:1 http://security.ubuntu.com/ubuntu focal-security InRelease [114 kB] Hit http://il.archive.ubuntu.com/ubuntu focal InRelease Hit http://il.archive.ubuntu.com/ubuntu focal-updates InRelease Hit http://il.archive.ubuntu.com/ubuntu focal-backports InRelease Fetched 114 kB in 0s (0 B/s) Reading package lists... Done Building dependency tree Reading state information... Done Checking for installed snaps Calculating snap size requirements Updating repository information Get:1 http://security.ubuntu.com/ubuntu jammy-security InRelease [90.7 kB] Get:2 http://il.archive.ubuntu.com/ubuntu jammy InRelease [270 kB] Get:3 http://security.ubuntu.com/ubuntu jammy-security/main amd64 c-n-f Metadata [108 B] Get:4 http://security.ubuntu.com/ubuntu jammy-security/restricted amd64 c-n-f Metadata [116 B] Get:5 http://security.ubuntu.com/ubuntu jammy-security/universe amd64 c-n-f Metadata [112 B] Get:6 http://security.ubuntu.com/ubuntu jammy-security/multiverse amd64 c-n-f Metadata [116 B] Get:7 http://il.archive.ubuntu.com/ubuntu jammy-updates InRelease [90.7 kB] Get:8 http://il.archive.ubuntu.com/ubuntu jammy-backports InRelease [90.7 kB] Get:9 http://il.archive.ubuntu.com/ubuntu jammy/main i386 Packages [1,039 kB] Get:10 http://il.archive.ubuntu.com/ubuntu jammy/main amd64 Packages [1,397 kB] Get:11 http://il.archive.ubuntu.com/ubuntu jammy/main Translation-en [511 kB] Get:12 http://il.archive.ubuntu.com/ubuntu jammy/main amd64 DEP-11 Metadata [470 kB] Get:13 http://il.archive.ubuntu.com/ubuntu jammy/main DEP-11 48x48 Icons [108 kB] Get:14 http://il.archive.ubuntu.com/ubuntu jammy/main DEP-11 64x64 Icons [159 kB] Get:15 http://il.archive.ubuntu.com/ubuntu jammy/main DEP-11 64x64@2 Icons [15.8 kB] Get:16 http://il.archive.ubuntu.com/ubuntu jammy/main amd64 c-n-f Metadata [29.9 kB] Get:17 http://il.archive.ubuntu.com/ubuntu jammy/restricted amd64 Packages [90.3 kB] Get:18 http://il.archive.ubuntu.com/ubuntu jammy/restricted i386 Packages [25.2 kB] Get:19 http://il.archive.ubuntu.com/ubuntu jammy/restricted Translation-en [13.0 kB] Get:20 http://il.archive.ubuntu.com/ubuntu jammy/restricted amd64 c-n-f Metadata [452 B] Get:21 http://il.archive.ubuntu.com/ubuntu jammy/universe amd64 Packages [13.2 MB] Get:22 http://il.archive.ubuntu.com/ubuntu
[Bug 1923253] Re: Unable to on or off the orca screenreader on arctica-greeter lightdm greeter using ++
Same behavior still exists on Ubuntu Mate 21.10. Just installed it on my home PC this mornin. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1923253 Title: Unable to on or off the orca screenreader on arctica-greeter lightdm greeter using ++ To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-mate/+bug/1923253/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1948954] [NEW] snap packaged version of Firefox is inaccessible with Orca screen reader.
Public bug reported: I recently updated to Ubuntu mate 21.10, from 21.04. I am unable to browse the web, using the snap version of firefox, provided by default in this release. With Orca running, launch firefox, and it will report inaccessible. I have another 21.10 machine where I have removed the snap version, and it works as expected using the .deb package. ** Affects: firefox (Ubuntu) Importance: Undecided Status: New ** Tags: firefox orca ** Tags added: firefox orca -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948954 Title: snap packaged version of Firefox is inaccessible with Orca screen reader. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1948954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875172] Re: geoclue polls wpasupplicant SSID list too often, resulting in lag and packet loss
This was a problem for me as well with a RTL8821CE card on my laptop. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875172 Title: geoclue polls wpasupplicant SSID list too often, resulting in lag and packet loss To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/geoclue-2.0/+bug/1875172/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1944020] Re: cannot use gparted with orca screen reader in Ubuntu Mate 20.10 and 21.04 live images
I chose gparted because that is the program I’m trying to run. Really against that and orca. ** Package changed: ubuntu => gparted (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1944020 Title: cannot use gparted with orca screen reader in Ubuntu Mate 20.10 and 21.04 live images To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gparted/+bug/1944020/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1944020] [NEW] cannot use gparted with orca screen reader in Ubuntu Mate 20.10 and 21.04 live images
Public bug reported: I am using a flash drive with Ubuntu mate 21.04 live image loaded on it, in Uefi mode. Reproduce the bug by: 1. Start Ubuntu mate live 2. When you hear tones, press super+alt+s, orca will say screen reader on. 3. Tab to try ubuntu 4. Once on desktop, press ctrl+alt+t to bring up terminal 5. type sudo -i 6. type gparted. 7. You will here no speech as you tab around the interface. ** Affects: ubuntu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1944020 Title: cannot use gparted with orca screen reader in Ubuntu Mate 20.10 and 21.04 live images To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1944020/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1231091] Re: Screenreader starts, but does not work with installer (ubiquity) in live session
Not sure if this will help or not, but I too am having the same installer bug. Along with this, I cannot drop to a terminal and run something like gparted. I have no speech, and alt+tabbing results in Orca saying gparted as super-user. Ubuntu live images are a huge trouble-shooting tool in my day to day work, so I really hope this gets resolved soon. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1231091 Title: Screenreader starts, but does not work with installer (ubiquity) in live session To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1231091/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874283] Re: orca screen reader does not read Ubuntu mate installer
*** This bug is a duplicate of bug 1231091 *** https://bugs.launchpad.net/bugs/1231091 I'm not sure if this helps or not, but along with not being able to read the installer in Ubuntu Mate 20.10 and 21.04, I also cannot read such programs as gparted if I drop and launch them from a terminal. I am booted with a live USB image in uefi mode. I can reproduce the gparted issue by dropping to mate terminal, issuing sudo -i, then gparted. No speech, and alt+tabbing yields gparted as super-user. This is a huge problem for me, because Ubuntu live images have always been a troubleshooting tool when I work on people's computers. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874283 Title: orca screen reader does not read Ubuntu mate installer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-mate/+bug/1874283/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1767817] Re: Full text search does not work
I am on bionic and as the fix is out, this should work. It does not, so please reopen. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1767817 Title: Full text search does not work To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1767817/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1767817] Re: Full text search does not work
I also have this issue in 20.04. Please flag the regression. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1767817 Title: Full text search does not work To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1767817/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1882942] Re: mv: cannot stat '/var/lib/docker.migrating/*': No such file or directory
Copying over my workaround from https://github.com/ubuntu/zsys/issues/170#issuecomment-826359558 : Just to chime in, I've been having the same issue myself. Following @ddnexus's [analysis of the issue](https://github.com/ubuntu/zsys/issues/170#issuecomment-715901655_), the workaround is rather simple: ``` sudo mkdir /var/lib/docker.migrating echo 'dummy' | sudo tee /var/lib/docker.migrating/workaround.txt ``` this will allow the `stat '/var/lib/docker.migrating/*'` to not fail with an error. After the successful `apt update docker.io` run, you can remove the workaround dummy file: ``` sudo rm /var/lib/docker/workaround.txt ``` Hope others find this useful. ** Bug watch added: github.com/ubuntu/zsys/issues #170 https://github.com/ubuntu/zsys/issues/170 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1882942 Title: mv: cannot stat '/var/lib/docker.migrating/*': No such file or directory To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1882942/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376903] Re: Caps lock delay
I just saw this issue posted on Reddit. I simply had to answer the OP's question - this is Linux, if it doesn't bother the maintainers then they don't bother fixing it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376903 Title: Caps lock delay To manage notifications about this bug go to: https://bugs.launchpad.net/xorg-server/+bug/1376903/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1483975] Re: update-initramfs complains about missing /sbin/fsck.btrfs
I'm still seeing this message in Ubuntu Mate 20.04 on December 22,2020: "W: /sbin/fsck.btrfs doesn't exist, can't install to initramfs" Has the released fix just not been incorporated into the distros after 18 months? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1483975 Title: update-initramfs complains about missing /sbin/fsck.btrfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/btrfs-tools/+bug/1483975/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1901725] Re: check-new-release-gtk tells i386 users Ubuntu 20.04.1 is available
Just wanted to add that this affected me also. I've been aware for many months that support for 32-bit Ubuntu has been dropped. So, I was surprised when I started up this system I use only for backups to see the following message on the console: New release '20.04.1 LTS' available. Run 'do-release-upgrade' to upgrade to it. = Running do-release-upgrade produces: = Sorry, no more upgrades for this system There will not be any further Ubundo-release-upgradetu releases for this system's 'i386' architecture. Updates for Ubuntu 18.04 will continue until April 2023. = Seems odd to get a message telling me to perform an upgrade, then when doing that, to be told no upgrade is available. Why not just display the second message initially and save me the trip through do-release- upgrade? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1901725 Title: check-new-release-gtk tells i386 users Ubuntu 20.04.1 is available To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1901725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1905958] [NEW] echec de l'installation ubuntu 20.04
*** This bug is a duplicate of bug 1899437 *** https://bugs.launchpad.net/bugs/1899437 Public bug reported: plantage de la mise à niveau Ubuntu 20.04 ProblemType: Package DistroRelease: Ubuntu 20.04 Package: libglib2.0-cil 2.12.40-3 ProcVersionSignature: Ubuntu 5.4.0-54.60-generic 5.4.65 Uname: Linux 5.4.0-54-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.13 Architecture: amd64 CasperMD5CheckResult: skip Date: Fri Nov 27 12:32:23 2020 ErrorMessage: installed libglib2.0-cil package post-installation script subprocess returned error exit status 1 InstallationDate: Installed on 2018-07-26 (855 days ago) InstallationMedia: Ubuntu 18.04 LTS "Bionic Beaver" - Release amd64 (20180426) Python3Details: /usr/bin/python3.8, Python 3.8.5, python3-minimal, 3.8.2-0ubuntu2 PythonDetails: /usr/bin/python2.7, Python 2.7.18, python-is-python2, 2.7.17-4 RelatedPackageVersions: dpkg 1.19.7ubuntu3 apt 2.0.2ubuntu0.1 SourcePackage: gtk-sharp2 Title: package libglib2.0-cil 2.12.40-3 failed to install/upgrade: installed libglib2.0-cil package post-installation script subprocess returned error exit status 1 UpgradeStatus: Upgraded to focal on 2020-11-27 (0 days ago) ** Affects: gtk-sharp2 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1905958 Title: echec de l'installation ubuntu 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gtk-sharp2/+bug/1905958/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1899210] [NEW] impossibilité de mide à niveau d'UBUNTU 18-04
Public bug reported: Dans la mise à jour des PPA ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: ubuntu-release-upgrader-core 1:18.04.38 ProcVersionSignature: Ubuntu 4.15.0-118.119-generic 4.15.18 Uname: Linux 4.15.0-118-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.17 Architecture: amd64 CrashDB: ubuntu Date: Fri Oct 9 21:04:38 2020 PackageArchitecture: all ProcEnviron: TERM=xterm-256color PATH=(custom, no user) LANG=fr_FR.UTF-8 SHELL=/bin/bash SourcePackage: ubuntu-release-upgrader UpgradeStatus: Upgraded to bionic on 2020-10-09 (0 days ago) VarLogDistupgradeTermlog: ** Affects: ubuntu-release-upgrader (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic dist-upgrade -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1899210 Title: impossibilité de mide à niveau d'UBUNTU 18-04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1899210/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1898194] [NEW] Impossible d'évaluer la mise à niveau Un problème insoluble est survenu lors du calcul de la mise à niveau.
Public bug reported: Impossible d'évaluer la mise à niveau Un problème insoluble est survenu lors du calcul de la mise à niveau. Cela a probablement été causé par : * des paquets logiciels non officiels qui ne proviennent pas d’Ubuntu. Veuillez utiliser la commande « ppa-purge » du paquet « ppa-purge » afin de supprimer les paquets d’un dépôt PPA Launchpad, puis essayez de relancer la mise à niveau. Si rien de tout cela ne s'applique, signalez ce bogue à l'aide de la commande « ubuntu-bug ubuntu-release-upgrader-core » dans un terminal. Si vous souhaitez analyser le problème par vous-même, les fichiers journaux contenus dans le répertoire « /var/log/dist-upgrade » contiennent les informations sur la mise à niveau. Plus précisément, veuillez consulter les journaux « main.log » et « apt.log ». ProblemType: Bug DistroRelease: Ubuntu 18.04 Package: ubuntu-release-upgrader-core 1:18.04.38 ProcVersionSignature: Ubuntu 4.15.0-118.119-generic 4.15.18 Uname: Linux 4.15.0-118-generic x86_64 ApportVersion: 2.20.9-0ubuntu7.17 Architecture: amd64 CrashDB: ubuntu CurrentDesktop: ubuntu:GNOME Date: Fri Oct 2 14:24:34 2020 PackageArchitecture: all ProcEnviron: TERM=xterm-256color PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=fr_FR.UTF-8 SHELL=/bin/bash SourcePackage: ubuntu-release-upgrader UpgradeStatus: Upgraded to bionic on 2020-10-02 (0 days ago) VarLogDistupgradeTermlog: ** Affects: ubuntu-release-upgrader (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug bionic dist-upgrade third-party-packages -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1898194 Title: Impossible d'évaluer la mise à niveau Un problème insoluble est survenu lors du calcul de la mise à niveau. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1898194/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1888572] Re: motd-news: use wget instead of curl
Can you stop launching wget or curl as root? -- Please! Launching a web crawler/browser such as wget or curl as super user root is a bad design specially if it runs in background without user consent and knowledge every 12h on all Ubuntu Desktop and Server based devices worldwide. It does not following IT Best Practices and is part of a unremovable package aka base-files https://github.com/curl/curl/issues/5557 REFERENCES https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424 ** Bug watch added: github.com/curl/curl/issues #5557 https://github.com/curl/curl/issues/5557 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1888572 Title: motd-news: use wget instead of curl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1888572/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Ubuntu decided to remove uptime from motd-news' data leak (exfiltration) via User-Agent: and move /etc/default/motd-news conffile to the motd- news-config package and switch from curl to wget. Remove uptime from the motd-news user agent https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1886572 motd-news: use wget instead of curl https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1888572 -- I hope they will stop launched it as root as well see https://github.com/curl/curl/issues/5557 Split motd-news config into a new package https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1888575 To Be Continued ---> -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1875150] Re: Mouse and keyboard intermittently stop working until Logitech Unifying Receiver is replugged
Facing this issue as well with 5.7.7 on 20.04. Tried to use logiops and libratbag to configure the mouse better (MX Master 3). Right now I have two unified receiver dongles connects because I have not taken the time to pair all devices to a single receiver. Would love pointers on how to fix this. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1875150 Title: Mouse and keyboard intermittently stop working until Logitech Unifying Receiver is replugged To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1875150/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
On my point of view, it's NOT enough to implement a legal notice https://ubuntu.com/legal/motd with technical errors and it is not possible to verify that Canonical does not store the IP address of Ubuntu users in Apache log (the default) and/or database without an external auditor (PwC, EY, KPMG, etc.). Nothing has been done regarding the consent of the user. I except one of the following two options to be implemented by Canonical. (A) Ask for consent during the installation of the operating system Ubuntu and before sharing my personal information via the motd-news software used for Telemetry, Tracking, Advertising purpose instead of providing meaningful "security messages or other news" on a daily basis. (B) Or disable it by default via ENABLED=0 in the file /etc/default/motd- news and move motd-news software outside "base-files" package and make it user removable. If Canonical doesn't takes data protection seriously by implementing technical measures such as stop calling motd-news during installation and after automatically without consent and implement an easy way to opt out for people without technical knowledge in linux shell then ICO will need to evaluate the choice of Canonical of enforcing Telemetry hidden in motd-news's User-Agent without asking user consent and not respecting "No, don't send system info" choice of the user during the installation wizard, sending beacons with IP address, system info twice a day, every day from all Ubuntu Desktop and Ubuntu Server installations worldwide. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
I added https://ubuntu.com/legal/motd to Archive.org's Internet Wayback Machine https://web.archive.org/web/20200713070037/https://ubuntu.com/legal/motd ** Attachment added: "canonical-legal-motd.pdf" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5392271/+files/canonical-legal-motd.pdf -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
https://ico.org.uk/make-a-complaint/your-personal-information-concerns/ To: ICO Dear Information Commissioner’s Office, I confirm that I want to proceed with the creation of the case about Canonical's motd-news as Canonical don't want to remediate the privacy issue of sending by default hardware details and public IP of all Ubuntu Desktop and Ubuntu Server twice a day, every day of the year. Next to this message, you will find the final answer from Canonical. https://ubuntu.com/legal/motd The following are my comments on their legal information. "The purpose of sending the system information is so that Canonical can tailor the message returned by https://motd.canonical.com.; This is wrong motd.canonical.com does not exist and is part of motd-news. The server used by Ubuntu is https://motd.ubuntu.com lynx -mime_header https://motd.canonical.com Looking up motd.canonical.com Unable to locate remote host motd.canonical.com. Alert!: Unable to connect to remote host. The evidence is part of the Ticket https://launchpadlibrarian.net/487032881/ubuntu-desktop-2004-motd-news.png "None of this data can be used to identify a machine or user." "Along with this data, the IP address and other network information is transmitted to facilitate communication on the internet from the Ubuntu machine to Canonical. This information is not stored by Canonical." This is wrong as Canonical is using Apache and the default is to store IP address in the access log https://httpd.apache.org/docs/current/logs.html Common Log Format (%h) This is the IP address of the client (remote host) which made the request to the server. If HostnameLookups is set to On, then the server will try to determine the hostname and log it in place of the IP address. However, this configuration is not recommended since it can significantly slow the server. Instead, it is best to use a log post-processor such as logresolve to determine the hostnames. The IP address reported here is not necessarily the address of the machine at which the user is sitting. If a proxy server exists between the user and the server, this address will be the address of the proxy, rather than the originating machine. lynx -mime_header https://motd.ubuntu.com HTTP/1.1 200 OK Date: Mon, 13 Jul 2020 06:05:38 GMT Server: Apache/2.4.18 (Ubuntu) Last-Modified: Mon, 13 Jul 2020 06:00:50 GMT Accept-Ranges: bytes Content-Length: 215 Vary: Accept-Encoding Connection: close Content-Type: text/plain * "If you've been waiting for the perfect Kubernetes dev solution for macOS, the wait is over. Learn how to install Microk8s on macOS." https://www.techrepublic.com/article/how-to-install-microk8s-on- macos/ "You can disable this service as follows:" "/etc/default/motd-news has an ENABLED=1 setting that if set to 0 will turn off this functionality." I assume 80% of Ubuntu Desktop users will not know how to disable motd-news because they need a Terminal and sudo access. A regular editor running a default user will not allow to edit this file as super user. So this doc is useless. On top of that Canonical send motd-news information before the user can even opt out during the installation of Ubuntu Desktop and during the first boot of the Ubuntu Desktop operating system so setting it is only useful to stop it but the harm is already done and data already sent to Canonical. Evidence https://launchpadlibrarian.net/487031151/ubuntu- desktop-2004.png For more information read https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424 Please also note that https://ubuntu.com/legal/motd title is not searchable in their search engine and is not part of the legal notice during the installation of Ubuntu Evidence (picture in attachment) and https://launchpadlibrarian.net/487031391/ubuntu-desktop-2004-legal.png "No, don't send system info" is not respected https://launchpadlibrarian.net/487031210/ubuntu-desktop-2004-optout.png https://launchpadlibrarian.net/487032881/ubuntu-desktop-2004-motd-news.png Privacy does not have an option to opt out from motd-news https://launchpadlibrarian.net/487031529/ubuntu-desktop-2004-privacy.png Forwarded Message Subject: Re: Unremovable motd-news used as Telemetry and Advertising tool without explicit consent Date: Fri, 10 Jul 2020 12:00:29 +0100 Dear Guy Thank you for your patience. Please now see the legal notice for MOTD on Canonical's website: https://ubuntu.com/legal/motd I can assure you that no access to or storage of IP address data is made. Canonical takes data protection compliance very seriously and we continue to review how we can improve this and other services. Many thanks Director of Legal & Company Secretary Canonical Blue Fin Building, 5th Floor 110 Southwark Street, SE1 0SU Ubuntu - Linux for Human Beings www.canonical.com -- You received this bug notification because you are a member of Ubuntu Bugs, which is
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
https://news.softpedia.com/news/canonical-under-fire-for-putting-ads-in-the-ubuntu-motd-530372.shtml Article like "Canonical Under Fire for Putting Ads in the Ubuntu MOTD" miss the point that motd-news is not only displaying Advertising in the login prompt but it a Privacy Nightmare because it has an hidden Telemetry feature which is enabled by default Without Consent and leak IP Address, System critical informations (Kernel Version, Uptime, CPU Vendor, CPU Model, Idle Time, Uptime) every 12 hours via User-Agent from curl on all Ubuntu Desktop and Ubuntu Server including the current version of Ubuntu. On top of that, motd-news is also a security nightmare as it runs curl as root which can be exploited to gain root on any servers, laptops etc. I recommend that all Ubuntu users open a Terminal and execute the following sudo sed -i -r 's/(ENABLED)=.+/\1=0/' /etc/default/motd-news sudo apt-get -qq -y purge curl N.B. curl is not installed if you explicitly select Ubuntu Minimal during the installation of Ubuntu Desktop so motd-news cannot contact motd.ubuntu.com without curl even if ENABLED=1 by default GDPR : EU's General Data Protection Regulation since daily reporting of computer's infos are proceeded without the user's consent. Cf. GDPR application comments [https://gdpr.eu/eu-gdpr-personal-data/], in particular with respect to Recital 30 [https://gdpr.eu/recital-30 -online-identifiers-for-profiling-and-identification/] Internet protocol (IP) addresses; information that is related to an individual’s tools, applications, or devices, like their computer. Canonical Ltd. has handled my personal information without concent. By collecting twice a day the following informations: - The public IP address where Ubuntu system is used (part of the log of the HTTPS server) - Date / Time when collected (part of the log of the HTTPS server) - Harware info such as CPU Vendor and Model (via /proc/cpuinfo) - The distribution version (via /etc/lsb-release) - The operating system (via uname -o) - The Linux kernel release (via uname -r) - The computer architecture aka machine hardware name (via uname -m) - Cloud Hosting: cloud identifier such as aws, gce, azure, lxd (via cloud-id part of cloud-init) - Total number of seconds the system has been up (via /proc/uptime) - The sum of how much time each core has spent idle in seconds (via /proc/uptime) - Version of curl software (launched as root which is a bad IT practice and a security risk) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd-news force to run via motd-news.service and motd-news.timer" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389472/+files/ubuntu-desktop-2004-terminal3.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd.ubuntu.com hosted in the Amazon EC2 cloud in Dublin, Leinster, Ireland" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389474/+files/ubuntu-desktop-2004-terminal4.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd-news is unremovable" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389480/+files/ubuntu-desktop-2004-system-failure1.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd.ubuntu.com is up since 2017" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389476/+files/ubuntu-desktop-2004-waybackmachine.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Sample motd.ubuntu.com Ads from 2020" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389477/+files/ubuntu-desktop-2004-waybackmachine2.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Sample motd.ubuntu.com Ads from 2017" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389478/+files/ubuntu-desktop-2004-waybackmachine3.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Sample motd.ubuntu.com Ads from 2019" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389479/+files/ubuntu-desktop-2004-waybackmachine4.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
No updates from Canonical's legal departement "A picture is worth a thousand words" ** Attachment added: "motd-news.service started during installation Ubuntu Desktop 20.04 Without Consent" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389467/+files/ubuntu-desktop-2004.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd.ubuntu.com current Advertising for Canonical Products" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389475/+files/ubuntu-desktop-2004-translate.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd-news ENABLED by default with telemetry every 12h Without Consent" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389471/+files/ubuntu-desktop-2004-terminal2.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Privacy has not opt-out for motd-news hidden telemetry in User-Agent" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389470/+files/ubuntu-desktop-2004-privacy.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Trying to remove motd-news via base-files will kill Ubuntu" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389481/+files/ubuntu-desktop-2004-system-failure2.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "No, don't send system info NOT RESPECTED BY MOTD-NEWS" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389468/+files/ubuntu-desktop-2004-optout.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "motd-news exfiltrate system information via User-Agent and IP Address every 12 hours Without Consent" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389482/+files/ubuntu-desktop-2004-motd-news.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Attachment added: "Legal Notice DOES NOT COVER "motd-news" sending IP address, Uptime, Idle time every 12h motd-news.service started during installation Ubuntu Desktop 20.04 Without Consent" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5389469/+files/ubuntu-desktop-2004-legal.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1701068] Re: motd.ubuntu.com currently shows media item (HBO's Silicon Valley using Ubuntu)
motd-news is part base-files so it cannot be removed from Ubuntu Desktop, Server or Core. if you need to report a bug use https://bugs.launchpad.net/ubuntu/+source/base-files/+filebug On my point of view, motd-news is a Telemetry tool hidden in a Message of the Day (MOTD) serving Ads for Canonical products (kubernetes, snap, lxd, etc.). On top of that it represents a risk of security and privacy because curl is launched as root and your IP and private information such as CPU model, CPU usage (idle time), uptime, Kernel version are transmitted without consent (and regardless of any kind of approval) to Canonical. https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1701068 Title: motd.ubuntu.com currently shows media item (HBO's Silicon Valley using Ubuntu) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1701068/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1884865] Re: Broadcom Inc. and subsidiaries BCM43142 802.11b/g/n (rev 01) Not seeing any wifi support
This might only be a BIOS related issue with my machine. I was able to solve the problem by disabling 'safe boot' and the wifi menu appeared in the settings of Ubuntu! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1884865 Title: Broadcom Inc. and subsidiaries BCM43142 802.11b/g/n (rev 01) Not seeing any wifi support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1884865/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1884865] [NEW] Broadcom Inc. and subsidiaries BCM43142 802.11b/g/n (rev 01) Not seeing any wifi support
Public bug reported: Cant connect via wireless but wifi card shows up under "lspci". Bluetooth function works on the same card but I see no wifi options in the settings menu; can only connect using Ethernet. ** Affects: ubuntu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1884865 Title: Broadcom Inc. and subsidiaries BCM43142 802.11b/g/n (rev 01) Not seeing any wifi support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1884865/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
FYI Canonical's legal departement is reviewing motd-news "feature" (such as telemetry) and will provide updated information next week. All motd-news related tickets https://bugs.launchpad.net/ubuntu/+source/base- files/+bugs?field.searchtext=motd- news=-datecreated=Search%3Alist=NEW%3Alist=OPINION%3Alist=INVALID%3Alist=WONTFIX%3Alist=EXPIRED%3Alist=CONFIRMED%3Alist=TRIAGED%3Alist=INPROGRESS%3Alist=FIXCOMMITTED%3Alist=FIXRELEASED%3Alist=INCOMPLETE_WITH_RESPONSE%3Alist=INCOMPLETE_WITHOUT_RESPONSE "Canonical has launched the Ubuntu Appliance initiative which aims to transform Raspberry Pi devices or personal computers into secure, self- updating solutions" (source 9to5linux). I checked nextcloud- core18-pi.img (and core18_1753.snap), motd-news is still present but turned off by default -- Good! ENABLED=0 in the file /etc/default/motd- news. I hope Canonical will apply "Secure by design" motto to the rest of Ubuntu products https://ubuntu.com/appliance -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
I will first contact the Data Protection Officer (DPO) of Canonical Group Limited dataprotect...@canonical.com https://ubuntu.com/legal/data-privacy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
I have decided to contact ICO (Information Commissioner's Office). Because Canonical Ltd. has handled my personal information (IP address, Hardware CPU, Choice of Cloud Hosting, and various meta-data) and the one of the company I work for without concent. The same apply to all users of Ubuntu (persons, companies, governements) worldwide on a daily basis. By collecting twice a day the following informations: - The public IP address where Ubuntu system is used (part of the log of the HTTPS server) - Date / Time when collected (part of the log of the HTTPS server) - Harware info such as CPU Vendor and Model (via /proc/cpuinfo) - The distribution version (via /etc/lsb-release) - The operating system (via uname -o) - The Linux kernel release (via uname -r) - The computer architecture aka machine hardware name (via uname -m) - Cloud Hosting: cloud identifier such as aws, gce, azure, lxd (via cloud-id part of cloud-init) - Total number of seconds the system has been up (via /proc/uptime) - The sum of how much time each core has spent idle in seconds (via /proc/uptime) - Version of curl software (launched as root which is a bad IT practice and a security risk) On top of that by making motd-news unremovable in the core of Ubuntu's base-files (like it was the case for Internet Explorer in Windows or the Telemery in Windows 10), they enforce the telemetry before you can disable it or opt-out from it. Fell free to fill your own complaint or contact your local information commissioner as this ticket is marked as Won't Fix by the manager of the Ubuntu Server team. https://ico.org.uk/make-a-complaint/your-personal-information-concerns /personal-information-complaint/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Best practices by Dustin Kirkland https://manpages.ubuntu.com/manpages/focal/en/man5/update-motd.5.html - No mention of curl running as root - No mention of the exfiltration of private data done via User-Agent - No mention of the novel concept of advertising via motd - No mention of using motd-news as telemetry - No mention that motd-news is part of core Ubuntu "base-files" and cannot be removed Feel free to guide me to the correct info on your website or update your documentation. Additional discussions on Twitter https://twitter.com/lusis/status/880446088083329024 https://twitter.com/astarrb/status/880170781841514496 https://twitter.com/lelff/status/1210619413885575168 https://twitter.com/hessu/status/1269994718018056199 https://twitter.com/nikitonsky/status/1073714951104184320 https://twitter.com/wamdamdam/status/1044197012353298433 https://twitter.com/marcodavids/status/1245054456955314178 ... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
And don't tell me that the fact that Canonical use motd as Telemetry was done transparently, with clear documentation... most users complain only about the advertising but don't realize that the motd-news is used as telemetry tool but seems to act as a advertising / news purpose and the risk of the bad design decision of running curl as root. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
By the current design, you don't give choice to the Ubuntu users as they cannot opt-out BEFORE the laptop or server contacts motd.ubuntu.com sending the telemetry. By implementing it as essential package, you don't let user remove it but only disable it when it is too late. The same apply to landscape, you don't give choice to disable some dangerous features like executing very powerful script, list all processes, etc. This is why, we decided to stop using landscape (both in the cloud and on premises). It will be your responsibility as Ubuntu Server manager, if motd.ubuntu.com gets compromised and motd-news is exploited because it runs curl as root and all Ubuntu servers could get compromised at the same time within 12 hours. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Maybe as manager of the Ubuntu Server team, you should ask to improve motd-news software to not curl as root. You should also improve landscape and landscape on premises level of access so any users cannot list all processes and reboot any servers or execute shell script as root. Good luck, I think we are done with Ubuntu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
https://github.com/curl/curl/issues/5557 ** Bug watch added: github.com/curl/curl/issues #5557 https://github.com/curl/curl/issues/5557 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Privacy: Ubuntu users don't have the opportunity to opt-out from motd-news before all the private infos and telemetry are sent via User-Agent. So even if people change ENABLED=1 to ENABLED=0 in /etc/default/motd-news they only stop future leaks but the initial leak has already been done in background after the boot via systemd/motd-news service. I repeat, this doesn't look GRPD-compliant at all. There is no prior consent ever asked for. The GDPR was adopted on 14 April 2016, and became enforceable beginning 25 May 2018. motd-news has been designed in 2017 and is enabled by default on all Ubuntu Server, Ubuntu Desktop, Ubuntu Flavors (such as Mate, Raspberry), Ubuntu derived such as Nvidia Jetson Nano without prior consent. Security: Run curl as root every 12h are you serious? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
All messages received over a year (Ubuntu 18.04): * Congrats to the Kubernetes community on 1.16 beta 1! Now available * Kata Containers are now fully integrated in Charmed Kubernetes 1.16! * Keen to learn Istio? It's included in the single-package MicroK8s. * Kubernetes 1.18 GA is now available! See https://microk8s.io for docs or * Latest Kubernetes 1.18 beta is now available for your laptop, NUC, cloud * MicroK8s 1.15 is out! It has already been installed on more * MicroK8s 1.15 is out! Thanks to all 40 contributors, you get the latest * MicroK8s passes 9 million downloads. Thank you to all our contributors! * Multipass 1.0 is out! Get Ubuntu VMs on demand on your Linux, Windows or * Multipass 1.1 adds proxy support for developers behind enterprise * Overheard at KubeCon: "microk8s.status just blew my mind". * 'snap info' now shows the freshness of each channel. * Ubuntu 20.04 LTS is out, raising the bar on performance, security, * Ubuntu's Kubernetes 1.14 distributions can bypass Docker and use containerd None of them are about security and none of them are customized using uptime, ubuntu version, kernel version, curl version, ip, ... Why do pack all this into User-Agent which can be linked to public IP every 12 hours? ** Attachment added: "motd-news.txt" https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+attachment/5381565/+files/motd-news.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1637800] Re: add a motd script for news
motd-news vs privacy / security / telemetry https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1637800 Title: add a motd script for news To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1637800/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
The usage of motd-news as Advertising media for Canonical products is well documented. Now we need to know if Canonical share the crafted User-Agent with sensible info in it with third party and use it for telemetry like Microsoft Windows 10. Samples output of motd-news mirrored in both login prompt via motd and syslog - MicroK8s gets a native Windows installer and command-line integration. https://ubuntu.com/blog/microk8s-installers-windows-and-macos - How HBO's Silicon Valley built "Not Hotdog" with mobile TensorFlow, Keras & React Native on Ubuntu - Overheard at KubeCon: "microk8s.status just blew my mind". https://microk8s.io/docs/commands#microk8s.status https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1701068 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
I don't think it was safe decision to link the security of Ubuntu base OS to curl running as root every 12 hours via motd-news just to display Ads for products and not important security messages like suggested in the original ticket (1637800). Just imagine the consequence of https://motd.ubuntu.com being compromised starts to redirect to a TFTP URL and send private memory contents from root account every 12 hours or if curl has a new vulnerability such as buffer overflow discovered automatically by Google's OSS-Fuzz and not yet patched within 30 days by curl maintainers or by Ubuntu Security Team. https://curl.haxx.se/docs/CVE-2017-1000100.html A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. https://bugs.chromium.org/p/oss- fuzz/issues/list?q=curl=1=-reported ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-1000100 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
I recommend the following action points to restore a bit of trust in Ubuntu Product after the introduction of motd-news by Dustin Kirkland (Ex- VP Product at Canonical) - Run all motd scripts including motd-news AND curl as non privileged account -- not as root - Move motd-news functionality from base-files to a removable package called motd-news - Set ENABLED to 0 by default on all Ubuntu Distos or at least ask the user consent (during install and later with cloud-init) - Remove private information from User-Agent (uptime, kernel version, curl version, type of cloud) and stop using HTTPS Header such User-Agent as proxy to exfiltrate sensible infos from Ubuntu - Make the code behind https://motd.ubuntu.com auditable, signed and open source - Check the logs of https://motd.ubuntu.com if it has been compromised the last 3 years if it is the case report it so people can reinstall their Ubuntu Server, Desktop, Laptop to restore trust Currently Ubuntu users are trapped as they can only disable motd-news but not uninstall it and any software update of base-files could bring back the security issue. Anyone who has access to motd.ubuntu.com (or via DNS + MITM) could in theory execute code on any Ubuntu if a serious vulnerability in curl has been found or if the user did not update curl. Running curl as root, reporting the curl version and the kernel version give all the information needed to implemented a persistent backdoor in any Ubuntu worldwide. sudo apt-get purge base-files WARNING: The following essential packages will be removed. This should NOT be done unless you know exactly what you are doing! base-files bash 0 upgraded, 0 newly installed, 5 to remove and 26 not upgraded. After this operation, 4,525 kB disk space will be freed. You are about to do something potentially harmful. To continue type in the phrase 'Yes, do as I say!' ?] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
The original request for motd-news came from Dustin Kirkland on 2016-10-30 https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1637800 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
motd-news is present in Nvidia Jetson Nano (derived from Ubuntu) and Ubuntu for Raspberry Pi. It is enabled by default and also calling Home Ubuntu via Amazon Cloud. motd-news is also present in Ubuntu Core 18 for embedded systems (like Tesla Car) but unlike Ubuntu Server and Desktop Distro it is not enabled by default. I don't have a Tesla car to verify if it is enabled or not. unxz ubuntu-core-18-amd64.img.xz sudo mount -o loop,offset=$((106496*512)) ubuntu-core-18-amd64.img /mnt/ sudo unsquashfs -d /tmp/core18 /mnt/system-data/var/lib/snapd/seed/snaps/core18_1668.snap /tmp/core18/etc/default/motd-news /tmp/core18/etc/update-motd.d/50-motd-news /tmp/core18/lib/systemd/system/timers.target.wants/motd-news.timer /tmp/core18/var/lib/systemd/deb-systemd-helper-enabled/motd-news.timer.dsh-also /tmp/core18/var/lib/systemd/deb-systemd-helper-enabled/timers.target.wants/motd-news.timer sudo grep ENABLED /tmp/core18/etc/default/motd-news ENABLED=0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
This is more than just a Telemetry, It as a Trojan in Ubuntu Distro. A remote code-execution (RCE) vulnerability in all Ubuntu of the world! Why? Simple curl is launched as root (not the best practice!), and Ubuntu Distro fetch https://motd.ubuntu.com multiple times per day if someone (like 3-letters or 4 letters) controls this Amazon Web server knowing the version of curl (provided by the script) exploit any local known vulnerability present in curl or use a curl zero day it will have "root" access to any Ubuntu Server or Desktop, Laptop of the world! Proof of Concept Add the following before the for calling curl in /etc/update-motd.d/50 -motd-news date +'%Y-%m-%d %H:%M:%S' >> /tmp/test whoami >> /tmp/test echo $USER_AGENT >> /tmp/test wait 12 hours... or 12:00 / 00:00 or reboot cat /tmp/test 2020-06-05 12:00:00 root curl/7.68.0-1ubuntu2 Ubuntu/20.04/LTS GNU/Linux/**-generic/x86_64 Intel(R)/Core(TM)/i7-**/CPU/@/*GHz uptime/70.55/921.20 cloud_id/unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Thanks Canonical for this great Telemetry master piece hidden in a Daily "News" (Message of the Day) deep inside the core of Ubuntu. I found it active on all the Ubuntu laptop of my friends and coworkers, all Ubuntu servers from local ISP and my work. As well as on all Ubuntu flavours and Ubuntu derived Linux distros. It is also present in cloud-init images of major cloud providers, and all Docker images from Docker Registry based on Ubuntu. What a (s)hell for transparency! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Please give the Message of the Day (MOTD) every time I get online on the Internet or I reboot my Ubuntu computer ... Hold on, connecting to Amazon Cloud (Amazon Data Services) motd.ubuntu.com ... Your message of the day is Building Trust is Hard, Breaking Trust is Easy In exchange, please give me your User-Agent will all your private informations so I know who you are (IP, Ubuntu Cloud ID, Linux Kernel Version, Curl version, etc.) GET /bionic/x86_64 HTTP/1.1 Host: motd.ubuntu.com User-Agent: curl/7.58.0-2ubuntu3.8 Ubuntu/18.04.3/LTSGNU/Linux/4.15.0-72-generic /x86_64 Intel(R)/Core(TM)/i5-8500B/CPU/@/3.00GHz uptime/108266.13/21 2047.71 cloud_id/unknown Accept: */* https://ma.ttias.be/what-exactly-being-sent-ubuntu-motd/ [Unit] Description=Message of the Day After=network-online.target Documentation=man:update-motd(8) [Service] Type=oneshot ExecStart=/etc/update-motd.d/50-motd-news --force -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Part of the base OS ... resistance is futile dpkg -L base-files | grep motd-news /etc/default/motd-news /etc/update-motd.d/50-motd-news /lib/systemd/system/motd-news.service /lib/systemd/system/motd-news.timer sudo grep news /var/log/syslog Jun 4 04:44:22 mbx 50-motd-news[94986]: * MicroK8s gets a native Windows installer and command-line integration. Jun 4 04:44:22 mbx 50-motd-news[94986]: https://ubuntu.com/blog/microk8s-installers-windows-and-macos Jun 4 04:44:22 mbx systemd[1]: motd-news.service: Succeeded. Jun 4 08:57:00 mbx systemd[1]: motd-news.timer: Succeeded. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Well known... https://twitter.com/search?q=ubuntu%20motd-news=typed_query=live -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Thanks security-conscious Dustin Kirkland for this great bash script ("I've insisted on shell here for transparency! - Dustin ") and other contributions like NSA's SELinux or security sensible software like Pollinate (Entropy-as-a-Service in the cloud) via https://entropy.ubuntu.com Packing so many sensible info inside User-Agent sent daily by default from all Ubuntu to https://motd.ubuntu.com is brillant! less /etc/update-motd.d/50-motd-news ``` #50-motd-news - print the live news from the Ubuntu wire #Copyright (C) 2016-2017 Canonical Ltd. #Copyright (C) 2016-2017 Dustin Kirkland ## # This program could be rewritten in C or Golang for faster performance. # Or it could be rewritten in Python or another higher level language # for more modularity. # However, I've insisted on shell here for transparency! # - Dustin ## # Curl browser version, for debug purposes curl_ver="$(dpkg -l curl | awk '$1 == "ii" { print($3); exit(0); }')" # Distribution version, for messages releated to this Ubuntu release . /etc/lsb-release lsb=$(echo "$DISTRIB_DESCRIPTION" | sed -e "s/ /\//g") codename="$DISTRIB_CODENAME" # Kernel version and CPU type, for messages related to a particular revision or hardware platform="$(uname -o)/$(uname -r)/$(uname -m)" arch="$(uname -m)" cpu="$(grep -m1 "^model name" /proc/cpuinfo | sed -e "s/.*: //" -e "s:\s\+:/:g")" cloud_id="unknown" if [ -x /usr/bin/cloud-id ]; then /usr/bin/cloud-id > "$CLOUD" 2>/dev/null if [ $? -eq 0 ]; then # sanitize it a bit, just in case cloud_id=$(cut -c -40 "${CLOUD}" | tr -c -d '[:alnum:]') if [ -z "${cloud_id}" ]; then cloud_id="unknown" fi fi fi # Some messages may only be pertinent before or after some amount of uptime read up idle < /proc/uptime uptime="uptime/$up/$idle" # Piece together the user agent USER_AGENT="curl/$curl_ver $lsb $platform $cpu $uptime cloud_id/$cloud_id" ... # Fetch and print the news motd if curl --connect-timeout "$WAIT" --max-time "$WAIT" -A "$USER_AGENT" -o- "$u" >"$NEWS" 2>"$ERR"; then ``` -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
Anyone privacy-conscious using any version of Ubuntu should do this in a shell ASAP sudo sed -i -r 's/(ENABLED)=.+/\1=0/' /etc/default/motd-news -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
This ticket should be updated to Security issue +250 points I highly doubt that this Motd News "feature" is compliant with EU's General Data Protection Regulation since daily reporting of computer's infos are proceeded without the user's consent. Cf. GDPR application comments [https://gdpr.eu/eu-gdpr-personal-data/], in particular with respect to Recital 30 [https://gdpr.eu/recital-30-online-identifiers- for-profiling-and-identification/] Internet protocol (IP) addresses; information that is related to an individual’s tools, applications, or devices, like their computer. Daily report of computer's private infos without the users consent It affects Ubuntu Servers and Desktop (including roaming computers like laptops) since at least 18.04 LTS and also the current 20.04 LTS Sensible data sent - IP address of the computer running Ubuntu - Date of the HTTPS query - Kernel Version - CPU Vendor and Model - Uptime - Cloud identifier - Version of Curl so version of Ubuntu running ... $curl_ver $lsb $platform $cpu $uptime $cloud_id Sample from our PC Engines running Ubuntu 18.04 LTS: ``` curl/7.58.0-2ubuntu3.8 GNU/Linux/4.15.0-101-generic/x86_64 AMD/GX-412TC/SOC uptime/692518.54/2755023.47 cloud_id/unknown ``` https://motd.ubuntu.com/ ``` * MicroK8s gets a native Windows installer and command-line integration. https://ubuntu.com/blog/microk8s-installers-windows-and-macos ``` The perfect opportunity to map all Ubuntu Linux users worldwide on a daily basis? https://gdpr.eu/eu-gdpr-personal-data/ https://gdpr.eu/checklist/ See also https://askubuntu.com/questions/1105825/why-lubuntu-18-04-calls-amazon-servers-motd-ubuntu-com -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867424] Re: motd-news transmitting private hardware data without consent or knowledge in background
** Tags added: bionic cosmic disco -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867424 Title: motd-news transmitting private hardware data without consent or knowledge in background To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/base-files/+bug/1867424/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
Regarding #28 "on 20.04 LTS and v5.6 is not working properly with WiFi." When I first tested Kernel 5.6 branch, the WiFi was broken because of this: https://linuxreviews.org/Linux_5.6.2_Is_Released_With_Intel_Wifi_Fix Now it is working again with the current 5.6 branch. Kernel 5.5 is now EOL (as of 5.5.19 end of April) https://en.wikipedia.org/wiki/Linux_kernel_version_history#Releases_5.x.y Intel should do better QA for their iGPU and WiFi and try to port it to all stable LTS branches aka 5.4.x and 5.6.x If you still have issues with Intel i915 on 5.4.x, you can use the following one-liner to install 5.6.x which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for version in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/ | tac | grep -Pom1 '(?<=")v5\.6\.[0-9]+/'); do for deb in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/${version} | grep -Pom4 '(?<=")linux-(headers|image- unsigned|modules)-5\.6\.[^"]+[0-9]+(-generic_5\.6\.|_5\.6\.)[^"]+.(amd64|all)\.deb'); do curl -sLo ${deb} https://kernel.ubuntu.com/~kernel- ppa/mainline/${version}/${deb}; debs="${debs} ${deb}"; done; sudo dpkg -i ${debs}; done If you need to go back to legacy Ubuntu 20.04 LTS Kernel and remove Linux Kernel 5.5 and 5.6 dpkg --get-selections | awk '/linux-.*-5\.[5-6]/ { print $1 }' | xargs echo sudo apt-get purge -y -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
I tested the test kernel 5.4 for about a day without issue but all my computers using Intel GPU are using by default kernel 5.5. I don't want to change that. If you want to follow other users having the same kind of issues with different i915 bugs on different Linux distro follow comments on https://linuxreviews.org/Linux_Kernel_5.5_Will_Not_Fix_The_Frequent_Intel_GPU_Hangs_In_Recent_Kernels -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874983] [NEW] package chromium-browser (not installed) failed to install/upgrade: new chromium-browser package pre-installation script subprocess returned error exit status 1
Public bug reported: package chromium-browser (not installed) failed to install/upgrade: new chromium-browser package pre-installation script subprocess returned error exit status 1 ProblemType: Package DistroRelease: Ubuntu 20.04 Package: chromium-browser (not installed) ProcVersionSignature: Ubuntu 5.4.0-26.30-generic 5.4.30 Uname: Linux 5.4.0-26-generic x86_64 ApportVersion: 2.20.11-0ubuntu27 AptOrdering: chromium-browser:amd64: Install NULL: ConfigurePending Architecture: amd64 CasperMD5CheckResult: skip Date: Sat Apr 25 10:06:22 2020 ErrorMessage: new chromium-browser package pre-installation script subprocess returned error exit status 1 InstallationDate: Installed on 2018-06-04 (690 days ago) InstallationMedia: Ubuntu 16.04.2 LTS "Xenial Xerus" - Release amd64 (20170215.2) Python3Details: /usr/bin/python3.8, Python 3.8.2, python3-minimal, 3.8.2-0ubuntu2 PythonDetails: /usr/bin/python2.7, Python 2.7.18rc1, python-minimal, 2.7.17-1 RelatedPackageVersions: dpkg 1.19.7ubuntu3 apt 2.0.2 SourcePackage: chromium-browser Title: package chromium-browser (not installed) failed to install/upgrade: new chromium-browser package pre-installation script subprocess returned error exit status 1 UpgradeStatus: Upgraded to focal on 2020-04-23 (1 days ago) ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874983 Title: package chromium-browser (not installed) failed to install/upgrade: new chromium-browser package pre-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1874983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
As 5.5 is more stable on my Dell XPS 13 than 5.4 with Intel iGPU (i915) I did the following one-liner to install the latest version of Linux Kernel 5.5 on Ubuntu 20.04 which curl >/dev/null 2>&1 || sudo apt-get install -qq -y curl; for version in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/ | tac | grep -Pom1 '(?<=")v5\.5\.[0-9]+/'); do for deb in $(curl -sL https://kernel.ubuntu.com/~kernel-ppa/mainline/${version} | grep -Pom4 '(?<=")linux-(headers|image- unsigned|modules)-5\.5\.[^"]+[0-9]+(-generic_5\.5\.|_5\.5\.)[^"]+.(amd64|all)\.deb'); do curl -sLo ${deb} https://kernel.ubuntu.com/~kernel- ppa/mainline/${version}/${deb}; debs="${debs} ${deb}"; done; sudo dpkg -i ${debs}; done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.4.32/CHANGES https://patchwork.ozlabs.org/project/ubuntu- kernel/patch/20200407222740.7671-2-sultan.alsa...@canonical.com/ Note that this bug only affects 5.4 and has since been fixed in 5.5. Normally, a backport of the fix from 5.5 would be in order, but the patch set that fixes this deadlock involves massive changes that are neither feasible nor desirable for backporting [1][2][3]. Therefore, this small patch was made to address the deadlock specifically for 5.4. ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
Linux Kernel 5.5.x (>5.5.12) is working fine ** Changed in: linux (Ubuntu) Status: Confirmed => New ** Information type changed from Public to Private -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
So far no crash, freeze of any kind with Linux 5.5.13 compared to the unstability of Ubuntu 20.04 with Linux 5.4 on Dell XPS 13 with 10th Generation Intel Core i7-10510U CPU (Comet Lake) I guess the patches are part of Linux v5.5.12 and later https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.12/CHANGES Chris Wilson (1): drm/i915/execlists: Track active elements during dequeue Matt Roper (1): drm/i915: Handle all MCR ranges Caz Yokoyama (1): Revert "drm/i915/tgl: Add extra hdc flush workaround" Maybe Canonical should backport those patches to 5.4 or switch to 5.5 branch before Ubuntu 20.04 General Availability? https://lkml.org/lkml/2020/3/22/419 https://lkml.org/lkml/2020/3/19/1779 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire
** Summary changed: - Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4 + Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Intel GPU Hangs : random screen freezing w/ Ubuntu 20.04 (Linux 5.4) i915_active_acquire To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
I am testing with Linux Kernel 5.5.13-050513-generic from https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.5.13/ as older kernels (https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817#17 ** Bug watch added: Debian Bug tracker #954817 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954817 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
With the above patch, I still have the screen freeze but without Kernel oops. I will compile and my own Linux Kernel 4.15 (18.04 LTS) for Ubuntu 20.04 (soon LTS) as Intel Graphics i915 is unusable on my Dell XPS 13 connected to external screen and XFCE4 i915 :00:02.0: GPU HANG: ecode 9:1:0x, hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} i915 :00:02.0: Resetting chip for hang on rcs0 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} Asynchronous wait on fence i915:xfwm4[1901]:57922 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:57922 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 Asynchronous wait on fence i915:xfwm4[1901]:57926 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:57926 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} i915 :00:02.0: Resetting chip for hang on rcs0 [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} [drm:gen8_reset_engines [i915]] *ERROR* rcs0 reset request timed out: {request: 0001, RESET_CTL: 0001} i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 Asynchronous wait on fence i915:xfwm4[1901]:5792a timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:5792a timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... Asynchronous wait on fence i915:xfwm4[1901]:5792e timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:5792e timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for stuck wait on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 Asynchronous wait on fence i915:xfwm4[1901]:57932 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:57932 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 Asynchronous wait on fence i915:xfwm4[1901]:57936 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:57936 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 ... i915 :00:02.0: GPU recovery timed out, cancelling all in-flight rendering. i915 :00:02.0: Resetting chip for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 i915 :00:02.0: Resetting rcs0 for hang on rcs0 Asynchronous wait on fence i915:xfwm4[1901]:57938 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) Asynchronous wait on fence i915:xfwm4[1901]:57938 timed out (hint:intel_atomic_commit_ready+0x0/0x54 [i915]) i915 :00:02.0:
[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
Seems to be fixed in the latest 5.5 http://kobi.wang/v5.x/ChangeLog-5.5 drm/i915: Hold reference to intel_frontbuffer as we track activity Since obj->frontbuffer is no longer protected by the struct_mutex, as we are processing the execbuf, it may be removed. Mark the intel_frontbuffer as rcu protected, and so acquire a reference to the struct as we track activity upon it. Closes: https://gitlab.freedesktop.org/drm/intel/issues/827 Fixes: 8e7cb1799b4f ("drm/i915: Extract intel_frontbuffer active tracking") Signed-off-by: Chris Wilson Link: https://patchwork.freedesktop.org/patch/msgid/20191218104043.3539458-1-ch...@chris-wilson.co.uk (cherry picked from commit da42104f589d979bbe402703fd836cec60befae1) I am not sure that is a good idea to ship Ubuntu 20.04 LTS with Linux Kernel 5.4 branch unless you backport 5.5 patches as many people rely on bult-in Intel GPU in their workstation and the Intel graphics kernel driver is not very stable https://linuxreviews.org/Linux_Kernel_5.5_Will_Not_Fix_The_Frequent_Intel_GPU_Hangs_In_Recent_Kernels https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949369 https://bugzilla.redhat.com/show_bug.cgi?id=1805278 https://bugs.archlinux.org/task/65392 Google "i915_active_acquire"+"i915_vma_move_to_active" Google link:https://gitlab.freedesktop.org/drm/intel/issues/827 commit e85ade1f50aae464ce196672faa7a099fd1721ed Author: Chris Wilson Date: Wed Dec 18 10:40:43 2019 + ** Bug watch added: Debian Bug tracker #949369 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949369 ** Bug watch added: Red Hat Bugzilla #1805278 https://bugzilla.redhat.com/show_bug.cgi?id=1805278 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1868551] Re: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4
zgrep -h i915_active_acquire /var/log/kern.log* kern.log* | cut -d ' ' -f1-3,5,9- ** Attachment added: "kern.log" https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+attachment/5342403/+files/kern.log -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1868551 Title: Screen freezes : NULL pointer dereference i915_active_acquire since Linux 5.4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1868551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs