[Bug 1918892] Re: near the end of installation the installer displayed the message "Executing 'grub-install/dev/sda' failed. This is a fatal error."
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918892 Title: near the end of installation the installer displayed the message "Executing 'grub-install/dev/sda' failed. This is a fatal error." To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1918892/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918960] Re: kernel does not honor mokx revocations, allowing kexec lockdown bypass
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918960 Title: kernel does not honor mokx revocations, allowing kexec lockdown bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921425] Re: rabbitmq-server logrotate issue
Hi Utkarsh, Great, thank you. Currently I'm not sure if this issue also affects Bionic. That's something I can test today or tomorrow if it can help. It has been fixed in Debian per https://salsa.debian.org/openstack-team /third-party/rabbitmq- server/-/commit/20641fde278ad4d8bf7451e3c396f8ae976ff2f0 -- Thank you, Thomas. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921425 Title: rabbitmq-server logrotate issue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rabbitmq-server/+bug/1921425/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918639] Re: blueman-manager crashed with blueman.bluez.errors.DBusNotReadyError in callback(): Resource Not Ready
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918639 Title: blueman-manager crashed with blueman.bluez.errors.DBusNotReadyError in callback(): Resource Not Ready To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/1918639/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921995] Re: hirsute kernels 5.11 do not boot on AMD STONEY hardware
I tried earlyprintk=efi command line option but it still does not display anything after boot ** Also affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921995 Title: hirsute kernels 5.11 do not boot on AMD STONEY hardware To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1921995/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 388605] Re: [MIR] rsyslog
Yeah, that should be ok we have the buy in from everyone involved that it is fine to promote in past releases. ** Changed in: rsyslog (Ubuntu Groovy) Status: New => Fix Committed ** Changed in: rsyslog (Ubuntu Focal) Status: New => Fix Committed ** Changed in: rsyslog (Ubuntu Bionic) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/388605 Title: [MIR] rsyslog To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rsyslog/+bug/388605/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1681830] Re: No Label for LVM Encryption Passwords
@Brian This is specific to the KDE front end UI. 21.04/hirsute is affected. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1681830 Title: No Label for LVM Encryption Passwords To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1681830/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915118] Re: "No bluetooth found"
** Package changed: linux-signed-hwe-5.8 (Ubuntu) => linux-hwe-5.8 (Ubuntu) ** Information type changed from Public Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1915118 Title: "No bluetooth found" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-hwe-5.8/+bug/1915118/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918960] Re: kernel does not honor mokx revocations, allowing kexec lockdown bypass
https://lore.kernel.org/lkml/1884195.1615482...@warthog.procyon.org.uk/ is still not upstream. https://lore.kernel.org/lkml/20210312171232.2681989-1-...@digikod.net/ may also be worth watching. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918960 Title: kernel does not honor mokx revocations, allowing kexec lockdown bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917954] Re: vagrant reports undefined symbol __gmpz_limbs_write
** Tags added: rls-gg-incoming -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917954 Title: vagrant reports undefined symbol __gmpz_limbs_write To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnutls28/+bug/1917954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918960] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1918960 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918960 Title: kernel does not honor mokx revocations, allowing kexec lockdown bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
** Patch added: "libwacom_1.3-2ubuntu2.debdiff" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482566/+files/libwacom_1.3-2ubuntu2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1887190] Re: MSFT Touchpad not working on Lenovo Legion-5 15ARH05
Pop OS 20.10 has updated to kernel 5.11 and touchpad now works out of the box without patching. This is a great day for my laptop! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1887190 Title: MSFT Touchpad not working on Lenovo Legion-5 15ARH05 To manage notifications about this bug go to: https://bugs.launchpad.net/pop-os/+bug/1887190/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1904583] Re: SRU: Backport the latest developments on drivers detection and hybrid graphics
** Changed in: oem-priority Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1904583 Title: SRU: Backport the latest developments on drivers detection and hybrid graphics To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1904583/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918960] Re: kernel does not honor mokx revocations, allowing kexec lockdown bypass
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-26541 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918960 Title: kernel does not honor mokx revocations, allowing kexec lockdown bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918960/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1919419] Re: Phishing vulnerability: Template generation allows external parameters to override placeholders
I have pushed the focal update to the security-proposed ppa at https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages ; any testing that anyone could give once it is done building would be appreciated. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1919419 Title: Phishing vulnerability: Template generation allows external parameters to override placeholders To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp/+bug/1919419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921084] Re: Hirsute can not read FAT32
Hirsute build 30 March still there. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921084 Title: Hirsute can not read FAT32 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1921084/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915492] Re: ayatana-indicator-keyboard-service crashed with SIGSEGV in keyboard_GetLayout()
Still happens on Hirsute build 30 March. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1915492 Title: ayatana-indicator-keyboard-service crashed with SIGSEGV in keyboard_GetLayout() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ayatana-indicator-keyboard/+bug/1915492/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1880211] Re: Logwatch package points to wrong location for zfs utils
** Changed in: logwatch (Ubuntu Xenial) Status: Confirmed => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880211 Title: Logwatch package points to wrong location for zfs utils To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/1880211/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921452] Re: [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB-Audio.pcm.iec958_device
Updated the [Where problems will occur] part. ** Description changed: [Impact] On Cmedia Audio, unusable SPDIF can be selected as output from PulseAudio. [Fix] Disable IEC958 (SPDIF) through ALSA UCM. [Test] With the UCM applied, `pactl` and audio panel in gnome-control-center no longer have SPDIF option. [Where problems will occur] - This fix limits to the Cmedia Audio only, other devices are unaffected. + "Cmedia Audio" is the sound card name of this usb audio dongle, and this string is got from usb string descriptor, that is to say the "Cmedia Audio" is hard-coded in the firmware of that usb dongle. + Not all Cmedia usb audio dongle use "Cmedia Audio", most of the dongles don't set string descriptor, then the audio driver sets a generic name "USB Audio Device" for them, and all dongles I met before don't have SPDIF interface. + So If this SRU could introduce regression, it will happen on a Cmedia usb audio dongle which also hard-codes the "Cmedia Audio" in the string descriptor and it has SPDIF interface on it, after this SRU, users couldn't find the SPDIF playback device from the gnome-sound-setting. But this regression chance is very low since it is very rare a cmedia usb audio dongle uses "Cmedia Audio" in the string descriptor and it is very rare a usb audio dongle has SPDIF interface. So far we haven't met such a cmedia usb audio dongle. ** Description changed: [Impact] On Cmedia Audio, unusable SPDIF can be selected as output from PulseAudio. [Fix] Disable IEC958 (SPDIF) through ALSA UCM. [Test] With the UCM applied, `pactl` and audio panel in gnome-control-center no longer have SPDIF option. [Where problems will occur] "Cmedia Audio" is the sound card name of this usb audio dongle, and this string is got from usb string descriptor, that is to say the "Cmedia Audio" is hard-coded in the firmware of that usb dongle. - Not all Cmedia usb audio dongle use "Cmedia Audio", most of the dongles don't set string descriptor, then the audio driver sets a generic name "USB Audio Device" for them, and all dongles I met before don't have SPDIF interface. + Not all Cmedia usb audio dongle use "Cmedia Audio", most of the dongles don't set string descriptor, then the audio driver sets a generic name "USB Audio Device" for them, if a dongle has string descriptor, it may have different string like "C-Media USB Headphone Set", and all dongles I met before don't have SPDIF interface. So If this SRU could introduce regression, it will happen on a Cmedia usb audio dongle which also hard-codes the "Cmedia Audio" in the string descriptor and it has SPDIF interface on it, after this SRU, users couldn't find the SPDIF playback device from the gnome-sound-setting. But this regression chance is very low since it is very rare a cmedia usb audio dongle uses "Cmedia Audio" in the string descriptor and it is very rare a usb audio dongle has SPDIF interface. So far we haven't met such a cmedia usb audio dongle. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921452 Title: [SRU] alsa-lib: conf: USB - add "Cmedia Audio" to USB- Audio.pcm.iec958_device To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1921452/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
commit ba02abf58f8d0405140e658d8238b69e89120576 Author: Jason Gerecke Date: Wed Jan 6 13:01:29 2021 -0800 data: Add ISDv4 51e9 (Lenovo ThinkPad P15 Gen 1) (#325) Tablet definition was tested and verified to work by the bug reporter. ** Patch added: "isdv4-51e9.patch" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482544/+files/isdv4-51e9.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
The add-isdv4-aes-stylus-group.patch need the isdv4-48ca.patch and isdv4-48ce.patch. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
commit a864679083c035eb08a75cf084a6564d589c0b1c Author: Jason Gerecke Date: Fri Nov 1 11:51:20 2019 -0700 Add multiple AES stylus definitions Adds definitions for many different AES styli. The precise information about supported features is hard to come by, but in general most pens have two buttons (one of which is treated as an eraser) and can only report pressure. A few exceptions are known or suspected and their data has been set accordingly. ** Patch added: "add-multiple-AES-stylus-definitions.patch" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482543/+files/add-multiple-AES-stylus-definitions.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
** Patch added: "isdv4-48ce.patch" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482542/+files/isdv4-48ce.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
** Patch added: "isdv4-48ca.patch" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482541/+files/isdv4-48ca.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
commit 8652aa3376bfb0e833af3704dc2ab7948958cd8f Author: Jason Gerecke Date: Tue Oct 29 15:26:51 2019 -0700 Add isdv4-aes stylus group to all AES sensors AES sensors determined based on comments and HID descriptors available at the wacom-hid-descriptors repository, where available. Some pen/sensor combinations may not truly be compatible with each other, but it difficult to know a priori which are problematic. This ultimately doesn't matter *too* much, however, since the ID list is primarily used by tools like GNOME Control Center that just need a rough idea of what pens might work with a given tablet during configuration. ** Patch added: "add-isdv4-aes-stylus-group.patch" https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+attachment/5482540/+files/add-isdv4-aes-stylus-group.patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1919419] Re: Phishing vulnerability: Template generation allows external parameters to override placeholders
Hey Etienne, Thanks for submitting the debdiff. I'm taking a look in more detail, but on first glance it looks good to me. If all goes well, I'll push it up to our security-proposed in a bit. ** Changed in: shibboleth-sp (Ubuntu) Assignee: (unassigned) => Steve Beattie (sbeattie) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1919419 Title: Phishing vulnerability: Template generation allows external parameters to override placeholders To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shibboleth-sp/+bug/1919419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1880211] Re: Logwatch package points to wrong location for zfs utils
If its helpful, the proper output looks like this. - ZFS Report Begin Total ZFS pools: 1 Total filesystems: 24 (24 mounted) Total snapshots: 1926 Total volumes: 0 --- ZFS Pool Summary --- Pool NameSize (MiB) Used (MiB) Free (MiB) Dedup tank 18979225.6 5767168.0 13212057.6 1.00x 30% --- ZFS Pool Status --- pool: tank state: ONLINE scan: scrub repaired 0B in 0 days 03:59:20 with 0 errors on Sun Mar 14 04:23:21 2021 config: NAMESTATE READ WRITE CKSUM tankONLINE 0 0 0 raidz2-0 ONLINE 0 0 0 sdb ONLINE 0 0 0 sdc ONLINE 0 0 0 sdd ONLINE 0 0 0 sde ONLINE 0 0 0 errors: No known data errors --- -- ZFS Report End - -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880211 Title: Logwatch package points to wrong location for zfs utils To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/1880211/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] Re: Support isdv4-aes stylus group and multiple AES stylus definitions
** Description changed: [Impact] - * There are lots of stylus couldn't be used on Lenovo's platform, our + * There are lots of stylus couldn't be used on Lenovo's platform, our OEM customer request to support ThinkPad P15 Gen 1, ThinkPad X1 Yoga Gen5, ThinkPad P1 G3. - * I reviewed and tested the below patches from upstream. It could + * I reviewed and tested the below patches from upstream. It could support the stylus very well on P15, P1 or X1 Yoga. - * a864679 - Add multiple AES stylus definitions (6 months ago) -I applied into libwacom2 1.3-2ubuntu1, no errors. + * a864679 - Add multiple AES stylus definitions + I applied into libwacom2 1.3-2ubuntu1, no errors. - * 8652aa3 - Add isdv4-aes stylus group to all AES sensors (6 months ago) - I tried to apply this patch, but there are not 'data/isdv4-48ca.tablet' and 'data/isdv4-48ce.tablet', it failed for these two files. + * 8652aa3 - Add isdv4-aes stylus group to all AES sensors + I tried to apply this patch, but there are not 'data/isdv4-48ca.tablet' and 'data/isdv4-48ce.tablet', it failed for these two files. - * ba02abf - Add ISDv4 51e9 (Lenovo ThinkPad P15 Gen 1) (#325) + * ba02abf - Add ISDv4 51e9 (Lenovo ThinkPad P15 Gen 1) (#325) [Test Plan] - * Need your laptop have AES stylus, check the pen setting at gnome- + * Need your laptop have AES stylus, check the pen setting at gnome- control-center when the pen touch the screen. It could not set/customize the stylus, such as the second button as right click. - * After updated the new packages with these patches, you could + * After updated the new packages with these patches, you could customize the stylus at gnome-control-center. [Where problems could occur] - * It only changes the data/ parts to support more stylus from upstream, + * It only changes the data/ parts to support more stylus from upstream, so it's low risk. [Other Info] - - * Related bug: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1869059 + + * Related bug: + https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1869059 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921976] Re: Can't create additional binder devices the user needs to specify them
** Tags added: binder -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921976 Title: Can't create additional binder devices the user needs to specify them To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1921976/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1404172] Re: lightdm: PAM unable to dlopen(pam_kwallet.so): /lib/security/pam_kwallet.so: cannot open shared object file: No such file or directory
This bug is present in Ubuntu 21.04 and 20.10 daily builds. ** Tags removed: apport-bug i386 ** Tags added: groovy hirsute -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1404172 Title: lightdm: PAM unable to dlopen(pam_kwallet.so): /lib/security/pam_kwallet.so: cannot open shared object file: No such file or directory To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/1404172/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909005] Re: Ubuntu does not resume (wake up) from suspend
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909005 Title: Ubuntu does not resume (wake up) from suspend To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1909005/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1910594] Re: crash during the installation of Ubuntu 20.04 TLS
[Expired for ubiquity (Ubuntu) because there has been no activity for 60 days.] ** Changed in: ubiquity (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910594 Title: crash during the installation of Ubuntu 20.04 TLS To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1910594/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1912046] Re: Failed Installing second instances of Ubuntu 20.04
[Expired for ubiquity (Ubuntu) because there has been no activity for 60 days.] ** Changed in: ubiquity (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912046 Title: Failed Installing second instances of Ubuntu 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1912046/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1912066] Re: Roccat ISKU Keyboard not working, Kernel 5.8.x
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912066 Title: Roccat ISKU Keyboard not working, Kernel 5.8.x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912066/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1912102] Re: failed installation on old asus ROG computer
[Expired for ubiquity (Ubuntu) because there has been no activity for 60 days.] ** Changed in: ubiquity (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912102 Title: failed installation on old asus ROG computer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1912102/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1913644] Re: Closing by itself upon moving file to bookmarked folder
[Expired for nautilus (Ubuntu) because there has been no activity for 60 days.] ** Changed in: nautilus (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1913644 Title: Closing by itself upon moving file to bookmarked folder To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1913644/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1913513] Re: lubuntu focal.2 calamares summary repeats details
[Expired for calamares (Ubuntu) because there has been no activity for 60 days.] ** Changed in: calamares (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1913513 Title: lubuntu focal.2 calamares summary repeats details To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/calamares/+bug/1913513/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1920643] Re: Notification popup before login -> app started w/o login
Thanks for the report. Making this public to get the Desktop team to take a look at this. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1920643 Title: Notification popup before login -> app started w/o login To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1920643/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921826] Re: jfs install in efi mode drops to grub if no separate /boot partition
This bug has been reported on the Ubuntu ISO testing tracker. A list of all reports related to this bug can be found here: http://iso.qa.ubuntu.com/qatracker/reports/bugs/1921826 ** Tags added: iso-testing -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921826 Title: jfs install in efi mode drops to grub if no separate /boot partition To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub/+bug/1921826/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921991] [NEW] Support isdv4-aes stylus group and multiple AES stylus definitions
Public bug reported: [Impact] * There are lots of stylus couldn't be used on Lenovo's platform, our OEM customer request to support ThinkPad P15 Gen 1, ThinkPad X1 Yoga Gen5, ThinkPad P1 G3. * I reviewed and tested the below patches from upstream. It could support the stylus very well on P15, P1 or X1 Yoga. * a864679 - Add multiple AES stylus definitions (6 months ago) I applied into libwacom2 1.3-2ubuntu1, no errors. * 8652aa3 - Add isdv4-aes stylus group to all AES sensors (6 months ago) I tried to apply this patch, but there are not 'data/isdv4-48ca.tablet' and 'data/isdv4-48ce.tablet', it failed for these two files. * ba02abf - Add ISDv4 51e9 (Lenovo ThinkPad P15 Gen 1) (#325) [Test Plan] * Need your laptop have AES stylus, check the pen setting at gnome- control-center when the pen touch the screen. It could not set/customize the stylus, such as the second button as right click. * After updated the new packages with these patches, you could customize the stylus at gnome-control-center. [Where problems could occur] * It only changes the data/ parts to support more stylus from upstream, so it's low risk. [Other Info] * Related bug: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1869059 ** Affects: libwacom (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921991 Title: Support isdv4-aes stylus group and multiple AES stylus definitions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libwacom/+bug/1921991/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1920685] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1920685 Title: Shity ubujntu 20.04 upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1920685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1920685] Re: Shity ubujntu 20.04 upgrade
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1920685 Title: Shity ubujntu 20.04 upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1920685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921545] Re: While installing Lubuntu 18.04.5-desktop-amd64 , the grub failed to install therefore causing installation to crash.
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921545 Title: While installing Lubuntu 18.04.5-desktop-amd64 , the grub failed to install therefore causing installation to crash. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1921545/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921485] Re: Bosch CERT Advisory: OpenSSL Multiple Vulnerabilities
This was addressed in https://ubuntu.com/security/notices/USN-4891-1 . ** Information type changed from Private Security to Public Security ** Changed in: openssl (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921485 Title: Bosch CERT Advisory: OpenSSL Multiple Vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1921485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921585] Re: Screen contents visible when switching between logged in users using CTrl + Alt + Fx
** Also affects: gnome-shell (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921585 Title: Screen contents visible when switching between logged in users using CTrl + Alt + Fx To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1921585/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1885862] Re: Add in-tree Realtek 8821CE wireless module support
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1885862 Title: Add in-tree Realtek 8821CE wireless module support To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1885862/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1914411] Re: Fix broken efifb on graphics device without driver
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1914411 Title: Fix broken efifb on graphics device without driver To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1914411/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1916467] Re: [Intel Maple Ridge] system cannot enter S3 the first time while connecting to TBT4 storage
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1916467 Title: [Intel Maple Ridge] system cannot enter S3 the first time while connecting to TBT4 storage To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1916467/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1916554] Re: Cirrus Audio Codec CS8409/CS42L42 support
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1916554 Title: Cirrus Audio Codec CS8409/CS42L42 support To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1916554/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917419] Re: Can't adjust brightness on Dell Precision 7000 laptop
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917419 Title: Can't adjust brightness on Dell Precision 7000 laptop To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1917419/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917829] Re: alsa/hda: the hdmi audio dosn't work on TGL machines
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917829 Title: alsa/hda: the hdmi audio dosn't work on TGL machines To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1917829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917842] Re: Fix Lenovo ThinkStation P620 rear audio
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917842 Title: Fix Lenovo ThinkStation P620 rear audio To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1917842/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918134] Re: LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918134 Title: LRMv4: switch to signing nvidia modules via the Ubuntu Modules signing key To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918134/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918378] Re: Cirrus Audio Codec CS8409/CS42L42: Input Device does not switch to headset Mic when a headset is inserted
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918378 Title: Cirrus Audio Codec CS8409/CS42L42: Input Device does not switch to headset Mic when a headset is inserted To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1918378/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918427] Re: curtin: install flash-kernel in arm64 UEFI unexpected
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918427 Title: curtin: install flash-kernel in arm64 UEFI unexpected To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/1918427/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918471] Re: Enable Tegra support in arm64 for NVIDIA Jetson
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918471 Title: Enable Tegra support in arm64 for NVIDIA Jetson To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1918471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1919123] Re: Dell Precision 5550 takes up to 10 seconds to respond when coming out of sleep
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1919123 Title: Dell Precision 5550 takes up to 10 seconds to respond when coming out of sleep To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1919123/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1919492] Re: Hirsute update: v5.11.7 upstream stable release
This bug was fixed in the package linux - 5.11.0-13.14 --- linux (5.11.0-13.14) hirsute; urgency=medium * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 16:49:32 +0100 ** Changed in: linux (Ubuntu Hirsute) Status: In Progress => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1919492 Title: Hirsute update: v5.11.7 upstream stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1919492/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911235] Re: Groovy update: upstream stable patchset 2021-01-12
This bug was fixed in the package linux-riscv - 5.11.0-1004.4 --- linux-riscv (5.11.0-1004.4) hirsute; urgency=medium [ Ubuntu: 5.11.0-13.14 ] * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 18:21:28 +0100 ** Changed in: linux-riscv (Ubuntu) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911235 Title: Groovy update: upstream stable patchset 2021-01-12 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1911235/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911476] Re: Groovy update: upstream stable patchset 2021-01-13
This bug was fixed in the package linux-riscv - 5.11.0-1004.4 --- linux-riscv (5.11.0-1004.4) hirsute; urgency=medium [ Ubuntu: 5.11.0-13.14 ] * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 18:21:28 +0100 ** Changed in: linux-riscv (Ubuntu) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911476 Title: Groovy update: upstream stable patchset 2021-01-13 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1911476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1912027] Re: Groovy update: upstream stable patchset 2021-01-15
This bug was fixed in the package linux-riscv - 5.11.0-1004.4 --- linux-riscv (5.11.0-1004.4) hirsute; urgency=medium [ Ubuntu: 5.11.0-13.14 ] * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 18:21:28 +0100 ** Changed in: linux-riscv (Ubuntu) Status: New => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912027 Title: Groovy update: upstream stable patchset 2021-01-15 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1912027/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917433] Re: riscv: revert SiFive Unleashed CPUFreq
This bug was fixed in the package linux-riscv - 5.11.0-1004.4 --- linux-riscv (5.11.0-1004.4) hirsute; urgency=medium [ Ubuntu: 5.11.0-13.14 ] * CVE-2020-27170 - bpf: Prohibit alu ops for pointer types not defining ptr_limit - bpf, selftests: Fix up some test_verifier cases for unprivileged * CVE-2020-27171 - bpf: Fix off-by-one for area size in creating mask to left -- Andrea Righi Fri, 19 Mar 2021 18:21:28 +0100 ** Changed in: linux-riscv (Ubuntu) Status: Incomplete => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27170 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-27171 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917433 Title: riscv: revert SiFive Unleashed CPUFreq To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-riscv/+bug/1917433/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917894] Re: [FFe][sync][sru] sos upstream 4.1
[Bionic regression / autopkgtest] simple.sh is looking if it doesn't load module by happenstance by comparing the list before and after, and Bionic w/ 4.15 kernel reveal that 'devlink' is added along the way. I was able to isolate it to the networking plugin: root@srv:~# lsmod | grep -i devlink root@srv:~# sos report -o networking sosreport (version 4.1) . Your sosreport has been generated and saved in: /tmp/sosreport-srv-2021-03-31-tvjgeyv.tar.xz Size 29.75KiB Owner root sha256 72d49c26463f8fe42f11696dbc69aaa6eaf4e621551d88822b72a6f27ed7a136 Please send this file to your support representative. More precisely to this specific code line: https://github.com/sosreport/sos/blob/master/sos/report/plugins/networking.py#L109 # Manual reproducer: root@srv:~# lsmod | grep -i devlink root@srv:~# devlink dev root@srv:~# lsmod | grep -i devlink devlink45056 0 I can reproduce the behaviour every time only on 4.15 but not on more recent kernel (5.4). I highly suspect that this is due to following kernel configuration: config-4.15.0-140-generic:CONFIG_MAY_USE_DEVLINK=m config-5.4.0-70-generic:CONFIG_NET_DEVLINK=y With that being said, it is safe to ignore the failure here for now as it has nothing to do with sosreport. I already addressed it with sos upstream. And I'll try work on mitigation/workaround in sosreport eventually, maybe using SoSpredicate or some sort. - Eric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917894 Title: [FFe][sync][sru] sos upstream 4.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1917894/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917894] Re: [FFe][sync][sru] sos upstream 4.1
[Bionic regression / autopkgtest] simple.sh is looking if it doesn't load module by happenstance by comparing the list before and after, and Bionic w/ 4.15 kernel reveal that 'devlink' is added along the way. I was able to isolate it to the networking plugin: root@srv:~# lsmod | grep -i devlink root@srv:~# sos report -o networking sosreport (version 4.1) . Your sosreport has been generated and saved in: /tmp/sosreport-srv-2021-03-31-tvjgeyv.tar.xz Size 29.75KiB Owner root sha256 72d49c26463f8fe42f11696dbc69aaa6eaf4e621551d88822b72a6f27ed7a136 Please send this file to your support representative. More precisely to this specific code line: https://github.com/sosreport/sos/blob/master/sos/report/plugins/networking.py#L109 # Manual reproducer: root@srv:~# lsmod | grep -i devlink devlink 45056 0 root@srv:~# lsb_release -cs bionic I can reproduce the behaviour every time only on 4.15 but not on more recent kernel (5.4). I highly suspect that this is due to following kernel configuration: config-4.15.0-140-generic:CONFIG_MAY_USE_DEVLINK=m config-5.4.0-70-generic:CONFIG_NET_DEVLINK=y With that being said, it is safe to ignore the failure here for now as it has nothing to do with sosreport. I already addressed it with sos upstream. And I'll try work on mitigation/workaround in sosreport eventually, maybe using SoSpredicate or some sort. - Eric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917894 Title: [FFe][sync][sru] sos upstream 4.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1917894/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921578] Re: package phpmyadmin 4:4.9.5+dfsg1-2 failed to install/upgrade: el subproceso instalado paquete phpmyadmin script post-installation devolvió el código de salida de error 1
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921578 Title: package phpmyadmin 4:4.9.5+dfsg1-2 failed to install/upgrade: el subproceso instalado paquete phpmyadmin script post-installation devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/phpmyadmin/+bug/1921578/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921983] [NEW] libpcap pcap_findalldevs_ex funtion not correct
Public bug reported: sudo apt install libpcap-dev on ubuntu 20.04.2 when i use funtcion pcap_findalldevs_ex tip to me undefined reference to `pcap_findalldevs_ex' ubuntu 18.04 is rigth... ** Affects: libpcap (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921983 Title: libpcap pcap_findalldevs_ex funtion not correct To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpcap/+bug/1921983/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921585] Re: Screen contents visible when switching between logged in users using CTrl + Alt + Fx
Hey Milfred, sorry you are hitting this issue. What Ubuntu release is this? And can you confirm that the desktop envirnment you're using is the Ubuntu desktop, and not something else? Thanks. ** Package changed: ubuntu => gdm3 (Ubuntu) ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921585 Title: Screen contents visible when switching between logged in users using CTrl + Alt + Fx To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gdm3/+bug/1921585/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1799386] Re: Screen not locked when coming out of suspend/hibernate
*** This bug is a duplicate of bug 1532508 *** https://bugs.launchpad.net/bugs/1532508 ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1799386 Title: Screen not locked when coming out of suspend/hibernate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-screensaver/+bug/1799386/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1880211] Re: Logwatch package points to wrong location for zfs utils
** Description changed: [Impact] Logwatch fails to print info for ZFS due to invalid paths to binaries. [Test Case] With ZFS installed, run logwatch and note the missing ZFS information. + + $ sudo apt-get install zfsutils-linux + $ sudo logwatch --detail Low --range all --service zz-zfs --output stdout + + In the bugged version, this produces no output. + + With a successful configuration, you will see something such as: + + - ZFS Report Begin + + /dev/zfs and /proc/self/mounts are required. + Try running 'udevadm trigger' and 'mount -t proc proc /proc' as root. + + -- ZFS Report End - [Regression Potential] Since logwatch filters logs for errors pertinent to administrators, standard things to watch out for are undesired changes in this filtering behavior, such as flagging or failing to flag issues differently than before, other than the specific messages being filtered with this change. [Discussion] In /usr/share/logwatch/scripts/services/zz-zfs line 54 and 55 are the following. my $pathto_zpool = $ENV{'pathto_zpool'} || '/usr/sbin/zpool'; my $pathto_zfs = $ENV{'pathto_zfs'} || '/usr/sbin/zfs'; In Ubuntu, the zfs utilities are in /sbin, not /usr/sbin. This causes logwatch to not print info for ZFS even if you're using it. The fix is just to point to /sbin instead. This is what fixed it for me. my $pathto_zpool = $ENV{'pathto_zpool'} || '/sbin/zpool'; my $pathto_zfs = $ENV{'pathto_zfs'} || '/sbin/zfs'; -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880211 Title: Logwatch package points to wrong location for zfs utils To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/logwatch/+bug/1880211/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917894] Re: [FFe][sync][sru] sos upstream 4.1
[Bionic regression / autopkgtest] simple.sh is looking if it doesn't load module by happenstance by comparing the list before and after, and Bionic w/ 4.15 kernel reveal that 'devlink' is added along the way. I was able to isolate it to the networking plugin: root@srv:~# lsmod | grep -i devlink root@srv:~# sos report -o networking sosreport (version 4.1) . Your sosreport has been generated and saved in: /tmp/sosreport-srv-2021-03-31-tvjgeyv.tar.xz Size 29.75KiB Owner root sha256 72d49c26463f8fe42f11696dbc69aaa6eaf4e621551d88822b72a6f27ed7a136 Please send this file to your support representative. More precisely to this specific code line: https://github.com/sosreport/sos/blob/master/sos/report/plugins/networking.py#L109 # Manual reproducer: root@srv:~# lsmod | grep -i devlink devlink45056 0 root@srv:~# lsb_release -cs bionic I can reproduce the behaviour every time only on 4.15 but not on more recent kernel (5.4). I highly suspect that this is due to following kernel configuration: config-4.15.0-140-generic:CONFIG_MAY_USE_DEVLINK=m config-5.4.0-70-generic:CONFIG_NET_DEVLINK=y With that being said, it is safe to ignore the failure here for now as it has nothing to do with sosreport. I already addressed it upstream. And I'll try work on mitigation/workarond in sosreport eventually. - Eric -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917894 Title: [FFe][sync][sru] sos upstream 4.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1917894/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921617] Re: installation crashed in the middle
Relevat bits from UbiquitySyslog Mar 28 10:33:20 ubuntu grub-installer: info: Installing grub on '/dev/sdb' Mar 28 10:33:20 ubuntu grub-installer: info: grub-install does not support --no-floppy Mar 28 10:33:20 ubuntu grub-installer: info: Running chroot /target grub-install --force "/dev/sdb" Mar 28 10:33:20 ubuntu grub-installer: Installing for x86_64-efi platform. Mar 28 10:33:22 ubuntu grub-installer: grub-install: warning: Internal error. Mar 28 10:33:22 ubuntu grub-installer: grub-install: error: failed to register the EFI boot entry: Operation not permitted. Mar 28 10:33:22 ubuntu grub-installer: error: Running 'grub-install --force "/dev/sdb"' failed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921617 Title: installation crashed in the middle To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1921617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921617] Re: installation crashed in the middle
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921617 Title: installation crashed in the middle To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1921617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921690] Re: I dont know
Thank you for using Ubuntu and taking the time to report a bug. Your report should contain, at a minimum, the following information so we can better find the source of the bug and work to resolve it. Submitting the bug about the proper source package is essential. For help see https://wiki.ubuntu.com/Bugs/FindRightPackage . Additionally, in the report please include: 1) The release of Ubuntu you are using, via 'cat /etc/lsb-release' or System -> About Ubuntu. 2) The version of the package you are using, via 'dpkg -l PKGNAME | cat' or by checking in Synaptic. 3) What happened and what you expected to happen. The Ubuntu community has also created debugging procedures for a wide variety of packages at https://wiki.ubuntu.com/DebuggingProcedures . Following the debugging instructions for the affected package will make your bug report much more complete. Thanks! ** Package changed: ubuntu => xorg (Ubuntu) ** Information type changed from Private Security to Public ** Changed in: xorg (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921690 Title: I dont know To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1921690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917894] Re: [FFe][sync][sru] sos upstream 4.1
[Focal regression / autopkgtest] After a few retries, the test passed. I had the same failure at the first run with Hirsute. http://autopkgtest.ubuntu.com/packages/s/sosreport/focal/amd64 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917894 Title: [FFe][sync][sru] sos upstream 4.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sosreport/+bug/1917894/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921941] Re: samba install flushes iptables and sets all chains to policy accept
Hello, sorry you are having this issue. Unfortunately I am unable to reporduce this, with samba 2:4.11.6+dfsg- 0ubuntu1.6 from focal, either by applying iptables rules manually or enabling firewall rules with ufw: $ sudo iptables -D INPUT -i lo -j LOG $ sudo iptables -L INPUT -n Chain INPUT (policy ACCEPT) target prot opt source destination LOGall -- 0.0.0.0/00.0.0.0/0LOG flags 0 level 4 $ sudo apt install samba [ELIDED] $ sudo iptables -L INPUT -n Chain INPUT (policy ACCEPT) target prot opt source destination LOGall -- 0.0.0.0/00.0.0.0/0LOG flags 0 level 4 What are you using to apply firewall rules? None of the samba packages directly manipulate iptables in their postinstall scripts or in their service startup files that I can see. The samba package does drop an application file for ufw in /etc/ufw/applications.d/samba, but if ufw is not enabled, this should not be applied, nor should the ufw trigger that runs at the end of the installation touch iptables settings. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921941 Title: samba install flushes iptables and sets all chains to policy accept To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1921941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1870786] Re: Kernel BUG sometimes during pluging in a DP Splitter
Hi, thanks for trying this out. If this is still reproducible, please give the latest mainline kernel [1] a try to see if you issue exists in the upstream kernel. Instructions could be found in [2] Please flip the bug status back to confirmed after your test. Thank you! [1] https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.12-rc5/ [2] https://wiki.ubuntu.com/Kernel/MainlineBuilds -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1870786 Title: Kernel BUG sometimes during pluging in a DP Splitter To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1870786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921883] Re: Notification badges for app switcher
Thanks for the bug report. Please check the issue is still present in newer versions of GNOME. If so then report it to the developers at https://gitlab.gnome.org/GNOME /gnome-shell/issues and tell us the new issue ID. ** Package changed: xorg (Ubuntu) => unity (Ubuntu) ** Package changed: unity (Ubuntu) => gnome-shell (Ubuntu) ** Changed in: gnome-shell (Ubuntu) Importance: Undecided => Wishlist ** Changed in: gnome-shell (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921883 Title: Notification badges for app switcher To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1921883/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921941] Re: samba install flushes iptables and sets all chains to policy accept
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921941 Title: samba install flushes iptables and sets all chains to policy accept To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1921941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376903] Re: Caps lock delay
There aren't many Xorg maintainers left, but if you would like to communicate with them then please use the upstream page: https://gitlab.freedesktop.org/xorg/xserver/-/issues/312 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376903 Title: Caps lock delay To manage notifications about this bug go to: https://bugs.launchpad.net/xorg-server/+bug/1376903/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921632] Re: Internal Speakers Bang & Olufsen on HP Spectre X360 Convertible model 13-aw2025na don't work at all probably because of missing kernel/ALSA driver or wrong driver configuration
Ok. I got it working. I built from here. git clone https://github.com/thesofproject/linux.git with CONFIG_SND_SOC_INTEL_SOUNDWIRE_SOF_MACH=m I uploaded my kernel debian/ubuntu packages to https://drive.google.com/drive/folders/1L9DpjMamc37tZ19s5u_4RfmV221F4222?usp=sharing Affected Spectre X360 laptop users can install this kernel directly in the meantime before patches make it to the mainline kernel and distros. Also this needs to be installed: user1@HPSpectre:~/dev$ git clone https://github.com/alsa-project/alsa-ucm-conf.git sudo apt remove alsa-ucm-conf cd /usr/share/alsa/ sudo ln -s "$HOME/dev/alsa-ucm-conf/ucm2" ucm2 reboot -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921632 Title: Internal Speakers Bang & Olufsen on HP Spectre X360 Convertible model 13-aw2025na don't work at all probably because of missing kernel/ALSA driver or wrong driver configuration To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921632/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921974] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1921974 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921974 Title: Update patch - Fix no screen show on display after S3 on CML-R To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921974/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1900935] Re: Support to upgrade Synaptic fingerprint firmware from LVFS
II is a great point. Part of the original reason for keeping fwupd major version locked in stable series was concerns to breaking other components in Ubuntu such as gnome-software (ubuntu-software). Since that has now transitioned to snap this is no longer a blocker. And as you pointed out the dbus interface is stable for it. Brian, I think it's worth reconsidering the approach now for this reason. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1900935 Title: Support to upgrade Synaptic fingerprint firmware from LVFS To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1900935/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921976] [NEW] Can't create additional binder devices the user needs to specify them
Public bug reported: ubuntu azure seems not support binder FS. $ uname -r 5.8.0-1026-azure $ sudo modprobe binder_linux $ mkdir ./tbinder $ sudo mount -t binder binder ./tbinder mount: /tbinder: unknown filesystem type 'binder'. $ cat /proc/filesystems | grep binder Another generic server working properly. $ uname -r 5.4.0-45-generic $ sudo modprobe binder_linux $ mkdir ./tbinder $ sudo mount -t binder binder ./tbinder $ cat /proc/filesystems | grep binder nodev binder $ cd tbinder/ $ ls -al total 4 drwxr-xr-x 2 rootroot 0 3월 31 11:14 . crw--- 1 rootroot 240, 0 3월 31 11:14 binder-control ** Affects: linux-azure (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921976 Title: Can't create additional binder devices the user needs to specify them To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-azure/+bug/1921976/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1918855] Re: Xorg xserver got signal 6 to abort
I try memory stress test with my ppa in #4, the issue is still reproduced. ** Attachment added: "sosreport-u-Inspiron-1918855-2021-03-31-xbkosvf.tar.xz" https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1918855/+attachment/5482483/+files/sosreport-u-Inspiron-1918855-2021-03-31-xbkosvf.tar.xz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1918855 Title: Xorg xserver got signal 6 to abort To manage notifications about this bug go to: https://bugs.launchpad.net/mesa/+bug/1918855/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1886912] Re: DELL M3800 Touchscreen not working after login (but works if fwupd is removed)
** Description changed: + Upgrade focal fwupd from 1.3.11 to 1.4.7. + + [Impact] + + * touchscreen is working after login on certain HW + * Current LTS is the OEM Project scope, so we need to SRU it. + * It's a specific HW related upstream fix. + + [Test Plan] + + * Wit this upgraded, with specific HW, check if touchscreen still +working after login. + + [Where problems could occur] + + * Give user already verify this + [Other Info] + + * Anything else you think is useful to include + * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board + * and address these questions in advance + + - + Hello, I have freshly installed Ubuntu 20.04 and have a bug on my M3800. The touchscreen is working good on login screen bug after I enter my credentials and the gnome session open I can't use it. I'm on a dual boot computer and all is working well on Windows 10. How can I help you to track this bug and solve it ? Best regards ** Description changed: Upgrade focal fwupd from 1.3.11 to 1.4.7. [Impact] - * touchscreen is working after login on certain HW - * Current LTS is the OEM Project scope, so we need to SRU it. - * It's a specific HW related upstream fix. + * touchscreen is working after login on certain HW + * Current LTS is the OEM Project scope, so we need to SRU it. + * It's a specific HW-related upstream fix. [Test Plan] - * Wit this upgraded, with specific HW, check if touchscreen still -working after login. + * Wit this upgraded, with specific HW, check if touchscreen still + working after login. [Where problems could occur] + [Other Info] - * Give user already verify this - [Other Info] - - * Anything else you think is useful to include - * Anticipate questions from users, SRU, +1 maintenance, security teams and the Technical Board - * and address these questions in advance + * It's low risk given it's an HWE upstream fix. + - Hello, I have freshly installed Ubuntu 20.04 and have a bug on my M3800. The touchscreen is working good on login screen bug after I enter my credentials and the gnome session open I can't use it. I'm on a dual boot computer and all is working well on Windows 10. How can I help you to track this bug and solve it ? Best regards -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1886912 Title: DELL M3800 Touchscreen not working after login (but works if fwupd is removed) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1886912/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1865838] Re: no error displayed on failed fingerprint authentication
** Changed in: gdm (Ubuntu) Status: In Progress => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865838 Title: no error displayed on failed fingerprint authentication To manage notifications about this bug go to: https://bugs.launchpad.net/gdm/+bug/1865838/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915174] Re: Fingerprint enrollment error stops user to be able to enroll again
Seb, I've pushed the relevant changes to salsa for focal, when you can do a release please :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1915174 Title: Fingerprint enrollment error stops user to be able to enroll again To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1915174/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921974] [NEW] Update patch - Fix no screen show on display after S3 on CML-R
Public bug reported: [Impact] On CML-R, after S3, No screen show on all three connector(3*DP). [Fix] The v4 patch has been landed on drm-tip. For Legacy S3 suspend/resume GEN9 BC needs to enable and setup TGP PCH. [Test Case] 1. Connected the monitor on one of 3*DP on CML-R. 2. Suspend&resume the machine. 3. Check the monitor can output something. [Where problems could occur] Just Enable the hpd detection in IRQ installer and during suspend&resume. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Summary changed: - Fix no screen show on display after S3 on CML-R + Update patch - Fix no screen show on display after S3 on CML-R -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921974 Title: Update patch - Fix no screen show on display after S3 on CML-R To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921974/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874954] Re: [SRU] settings manager window will not shrink horizontally after expanding
This bug was fixed in the package exo - 0.12.11-1ubuntu1.20.04.1 --- exo (0.12.11-1ubuntu1.20.04.1) focal-proposed; urgency=medium * d/patches/lp1874954.patch: - Allow resizing the xfce4-settings window smaller (LP: #1874954) -- Sean Davis Sun, 14 Mar 2021 08:32:12 -0400 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874954 Title: [SRU] settings manager window will not shrink horizontally after expanding To manage notifications about this bug go to: https://bugs.launchpad.net/exo/+bug/1874954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874954] Re: [SRU] settings manager window will not shrink horizontally after expanding
This bug was fixed in the package exo - 0.12.11-1ubuntu1.20.10.1 --- exo (0.12.11-1ubuntu1.20.10.1) groovy-proposed; urgency=medium * d/patches/lp1874954.patch: - Allow resizing the xfce4-settings window smaller (LP: #1874954) -- Sean Davis Sun, 14 Mar 2021 08:32:12 -0400 ** Changed in: exo (Ubuntu Groovy) Status: Fix Committed => Fix Released ** Changed in: exo (Ubuntu Focal) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874954 Title: [SRU] settings manager window will not shrink horizontally after expanding To manage notifications about this bug go to: https://bugs.launchpad.net/exo/+bug/1874954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874954] Update Released
The verification of the Stable Release Update for exo has completed successfully and the package is now being released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874954 Title: [SRU] settings manager window will not shrink horizontally after expanding To manage notifications about this bug go to: https://bugs.launchpad.net/exo/+bug/1874954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1874954] Re: [SRU] settings manager window will not shrink horizontally after expanding
As mentioned in the acceptance message, once you've tested the update we would like you to “please add a comment to this bug, mentioning the version of the package you tested”. That said, messed up tags aside, this seems to have been verified as fixed on the relevant releases. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1874954 Title: [SRU] settings manager window will not shrink horizontally after expanding To manage notifications about this bug go to: https://bugs.launchpad.net/exo/+bug/1874954/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1880114] Re: Syntax error in LayoutLoaderSVG.py shipped with this package
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: onboard (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1880114 Title: Syntax error in LayoutLoaderSVG.py shipped with this package To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/onboard/+bug/1880114/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1900935] Re: Support to upgrade Synaptic fingerprint firmware from LVFS
For point 6: fwupd has two sides: 1. HWE: Given our policy, we won't block version bump in SRU on HWE component. 2. User space interactivity: given the two paths of user interactivity I. via command line: the major interface is fwupdmgr. Per check it's arguments, the command-line interface in the v1.4.x is backward compatible with v1.3.x. II. via dbus to interact with ubuntu-software: Given focal and groovy currently both default using snap-store.ubuntu-software, that means they share the same dbus interface. Since fwupd v.1.4.x works well in groovy on the dbus side, then we know there is no issue. Given I and II, we are clear to go 1.4.x on focal. @Mario or anyone, feel free to comment if any statements are not true. The motivation to upgrade v1.4.x in on lp:1920723. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1900935 Title: Support to upgrade Synaptic fingerprint firmware from LVFS To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1900935/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1917816] Re: Firefox not loading gifv, gifs
Installed VLC, problem is gone. This has been confirmed on multiple systems. Something about the way FireFox is handling media. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917816 Title: Firefox not loading gifv, gifs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1917816/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1900438] Re: Bcache bypasse writeback on caching device with fragmentation
** Changed in: linux (Ubuntu Bionic) Importance: Medium => High ** Changed in: linux (Ubuntu Focal) Importance: Medium => High ** Changed in: linux (Ubuntu Groovy) Importance: Medium => High -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1900438 Title: Bcache bypasse writeback on caching device with fragmentation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1900438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921969] Re: lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239
Confirmed that on a working system, just updating to the new kernel breaks it. So that SRU kernel is definitely broken and should not be shipped. [8.996651] BUG: unable to handle kernel NULL pointer dereference at e12c1a77 [8.998738] IP: [] fuse_do_setattr+0x52/0x640 [9.000546] PGD 8002717c7067 PUD 270e5d067 PMD 0 [9.001915] Oops: [#1] SMP [9.003041] Modules linked in: binfmt_misc veth ip6table_filter ip6_tables xt_CHECKSUM iptable_mangle xt_comment xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm irqbypass bridge stp llc joydev input_leds serio_raw lpc_ich 9pnet_virtio 9pnet virtio_rng virtio_input shpchp 8250_fintek mac_hid ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel virtio_gpu ttm aesni_intel drm_kms_helper aes_x86_64 lrw syscopyarea gf128mul glue_helper ablk_helper sysfillrect ahci sysimgblt cryptd fb_sys_fops psmouse drm libahci virtio_scsi [9.019982] CPU: 2 PID: 1929 Comm: mount Not tainted 4.4.0-207-generic #239-Ubuntu [9.021887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009)/LXD, BIOS 0.0.0 02/06/2015 [9.023893] task: b85f1580 ti: 46f8cfc7 task.ti: 46f8cfc7 [9.025775] RIP: 0010:[] [ ] fuse_do_setattr+0x52/0x640 [9.027974] RSP: 0018:880272eb7c20 EFLAGS: 00010246 [9.029627] RAX: RBX: 880272eb7e28 RCX: 000e [9.031507] RDX: RSI: 880272eb7e28 RDI: 880272eb7cf8 [9.033447] RBP: 880272eb7d98 R08: 00019580 R09: 8122c764 [9.035159] R10: ea0009cd8400 R11: 88027203c300 R12: [9.037004] R13: 880272eb7e28 R14: 88027203c470 R15: 88027203c300 [9.038737] FS: 7f01e82d9840() GS:88027fd0() knlGS: [9.040811] CS: 0010 DS: ES: CR0: 80050033 [9.042470] CR2: 0458 CR3: 000273654000 CR4: 00160670 [9.044488] Stack: [9.045578] 81227c54 880272eb7c84 0001 00028186639d [9.047599] 5318e6f4d6b61d94 880272eb7d70 880272eb7d80 880272eb7d70 [9.049606] 880272eb7cf8 880272eb7cf0 880270e50320 [9.051576] Call Trace: [9.052746] [<4f4fb5e7>] ? lookup_fast+0x184/0x340 [9.054366] [<4f4fb5e7>] ? lookup_fast+0x184/0x340 [9.055970] [ ] ? unlazy_walk+0xc1/0x150 [9.057542] [ ] ? terminate_walk+0x66/0xd0 [9.059307] [<51dc2989>] ? putname+0x54/0x60 [9.060934] [<5d276838>] fuse_setattr+0xa5/0xf0 [9.062454] [ ] notify_change+0x2dc/0x430 [9.064177] [<8ae20288>] utimes_common+0xd1/0x1b0 [9.065694] [<3571704c>] do_utimes+0x125/0x160 [9.067102] [ ] SyS_utimensat+0x67/0xa0 [9.068721] [ ] entry_SYSCALL_64_fastpath+0x22/0xd0 [9.070383] Code: 4c 8b 77 30 65 48 8b 04 25 28 00 00 00 48 89 84 24 48 01 00 00 31 c0 48 8d bc 24 d8 00 00 00 c7 44 24 14 00 00 00 00 49 8b 46 28 <4c> 8b b8 58 04 00 00 31 c0 f3 48 ab 41 0f b6 9f 2c 01 00 00 c0 [9.076396] RIP [ ] fuse_do_setattr+0x52/0x640 [9.078006] RSP [9.079316] CR2: 0458 [9.080677] ---[ end trace 05c28a02c4628343 ]--- ** Changed in: linux (Ubuntu) Status: New => Triaged ** Changed in: linux (Ubuntu) Importance: Undecided => Critical -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921969 Title: lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921969/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1920723] Re: upgrade fwupd/focal to 1.4.x
** Description changed: - Per OEM customer workflow and SBAT update and other bugs fixes, we need - to SRU focal/fwupd to version 1.4.7. + Per OEM customer CPU microcode workflow, SBAT update and other bugs + fixes, we need to SRU focal/fwupd to version 1.4.7. [Impact] * For new features, please check comment 10. * For bug fixes, please check comment 11. * There are two incident happened that make OEM customer's machines un-bootable. Although there is a manually work-around and takes very short time to re-sping another firmware version, it's still bad. Per conclusion, customers want to en-roll firmware by themself. And that needs this updated fwupd. [Test Plan] * find a machine and try to upgrade firmware, and confirm it works. [Where problems could occur] * Per OEM team past experience, we only saw one version display issue along the way of upgrading fwupd, and never say any regression. [Other Info] * update fwupd have a new dependency on libjcat, that's tracked in lp:1920724 * This version also includes SBAT and it will be compatible with the shim update with SBAT. * fwupd snap is also used widely. The current fwupd is version 1.5.8. version 1.4.7 branch are cherry-picked fixes for user report bug. Given so, the risk of upgrading is pretty low. [Steps] 1. upgrade libjcat/universe/focal from version 0.1.0-2 to 0.1.3-2. 2. MIR libjcat/focal to main. 3. SRU fwupd/focal from version 1.3.11-1~focal1 to 1.4.7-1~ubuntu20.04.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1920723 Title: upgrade fwupd/focal to 1.4.x To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1920723/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1921969] Re: lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239
When a single test fails occasionally, it can be an issue with LXD or with the test, but when a bugfix release of a stable kernel suddenly causes one of the most trivial tests to fail on all architectures, this strongly suggests that the kernel is the issue. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921969 Title: lxd 2.0.11-0ubuntu1~16.04.4 ADT test failure with linux 4.4.0-207.239 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1921969/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs