[Bug 2084097] [NEW] requests.exceptions.HTTPError: 410 Client Error: Gone for url: https://api.github.com/repositories/44672744/issues
Public bug reported: Hello, I found I can't use apport to report bugs in snap. After authorizing github to connect my account to my device, I get back an error: # ubuntu-bug snapd *** Collecting problem information The collected information can be sent to the developers to improve the application. This might take a few minutes. *** You have two versions of this application installed, which one do you want to report a bug against? Choices: 1: snapd 2.63 (latest/stable) snap 2: snapd 2.63.1+24.04 deb package C: Cancel Please choose (1/2/C): 1 *** Send problem report to the developers? After the problem report has been sent, please fill out the form in the automatically opened web browser. What would you like to do? Your options are: S: Send report (29.8 KB) V: View report K: Keep report file for sending later or copying to somewhere else I: Cancel and ignore future crashes of this program version C: Cancel Please choose (S/V/K/I/C): What would you like to do? Your options are: S: Send report (29.8 KB) V: View report K: Keep report file for sending later or copying to somewhere else I: Cancel and ignore future crashes of this program version C: Cancel Please choose (S/V/K/I/C): s *** Uploading problem information The collected information is being sent to the bug tracking system. This might take a few minutes. *** Login required Posting an issue requires a Github account. If you have one, please follow these steps to log in. Open the following URL. When requested, write this code to enable apport to open an issue. URL: https://github.com/login/device Code: [REDACTED] Press any key to continue... ...Traceback (most recent call last): File "/usr/bin/apport-cli", line 418, in if not app.run_argv(): ^^ File "/usr/lib/python3/dist-packages/apport/ui.py", line 917, in run_argv return self.run_report_bug() ^ File "/usr/lib/python3/dist-packages/apport/ui.py", line 740, in run_report_bug self.file_report() File "/usr/lib/python3/dist-packages/apport/ui.py", line 1788, in file_report upthread.exc_raise() File "/usr/lib/python3/dist-packages/apport/REThread.py", line 63, in exc_raise raise self._exception[1].with_traceback(self._exception[2]) File "/usr/lib/python3/dist-packages/apport/REThread.py", line 38, in run self._retval = self.__target(*self.__args, **self.__kwargs) File "/usr/lib/python3/dist-packages/apport/crashdb_impl/github.py", line 206, in upload response = self.github.api_open_issue( ^^^ File "/usr/lib/python3/dist-packages/apport/crashdb_impl/github.py", line 73, in api_open_issue return self._post(url, json.dumps(data)) ^ File "/usr/lib/python3/dist-packages/apport/crashdb_impl/github.py", line 63, in _post result.raise_for_status() # Not using UI: the user can't do much here ^ File "/usr/lib/python3/dist-packages/requests/models.py", line 1021, in raise_for_status raise HTTPError(http_error_msg, response=self) requests.exceptions.HTTPError: 410 Client Error: Gone for url: https://api.github.com/repositories/44672744/issues ProblemType: Bug DistroRelease: Ubuntu 24.04 Package: apport 2.28.1-0ubuntu3.1 ProcVersionSignature: Ubuntu 6.8.0-44.44-generic 6.8.12 Uname: Linux 6.8.0-44-generic x86_64 NonfreeKernelModules: zfs ApportLog: ApportVersion: 2.28.1-0ubuntu3.1 Architecture: amd64 CasperMD5CheckResult: pass CrashReports: 640:0:124:29981:2024-10-09 13:07:14.312902789 -0700:2024-10-09 13:07:14.312902789 -0700:/var/crash/_usr_bin_apport-cli.0.crash Date: Wed Oct 9 13:08:33 2024 InstallationDate: Installed on 2023-01-05 (643 days ago) InstallationMedia: Ubuntu 22.04.1 LTS "Jammy Jellyfish" - Release amd64 (20220809.1) PackageArchitecture: all ProcEnviron: LANG=en_US.UTF-8 LC_TIME=C PATH=(custom, no user) SHELL=/bin/bash TERM=rxvt-unicode-256color RebootRequiredPkgs: Error: path contained symlinks. SourcePackage: apport UpgradeStatus: Upgraded to noble on 2024-07-31 (71 days ago) ** Affects: apport (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug noble -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2084097 Title: requests.exceptions.HTTPError: 410 Client Error: Gone for url: https://api.github.com/repositories/44672744/issues To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2084097/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2083676] Re: vi can write even a root file and save it when the user does not have writing permissions
Yes, I'd like you to check this. We once had someone report some surprising errors that were tracked down to an incorrectly owned / directory, and I suspect your system is similar: that a system administrator accidentally unpacked an archive in an unsafe manner that changed the permissions on your /tmp directory. Thanks ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2083676 Title: vi can write even a root file and save it when the user does not have writing permissions To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/2083676/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058192] Re: [MIR] lenovo-wwan-unlock
This service file https://git.launchpad.net/ubuntu/+source/lenovo-wwan- unlock/tree/debian/lenovo-fccunlock.service also needs some seccomp system call filtering via the SystemCallFilter directive. See systemd.exec(5) for details on this. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058192 Title: [MIR] lenovo-wwan-unlock To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058192] Re: [MIR] lenovo-wwan-unlock
The ps Uxr rules are way too open, I filed https://github.com/lenovo/lenovo-wwan-unlock/issues/31 to ask for those to be moved to cx or Cx rules and a new child profile created for ps. Thanks ** Bug watch added: github.com/lenovo/lenovo-wwan-unlock/issues #31 https://github.com/lenovo/lenovo-wwan-unlock/issues/31 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058192 Title: [MIR] lenovo-wwan-unlock To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2083576] Re: failed upgrade, unhelpful looping
There's a chance this is caused by my file:///srv/mirror/ubuntu/ or whatever I used in my apt sources. Replacing that with http://archive.ubuntu.com/ubuntu/ let me upgrade my computer to 24.04 LTS. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2083576 Title: failed upgrade, unhelpful looping To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2083576/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2083603] Re: x11vnc server icon at top bar not working, not clickable
This seems unlikely to be the kernel. If you're running something other than gnome, maybe pick whatever your desktop environment is? ** Package changed: linux (Ubuntu) => gnome-shell (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2083603 Title: x11vnc server icon at top bar not working, not clickable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2083603/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2083638] [NEW] overnight crashes
Public bug reported: Hello, twice recently my 20.04 LTS laptop in a docking station was very unhappy after leaving it unattended overnight: - the external monitor did not wake from dpms sleep when pressing keys on either the external keyboard or the built-in keyboard - the built-in monitor did not wake from xrandr "off" state (I use this command to use only my external monitor within X11: xrandr --output DP-1-3 --auto --output eDP-1 --off) - nmap port scan could find the open ssh port on my network - connecting via ssh hangs long enough that I decided to force-power the laptop - nothing stands out in journalctl logs for the two boots in question, except it is a little strange that the last log entries appear to be within thirty seconds of the cron.daily run: $ journalctl -b-3 | tail -20 Sep 27 06:23:26 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 processes of 1 users. Sep 27 06:23:44 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:23:44 + src 46 (fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 2,36@1 3,27@0 3,29@0 3,30@0 Sep 27 06:23:45 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:23:45 + src 45 (fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 2,2@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0 Sep 27 06:24:15 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:24:15 + src 46 (fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 2,36@1 3,27@0 3,29@0 3,30@0 Sep 27 06:24:16 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:24:16 + src 45 (fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 2,2@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0 Sep 27 06:24:46 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:24:46 + src 46 (fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 2,36@1 3,27@0 3,29@0 3,30@0 Sep 27 06:24:47 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:24:47 + src 45 (fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 2,2@1 2,7@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0 Sep 27 06:24:47 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 processes of 1 users. Sep 27 06:24:47 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 processes of 1 users. Sep 27 06:25:01 millbarge audit[864607]: USER_ACCT pid=864607 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_permit acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success' Sep 27 06:25:01 millbarge audit[864607]: CRED_ACQ pid=864607 uid=0 auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_permit,pam_cap acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success' Sep 27 06:25:01 millbarge audit[864607]: SYSCALL arch=c03e syscall=1 success=yes exit=1 a0=7 a1=7fff051b2380 a2=1 a3=7f4ea1523371 items=0 ppid=2950 pid=864607 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=825 comm="cron" exe="/usr/sbin/cron" key=(null) Sep 27 06:25:01 millbarge audit: PROCTITLE proctitle=2F7573722F7362696E2F43524F4E002D66 Sep 27 06:25:02 millbarge CRON[864607]: pam_unix(cron:session): session opened for user root by (uid=0) Sep 27 06:25:01 millbarge audit[864607]: USER_START pid=864607 uid=0 auid=0 ses=825 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_env,pam_permit,pam_umask,pam_unix,pam_limits acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success' Sep 27 06:25:02 millbarge CRON[864608]: (root) CMD (test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )) Sep 27 06:25:17 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:25:17 + src 46 (fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,36@1 3,27@0 3,29@0 3,30@0 Sep 27 06:25:18 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:25:18 + src 45 (fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 2,2@1 2,7@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,21@0 6,22@0 Sep 27 06:25:19 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 processes of 1 users. Sep 27 06:25:19 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 processes of 1 users. $ journalctl -b-2 | tail -20 Oct 03 06:24:19 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 processes of 1 users. Oct 03 06:24:19 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 processes of 1 users. Oct 03 06:24:21 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 processes of 1 users. Oct 03 06:24:21 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 processes of
[Bug 2083625] [NEW] Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/nvme0n1' failed with exit code 1.
Public bug reported: Hello, I noticed a lot of these auto-import errors in my journalctl output after an upgrade to Ubuntu 24.04 LTS: [...] Oct 03 08:36:08 wopr systemd-udevd[937]: Using default interface naming scheme 'v255'. Oct 03 08:36:08 wopr systemd-journald[891]: Time spent on flushing to /var/log/journal/73a51a48edaf17749759c4d85701d9e3 is 79.467ms for 1784 entries. Oct 03 08:36:08 wopr systemd-journald[891]: System Journal (/var/log/journal/73a51a48edaf17749759c4d85701d9e3) is 3.5G, max 3.6G, 63.4M free. Oct 03 08:36:09 wopr systemd-journald[891]: Received client request to flush runtime journal. Oct 03 08:36:09 wopr systemd-journald[891]: /var/log/journal/73a51a48edaf17749759c4d85701d9e3/system.journal: Journal file uses a different sequence number ID, rotating. Oct 03 08:36:09 wopr systemd-journald[891]: Rotating system journal. Oct 03 08:36:09 wopr kernel: spl: loading out-of-tree module taints kernel. Oct 03 08:36:09 wopr kernel: IPMI message handler: version 39.2 Oct 03 08:36:08 wopr systemd[1]: Started systemd-udevd.service - Rule-based Manager for Device Events and Files. Oct 03 08:36:08 wopr systemd[1]: nvmefc-boot-connections.service - Auto-connect to subsystems on FC-NVME devices found during boot was skipped because of an unmet conditio> Oct 03 08:36:08 wopr systemd[1]: Reached target local-fs-pre.target - Preparation for Local File Systems. Oct 03 08:36:09 wopr systemd[1]: Finished systemd-udev-trigger.service - Coldplug All udev Devices. Oct 03 08:36:09 wopr (udev-worker)[1043]: nvme0n1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/nvme0n1' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[976]: sdo: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdo' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[987]: sdm: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1021]: sdb: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1040]: sdi: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdi' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1049]: sdh: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdh' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[969]: sdj: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdj' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1054]: sda: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1035]: sdc: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[983]: md127: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/md127' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1043]: nvme0n1p1: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/nvme0n1p1' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1020]: sdg: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdg' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1022]: sdp: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdp' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[991]: sdq: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdq' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1038]: nvme0n1p2: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/nvme0n1p2' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[986]: sdn: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdn' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[974]: sdk: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdk' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1057]: sdl: Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/sdl' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1057]: sdl: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[991]: sdq: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[986]: sdn: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[987]: sdm: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1020]: sdg: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1022]: sdp: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1021]: sdb: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[1035]: sdc: Process '/lib/udev/hdparm' failed with exit code 1. Oct 03 08:36:09 wopr (udev-worker)[974]: sdk: P
[Bug 2083576] [NEW] failed upgrade, unhelpful looping
Public bug reported: Hello, after correcting the ubuntu-minimal problem and wrong release in my sources caused by bug 2083575 I started over again, and got new errors, but unfortunately without useful error messages. Further unfortunately, what's left on the terminal is a partial view of the total mess. I saw the "=== ... command terminated ... ===" prompt several times, and tried to restore the window with 'r' a few times, and it ran through this same sequence of output each time, until I got tired of the game and hit 'x' to kill the screen session. Checking package manager Reading package lists... Done Building dependency tree... Done Reading state information... Done Get:1 file:/srv/mirror/ubuntu jammy InRelease [270 kB] Get:2 file:/srv/mirror/ubuntu jammy InRelease [270 kB] Get:3 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB] Get:4 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB] Get:5 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB] Get:6 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB] Hit http://security.ubuntu.com/ubuntu jammy-security InRelease Get:7 http://ddebs.ubuntu.com noble InRelease [41.3 kB] Get:8 https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease [7,532 B] Get:9 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB] Get:10 https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease [7,468 B] Hit http://ddebs.ubuntu.com noble-proposed InRelease Get:11 https://esm.ubuntu.com/infra/ubuntu noble-infra-security InRelease [7,462 B] Get:12 https://esm.ubuntu.com/infra/ubuntu noble-infra-updates InRelease [7,461 B] Fetched 113 kB in 0s (0 B/s) Reading package lists... Done Building dependency tree... Done Reading state information... Done Checking for installed snaps Calculating snap size requirements Updating repository information Third party sources disabled Some third party entries in your sources.list were disabled. You can re-enable them after the upgrade with the 'software-properties' tool or your package manager. To continue please press [ENTER] Get:1 http://security.ubuntu.com/ubuntu noble-security InRelease [126 kB] Get:2 http://ddebs.ubuntu.com noble InRelease [41.3 kB] Get:3 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB] Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease Hit http://ddebs.ubuntu.com noble-proposed InRelease Get:4 http://security.ubuntu.com/ubuntu noble-security/universe Sources [252 kB] Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease Hit https://esm.ubuntu.com/infra/ubuntu noble-infra-secur
[Bug 2083575] [NEW] failed upgrade left apt sources on wrong release
Public bug reported: Hello, I tried to upgrade a jammy machine to noble with do-release- upgrade and got a failure very early in the process. After the failure, my apt sources were left pointing to the new release, they weren't rolled back to the currently running release. These are the sources that the upgrader left for me: $ cat /etc/apt/sources.list # deb http://mirrors.kernel.org/ubuntu/ xenial main restricted # deb http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted # deb http://mirrors.kernel.org/ubuntu/ xenial universe # deb http://mirrors.kernel.org/ubuntu/ xenial-updates universe # deb http://mirrors.kernel.org/ubuntu/ xenial multiverse # deb http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse # deb-src http://mirrors.kernel.org/ubuntu/ xenial main restricted # deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted # deb-src http://mirrors.kernel.org/ubuntu/ xenial universe # deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates universe # deb-src http://mirrors.kernel.org/ubuntu/ xenial multiverse # deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse # deb file:///srv/mirror/ubuntu/ bionic main restricted # deb file:///srv/mirror/ubuntu/ bionic-updates main restricted # deb file:///srv/mirror/ubuntu/ bionic universe # deb file:///srv/mirror/ubuntu/ bionic-updates universe # deb file:///srv/mirror/ubuntu/ bionic multiverse # deb file:///srv/mirror/ubuntu/ bionic-updates multiverse # deb-src file:///srv/mirror/ubuntu/ bionic main restricted # deb-src file:///srv/mirror/ubuntu/ bionic-updates main restricted # deb-src file:///srv/mirror/ubuntu/ bionic universe # deb-src file:///srv/mirror/ubuntu/ bionic-updates universe # deb-src file:///srv/mirror/ubuntu/ bionic multiverse # deb-src file:///srv/mirror/ubuntu/ bionic-updates multiverse ## # deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 (20160325)]/ xenial main restricted ## ## #deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 (20160325)]/ xenial main restricted ## ## # See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to ## # newer versions of the distribution. ## deb http://us.archive.ubuntu.com/ubuntu/ xenial main restricted ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial main restricted ## ## ## Major bug fix updates produced after the final release of the ## ## distribution. ## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted ## ## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu ## ## team, and may not be under a free licence. Please satisfy yourself as to ## ## your rights to use the software. Also, please note that software in ## ## universe WILL NOT receive any review or updates from the Ubuntu security ## ## team. ## deb http://us.archive.ubuntu.com/ubuntu/ xenial universe ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial universe ## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe ## ## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu ## ## team, and may not be under a free licence. Please satisfy yourself as to ## ## your rights to use the software. Also, please note that software in ## ## multiverse WILL NOT receive any review or updates from the Ubuntu ## ## security team. ## deb http://us.archive.ubuntu.com/ubuntu/ xenial multiverse ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial multiverse ## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse ## ## ## N.B. software from this repository may not have been tested as ## ## extensively as that contained in the main release, although it includes ## ## newer versions of some applications which may provide useful features. ## ## Also, please note that software in backports WILL NOT receive any review ## ## or updates from the Ubuntu security team. ## deb http://us.archive.ubuntu.com/ubuntu/ xenial-backports main restricted universe multiverse ## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-backports main restricted universe multiverse ## ## ## Uncomment the following two lines to add software from Canonical's ## ## 'partner' repository. ## ## This software is not part of Ubuntu, but is offered by Canonical and the ## ## respective vendors as a service to Ubuntu users. deb http://security.ubuntu.com/ubuntu noble-security main restricted multiverse universe # deb file:///srv/mirror/ubuntu/ noble main restricted multiverse universe # disabled on upgrade to noble # deb file:///srv/mirror/ubuntu/ jammy-updates main restricted multiverse universe # disabled on upgrade to noble # deb file:///srv/mirror/ubuntu/ jammy-security main restricted multiverse universe # disabled on upgrade to noble deb-src http
[Bug 2083464] [NEW] error: invalid application of 'sizeof' to an incomplete type 'struct bpf_timer'
Public bug reported: I received multiple errors while trying to run tcptop-bpfcc: $ sudo tcptop-bpfcc [sudo] password for sarnold: In file included from :2: In file included from /virtual/include/bcc/bpf.h:12: In file included from include/linux/types.h:6: In file included from include/uapi/linux/types.h:14: In file included from include/uapi/linux/posix_types.h:5: In file included from include/linux/stddef.h:5: In file included from include/uapi/linux/stddef.h:5: In file included from include/linux/compiler_types.h:80: include/linux/compiler-clang.h:41:9: warning: '__HAVE_BUILTIN_BSWAP32__' macro redefined [-Wmacro-redefined] #define __HAVE_BUILTIN_BSWAP32__ ^ :4:9: note: previous definition is here #define __HAVE_BUILTIN_BSWAP32__ 1 ^ In file included from :2: In file included from /virtual/include/bcc/bpf.h:12: In file included from include/linux/types.h:6: In file included from include/uapi/linux/types.h:14: In file included from include/uapi/linux/posix_types.h:5: In file included from include/linux/stddef.h:5: In file included from include/uapi/linux/stddef.h:5: In file included from include/linux/compiler_types.h:80: include/linux/compiler-clang.h:42:9: warning: '__HAVE_BUILTIN_BSWAP64__' macro redefined [-Wmacro-redefined] #define __HAVE_BUILTIN_BSWAP64__ ^ :5:9: note: previous definition is here #define __HAVE_BUILTIN_BSWAP64__ 1 ^ In file included from :2: In file included from /virtual/include/bcc/bpf.h:12: In file included from include/linux/types.h:6: In file included from include/uapi/linux/types.h:14: In file included from include/uapi/linux/posix_types.h:5: In file included from include/linux/stddef.h:5: In file included from include/uapi/linux/stddef.h:5: In file included from include/linux/compiler_types.h:80: include/linux/compiler-clang.h:43:9: warning: '__HAVE_BUILTIN_BSWAP16__' macro redefined [-Wmacro-redefined] #define __HAVE_BUILTIN_BSWAP16__ ^ :3:9: note: previous definition is here #define __HAVE_BUILTIN_BSWAP16__ 1 ^ In file included from /virtual/main.c:15: In file included from include/net/sock.h:46: In file included from include/linux/netdevice.h:41: In file included from include/net/netprio_cgroup.h:11: In file included from include/linux/cgroup.h:28: In file included from include/linux/cgroup-defs.h:22: In file included from include/linux/bpf-cgroup.h:5: include/linux/bpf.h:220:35: error: invalid application of 'sizeof' to an incomplete type 'struct bpf_timer' memset(dst + map->timer_off, 0, sizeof(struct bpf_timer)); ^ ~~ include/linux/bpf.h:220:49: note: forward declaration of 'struct bpf_timer' memset(dst + map->timer_off, 0, sizeof(struct bpf_timer)); ^ include/linux/bpf.h:234:10: error: invalid application of 'sizeof' to an incomplete type 'struct bpf_timer' t_sz = sizeof(struct bpf_timer); ^ ~~ include/linux/bpf.h:234:24: note: forward declaration of 'struct bpf_timer' t_sz = sizeof(struct bpf_timer); ^ include/linux/bpf.h:548:26: error: use of undeclared identifier 'BPF_PSEUDO_FUNC' insn->src_reg == BPF_PSEUDO_FUNC; ^ In file included from /virtual/main.c:15: In file included from include/net/sock.h:59: include/linux/filter.h:1520:44: error: use of undeclared identifier 'BPF_F_BROADCAST'; did you mean 'IFF_BROADCAST'? if (unlikely(!ri->tgt_value) && !(flags & BPF_F_BROADCAST)) { ^~~ IFF_BROADCAST include/uapi/linux/if.h:86:2: note: 'IFF_BROADCAST' declared here IFF_BROADCAST = 1<<1, /* volatile */ ^ In file included from /virtual/main.c:15: In file included from include/net/sock.h:59: include/linux/filter.h:1535:14: error: use of undeclared identifier 'BPF_F_BROADCAST'; did you mean 'IFF_BROADCAST'? if (flags & BPF_F_BROADCAST) { ^~~ IFF_BROADCAST include/uapi/linux/if.h:86:2: note: 'IFF_BROADCAST' declared here IFF_BROADCAST = 1<<1, /* volatile */ ^ 3 warnings and 5 errors generated. Traceback (most recent call last): File "/usr/sbin/tcptop-bpfcc", line 225, in b = BPF(text=bpf_text) File "/usr/lib/python3/dist-packages/bcc/__init__.py", line 364, in __init__ raise Exception("Failed to compile BPF module %s" % (src_file or "")) Exception: Failed to compile BPF module ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: bpfcc-tools 0.18.0+ds-2 ProcVersionSignature: Ubuntu 5.15.0-113.123-generic 5.15.152 Uname: Linux 5.15.0-113-generic x86_64 NonfreeKernelModules: lkp_Ubuntu_5_15_0_113_123_generic_106 zfs zunicode zavl icp zcommon zn
[Bug 2058192] Re: [MIR] lenovo-wwan-unlock
At today's MIR team meeting, we weren't entirely sure what the next steps for this package should be, and we ran out of time to try to find a resolution. So I'll ask here -- what is the next step? I see comment #5 had required and recommended todos. Comment #7 said that some issues had been fixed in a given tagged release, but not a list of what specifically had been fixed, and how. Comment #16 demonstrated the risks of changes to software that we can't see -- and comment #17 included a mangled diff that doesn't quite show what was added, removed, or context, but suggests that something was done. 2.1.2 was tagged on August 15, the missing AppArmor rules were found September 27, and fixed September 29. This is fine pre-release, we've all got things to do, but post-release it would be troubling. So I feel I should ask about it now, will these be found sooner over the next twelve to twenty years? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058192 Title: [MIR] lenovo-wwan-unlock To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2058192] Re: [MIR] lenovo-wwan-unlock
Marking this incomplete so that it'll show up in next week's MIR team meeting. In the meantime, let's try to find out who would know more about the OEM archive and OEM process to see if this an appropriate outcome for this package. Thanks ** Changed in: lenovo-wwan-unlock (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2058192 Title: [MIR] lenovo-wwan-unlock To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2077576] Re: SSH client doesn't handle properly non-ASCII chars
This change makes me uneasy: - I see no terminal-aware filtering applied in the notify_start() -> xvasprintf() -> writemsg() -> write() path. The remote server may not be entirely untrusted but it's also not exactly trusted, either, especially on the first use. There's a long and glorious history of surprising outcomes due to terminal escape sequences https://www.cyberark.com/resources/threat-research-blog/dont-trust-this- title-abusing-terminal-emulators-with-ansi-escape-characters - I'm not sure it's even necessary: my phone was easily able to read pure-ascii QR codes as easily as the (admittedly much better looking) utf-8 based codes. Try a few: sudo apt install qrencode u=`cat /proc/sys/kernel/random/uuid` ; for t in ANSI ANSI256 ASCII ASCIIi UTF8 ANSIUTF8 ; do qrencode -t $t $u ; done ; echo $u ; unset u Are ascii-encoded qr codes known to be insufficient? - As for the actual code changes, they seemed fairly straightforward, and I found no issues. I'm very wary about undoing a safety mechanism from the past, put in place by people who thought about this significantly more than I have. - Upstream might have been engaging for a while but now appears entirely silent. This reminds me too much of dpkg+zstd, where a similar train of engagement lead to Ubuntu forking the dpkg ecosystem and carrying a patch without a clear way to reunify the ecosystem. Will we do the same to OpenSSH? (We might have already passed this point if we chose to ship this in Noble rather than wait for Oracular to test this out.) Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2077576 Title: SSH client doesn't handle properly non-ASCII chars To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2077576/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072621] Re: [MIR] rpds-py
** Tags added: sec-4902 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072621 Title: [MIR] rpds-py To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/rpds-py/+bug/2072621/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073783] Re: [MIR] exfatprogs
** Tags added: sec-4903 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073783 Title: [MIR] exfatprogs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/exfatprogs/+bug/2073783/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074086] Re: MIR libimobiledevice-glue
There's embedded copies of sha1, sha256, sha512 in the upstream package: https://github.com/libimobiledevice/libimobiledevice- glue/tree/master/src I haven't yet looked at our version of the package. The libimobiledevice library is licensed LGPL; the libtomcrypt code has been placed in the public domain. I'm sure our certifications team would much prefer if this could be switched to use OpenSSL instead so that we can rely upon an already- certified cryptography implementation. What would it look like to switch this package to relying upon some already-certified cryptography? (Upstream may or may not want to link against OpenSSL, not everyone is prepared to treat it as a "system library". They may also not wish to use the OpenSSL APIs, not everyone is prepared to like those.) Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074086 Title: MIR libimobiledevice-glue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libimobiledevice-glue/+bug/2074086/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073783] Re: [MIR] exfatprogs
Filesystems, especially new ones, are a frequent source of problems due to poor parsing. Do you know if exfatprogs already has some fuzzing integration with eg ossfuzz or run during the build or by the authors? If not, could you suggest it to the authors? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073783 Title: [MIR] exfatprogs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/exfatprogs/+bug/2073783/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074086] Re: MIR libimobiledevice-glue
** Tags added: sec-4836 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074086 Title: MIR libimobiledevice-glue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libimobiledevice-glue/+bug/2074086/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070882] Re: [MIR] jpeg-xl
** Tags added: sec-4835 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070882 Title: [MIR] jpeg-xl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/jpeg-xl/+bug/2070882/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2075542] Re: bind9 1:9.18.28-0ubuntu0.20.04.1 breakes local system
Manus, I believe you've got a different issue: libuv1 version 1.44.2 does not exist in a currently supported release of Ubuntu. Ubuntu 20.04 LTS is still on 1.34.2-ish versions: $ rmadison libuv1 | grep 1.44.2 $ rmadison libuv1 | grep focal libuv1 | 1.34.2-1ubuntu1 | focal | source, amd64, arm64, armhf, i386, ppc64el, riscv64, s390x libuv1 | 1.34.2-1ubuntu1.5 | focal-security | source, amd64, arm64, armhf, i386, ppc64el, riscv64, s390x libuv1 | 1.34.2-1ubuntu1.5 | focal-updates | source, amd64, arm64, armhf, i386, ppc64el, riscv64, s390x If you're still on Kinetic, Lunar, or Mantic, I strongly recommend upgrading to a supported release. Upgrading after releases have hit their end of life can be a challenge, this wiki page may be useful to you: https://help.ubuntu.com/community/EOLUpgrades Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2075542 Title: bind9 1:9.18.28-0ubuntu0.20.04.1 breakes local system To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/2075542/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2075118] Re: PNG images in .deb don't match md5sums file or local build
Stephen, thanks for the excellent bug report. I don't know Debian packaging well enough to point to the exact error in the build rules, but this is the order of operations described in the build log: https://launchpadlibrarian.net/593502889/buildlog_ubuntu-jammy- amd64.sunpy_3.1.5-1_BUILDING.txt.gz ... dh_gencontrol -O--buildsystem=pybuild dpkg-gencontrol: warning: package python3-sunpy: substitution variable ${python3:Provides} unused, but is defined dpkg-gencontrol: warning: package python3-sunpy: substitution variable ${python3:Versions} unused, but is defined dpkg-gencontrol: warning: package python3-sunpy: substitution variable ${python3:Provides} unused, but is defined dpkg-gencontrol: warning: package python3-sunpy: substitution variable ${python3:Versions} unused, but is defined dh_md5sums -O--buildsystem=pybuild dh_builddeb -O--buildsystem=pybuild INFO: pkgstriptranslations version 149 INFO: pkgstriptranslations version 149 pkgstriptranslations: processing python3-sunpy (in debian/python3-sunpy); do_strip: , oemstrip: pkgstriptranslations: processing python3-sunpy-dbgsym (in debian/.debhelper/python3-sunpy/dbgsym-root); do_strip: , oemstrip: pkgmaintainermangler: Maintainer field overridden to "Ubuntu Developers " pkgstripfiles: processing control file: debian/python3-sunpy/DEBIAN/control, package python3-sunpy, directory debian/python3-sunpy pkgstripfiles: Truncating usr/share/doc/python3-sunpy/changelog.Debian.gz to topmost ten records pkgstripfiles: Running PNG optimization (using 4 cpus) for package python3-sunpy ... xargs: warning: options --max-lines and --replace/-I/-i are mutually exclusive, ignoring previous --max-lines value oopkgmaintainermangler: Maintainer field overridden to "Ubuntu Developers " pkgstripfiles: processing control file: debian/.debhelper/python3-sunpy/dbgsym-root/DEBIAN/control, package python3-sunpy-dbgsym, directory debian/.debhelper/python3-sunpy/dbgsym-root dpkg-deb: building package 'python3-sunpy-dbgsym' in 'debian/.debhelper/scratch-space/build-python3-sunpy/python3-sunpy-dbgsym_3.1.5-1_amd64.deb'. Renaming python3-sunpy-dbgsym_3.1.5-1_amd64.deb to python3-sunpy-dbgsym_3.1.5-1_amd64.ddeb oo pkgstripfiles: PNG optimization (4/0) for package python3-sunpy took 6 s dpkg-deb: building package 'python3-sunpy' in '../python3-sunpy_3.1.5-1_amd64.deb'. ... Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2075118 Title: PNG images in .deb don't match md5sums file or local build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sunpy/+bug/2075118/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2075118] Re: PNG images in .deb don't match md5sums file or local build
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2075118 Title: PNG images in .deb don't match md5sums file or local build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sunpy/+bug/2075118/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073895] Re: [MIR] isa-support
There's a typo in the package description: > x86-64 architecture, corresponding to x86-65 psABI v1. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073895 Title: [MIR] isa-support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isa-support/+bug/2073895/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074110] Re: Trying to resolve NordVpn configuration issues
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074110 Title: Trying to resolve NordVpn configuration issues To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2074110/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2074104] Re: package sgml-base 1.31 failed to install/upgrade: paleidikliai vykdomi ciklu, palikta
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Attachment removed: "Dmesg.txt" https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2074104/+attachment/5800295/+files/Dmesg.txt ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2074104 Title: package sgml-base 1.31 failed to install/upgrade: paleidikliai vykdomi ciklu, palikta To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2074104/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073974] Re: package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to install/upgrade: problemas de dependencias - se deja sin configurar
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073974 Title: package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to install/upgrade: problemas de dependencias - se deja sin configurar To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/2073974/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073735] Re: emacs-lucid (1:29.3+1-1ubuntu2) font-selection Ubuntu needs to be restarted
Hello Uwe, thanks for the bug report. On a first look this doesn't feel like a security issue, it can probably be addressed by (a) removing fonts (b) adding memory (c) limiting the memory available to the process / user and thus preventing the user from causing problems. Does this allow crossing security boundaries? Thanks ** Information type changed from Private Security to Public Security ** Changed in: emacs (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073735 Title: emacs-lucid (1:29.3+1-1ubuntu2) font-selection Ubuntu needs to be restarted To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/emacs/+bug/2073735/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073033] Re: request to /storage/v2/edit_partition crashed with Exception | I like specifc byte count with files in Gnome It is no longer available I use them for comparison Only GB & MB are avai
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073033 Title: request to /storage/v2/edit_partition crashed with Exception | I like specifc byte count with files in Gnome It is no longer available I use them for comparison Only GB & MB are available in this version of Gnome To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/2073033/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070807] Re: [MIR] highway
** Tags added: sec-4768 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070807 Title: [MIR] highway To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/highway/+bug/2070807/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073637] Re: Screen locking issue
Thanks, Mani. You're right, the photo is hard to see what's going on, but it does show that something is visible when probably nothing should be visible. Thanks ** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu) ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073637 Title: Screen locking issue To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2073637/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073167] Re: No puedo instalar
Hello, I think these lines in your logs mean that your system BIOS is configured to prevent changing the boot environment. Look for "antivirus" or "boot protection" in your BIOS. Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: No se puede establecer la variable de EFI Boot0003. Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: efivarfs_set_variable: writing to fd 8 failed: Argumento inválido. Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: _efi_set_variable_mode: ops->set_variable() failed: Argumento inválido. Jul 15 20:59:06 ubuntu grub-installer: grub-install: error: no se pudo registrar la entrada de arranque de EFI: Argumento inválido. Thanks ** Information type changed from Private Security to Public ** Changed in: grub-installer (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073167 Title: No puedo instalar To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/2073167/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073016] Re: lock screen leaves left dock exposed and clickable
Hello Carlos. thanks for the report; if you've installed any gnome extensions yourself, I'd suggest to remove them all as a first debugging step. They are apparently very easy to screw up. If the problem goes away, try bisecting your extensions to find out which one or combination leads to the problem. Thanks ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073016 Title: lock screen leaves left dock exposed and clickable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2073016/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072917] Re: when installing ubuntu
Thank you for taking the time to report this bug and helping to make Ubuntu better. Reviewing your dmesg attachment to this bug report it seems that there may be a problem with your hardware. I'd recommend performing a back up and then investigating the situation. Measures you might take include checking cable connections and using software tools to investigate the health of your hardware. In the event that is is not in fact an error with your hardware please set the bug's status back to New. Thanks and good luck! ** Information type changed from Private Security to Public ** Changed in: ubiquity (Ubuntu) Status: New => Invalid ** Changed in: ubiquity (Ubuntu) Importance: Undecided => Low ** Tags added: hardware-error -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072917 Title: when installing ubuntu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2072917/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073000] Re: many vulnerabilities on ubuntu20 package linux-image-aws - 5.15.0.1063.69
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2073000 Title: many vulnerabilities on ubuntu20 package linux-image-aws - 5.15.0.1063.69 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws-5.15/+bug/2073000/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2072406] Re: subtile flaw in kernel packet filter nftables
Thanks for the link to the upstream bug. I'll mirror their "wontfix" here, as we're unlikely to invest the resources to invent new functionality for the firewall that differs from upstream's choices. ** Changed in: linux (Ubuntu) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072406 Title: subtile flaw in kernel packet filter nftables To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2072406/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071631] Re: [81DE, Realtek ALC236, Mic, Internal] No sound at all
*** This bug is a duplicate of bug 2071633 *** https://bugs.launchpad.net/bugs/2071633 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071631 Title: [81DE, Realtek ALC236, Mic, Internal] No sound at all To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/2071631/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2073269] Re: Replace radsecret script to avoid new perl dependencies from universe
Of these three, I prefer the shell. (I know, I'm as surprised as you.) Please use this version, unless there's a compelling reason to prefer Python: #!/bin/bash data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z') echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${data:16:4} Why I prefer the shell version, and an important change I made to it: The shell script executes in roughly 20% the time of the python scripts. (4s vs 22s for 1000 iterations.) We should be selecting 13 bytes, not 12, from /dev/urandom. (I'll show why near the end.) The very long python script has an unexpected behavior, so if this is the version that is selected, it needs the same .rstrip('=') treatment as the short one: $ ./uuid1.py 376y-fuyc-d5a7-6sjz-uhwa- When playing with the shell script I thought I noticed patterns in the last character of the output so I investigated further to make sure that these are actually emitting roughly what we expect: $ for i in `seq 1 1`; do ./uuid ; done | ent -c Value Char Occurrences Fraction 101 0.04 45 -4 0.16 50 2 6056 0.024224 51 3 5860 0.023440 52 4 5946 0.023784 53 5 6102 0.024408 54 6 5951 0.023804 55 7 5731 0.022924 97 a10761 0.043044 98 b 5887 0.023548 99 c 5847 0.023388 100 d 5938 0.023752 101 e 5929 0.023716 102 f 5936 0.023744 103 g 5922 0.023688 104 h 5934 0.023736 105 i 5940 0.023760 106 j 5834 0.023336 107 k 5997 0.023988 108 l 6005 0.024020 109 m 5940 0.023760 110 n 6026 0.024104 111 o 6081 0.024324 112 p 5909 0.023636 113 q10947 0.043788 114 r 5918 0.023672 115 s 5892 0.023568 116 t 5908 0.023632 117 u 6033 0.024132 118 v 5912 0.023648 119 w 5934 0.023736 120 x 6067 0.024268 121 y 5892 0.023568 122 z 5965 0.023860 Total:25 1.00 $ for i in `seq 1 1`; do ./uuid1.py ; done | ent -c Value Char Occurrences Fraction 101 0.03 45 -5 0.17 50 2 5953 0.019843 51 3 5972 0.019907 52 4 5893 0.019643 53 5 5943 0.019810 54 6 5940 0.019800 55 7 5770 0.019233 61 =4 0.13 # 97 a10872 0.036240 98 b 6011 0.020037 99 c 5957 0.019857 100 d 5879 0.019597 101 e 5840 0.019467 102 f 5888 0.019627 103 g 5890 0.019633 104 h 5827 0.019423 105 i 5979 0.019930 106 j 5921 0.019737 107 k 5987 0.019957 108 l 5953 0.019843 109 m 6083 0.020277 110 n 5886 0.019620 111 o 6054 0.020180 112 p 5856 0.019520 113 q10923 0.036410 114 r 6013 0.020043 115 s 5894 0.019647 116 t 6021 0.020070 117 u 6038 0.020127 118 v 5859 0.019530 119 w 5928 0.019760 120 x 6000 0.02 121 y 5939 0.019797 122 z 6031 0.020103 Total:30 1.00 $ for i in `seq 1 1`; do ./uuid2.py ; done | ent -c Value Char Occurrences Fraction 101 0.04 45 -4 0.16 50 2 5967 0.023868 51 3 5954 0.023816 52 4 5864 0.023456 53 5 5849 0.023396 54 6 5967 0.023868 55 7 5985 0.023940 97 a11095 0.044380 98 b 5892 0.023568 99 c 5963 0.023852 100 d 5847 0.023388 101 e 5909 0.023636 102 f 5939 0.023756 103 g 5893 0.023572 104 h 5938 0.023752 105 i 6000 0.024000 106 j 6019 0.024076 107 k 5887 0.023548 108 l 5947 0.023788 109 m 5935 0.023740 110 n 5965 0.023860 111 o 6186 0.024744 112 p 5999 0.023996 113 q10918 0.043672 114 r 5966 0.023864 115 s 5755 0.023020 116 t 5820 0.023280 117 u 5935 0.023740 118 v 5858 0.023432 119 w 5881 0.023524 120 x 5997 0.023988 121 y 6039 0.024156 122 z 5831 0.023324 Total:25 1.00 The output is far more balanced if we select 13 bytes, instead of 12: $ cat uuid13 #!/bin/bash data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z') echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${data:16:4} $ for i in `seq 1 1`; do ./uuid13 ; done | ent -c Value Char Occurrences Fraction 10100
[Bug 2072406] Re: subtile flaw in kernel packet filter nftables
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072406 Title: subtile flaw in kernel packet filter nftables To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2072406/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071815] Re: Investigate ASLR re-randomization being disabled for children
These might be related and might help the underlying problem: https://github.com/openssh/openssh-portable/commit/8785491123d4d722b310c20f383570be758f8263 https://github.com/openssh/openssh-portable/commit/c0cb3b8c837761816a60a3cdb54062668df09652 Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071815 Title: Investigate ASLR re-randomization being disabled for children To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2071815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1999345] Re: please add luks2 module to the signed grub2 images
.. It turns out that this was a bad experience all around: https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2043101 Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1999345 Title: please add luks2 module to the signed grub2 images To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1999345/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071493]
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures ** Tags added: community-security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071493 Title: UPnP should be turned off by default on focal & jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qbittorrent/+bug/2071493/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2071493] Re: UPnP should be turned off by default on focal & jammy
Thanks for the report; what's the consequences of that configuration change? I'm guessing that it would remove the qbittorrent administrative interface from the public IP address of the UPnP router, with no way to re-enable it. Is that correct? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2071493 Title: UPnP should be turned off by default on focal & jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qbittorrent/+bug/2071493/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070387] Re: python3: installed python3 package post-installation script subprocess returned error exit status 4
Hello Solaris, there's not much here to work with; please run apport- collect 2070387 to attach some logs and package statuses to inspect. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070387 Title: python3: installed python3 package post-installation script subprocess returned error exit status 4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/2070387/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070387] Re: python3: installed python3 package post-installation script subprocess returned error exit status 4
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070387 Title: python3: installed python3 package post-installation script subprocess returned error exit status 4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/2070387/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069308] Re: MIR xdg-terminal-exec
** Tags added: sec-4642 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069308 Title: MIR xdg-terminal-exec To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xdg-terminal-exec/+bug/2069308/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2070025] Re: [MIR] wsdd
** Tags added: sec-4626 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2070025 Title: [MIR] wsdd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wsdd/+bug/2070025/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1991859] Re: pro attach does not cope well with squid-deb-proxy ACLs
Awesome, thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1991859 Title: pro attach does not cope well with squid-deb-proxy ACLs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1991859/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069774] Re: package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed to install/upgrade: il sottoprocesso installato pacchetto linux-modules-nvidia-535-6.8.0-35-generic script post-i
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069774 Title: package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed to install/upgrade: il sottoprocesso installato pacchetto linux- modules-nvidia-535-6.8.0-35-generic script post-installation ha restituito lo stato di errore 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-restricted-modules/+bug/2069774/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069499] Re: ubuntu install failed
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069499 Title: ubuntu install failed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2069499/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069523] Re: package click 0.5.2-2ubuntu4 failed to install/upgrade: installed click package post-installation script subprocess returned error exit status 1
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069523 Title: package click 0.5.2-2ubuntu4 failed to install/upgrade: installed click package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/click/+bug/2069523/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069308] Re: MIR xdg-terminal-exec
I'm curious if a config change in xdg-utils is all that's needed to get something similar: $ locate xdg-terminal x/xdg-utils /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1.16.04.5/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1.16.04.5/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2.5/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2.5/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1.20.04.2/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1.20.04.2/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu1/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu1/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3/scripts/desc/xdg-terminal.xml /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3~22.04.1/scripts/xdg-terminal.in /newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3~22.04.1/scripts/desc/xdg-terminal.xml Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069308 Title: MIR xdg-terminal-exec To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xdg-terminal-exec/+bug/2069308/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2066999] Re: enable hibernation on ARM
** Tags removed: verification-needed-focal verification-needed-jammy verification-needed-mantic verification-needed-noble ** Tags added: verification-done-focal verification-done-jammy verification-done-mantic verification-needed-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2066999 Title: enable hibernation on ARM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-hibinit-agent/+bug/2066999/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2066999] Re: enable hibernation on ARM
Testing details: Batch tested on Jammy, manually tested on all other OS. On Jammy batch tests, achieved 99% hibernate/resume success rate, failures unrelated to the Hibernate agent. High level batch testing details: 1.) Run M6g Instance. 2.) Connect to the instance and install the kernel from jammy proposed and the hibinit agent from jammy proposed. (the kernel is required to support hibernation - https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2060992) 3.) Reboot instance and create an AMI from the instance. 4.) Use the created AMI in all remaining steps 5.) Run Instance 6.) Run script on instance to emit timestamped "heartbeat" to dynamoDB table 7.) Hibernate instance 8.) Resume instance 9.) Confirm "heartbeat" is emitted with a new timestamp after resume 10.) Repeat 8-10 once more. Manually testing details: 1.) Run M6g Instance. 2.) Connect to the instance and install the kernel from (focal/mantic/noble) proposed and the hibinit agent from (focal/mantic/noble) proposed. (the kernel is required to support hibernation - https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2060992) 3.) Reboot instance and confirm updated kernel is running. 4.) Run bash script to write timestamp to a text file every second #!/bin/bash while : do echo $(date) > text.txt sleep 1 done 5.) Hibernate instance 6.) Resume instance 7.) Confirm timestamp is being written to text file with a new timestamp after resume 8.) Repeat 5-8 once more. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2066999 Title: enable hibernation on ARM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-hibinit-agent/+bug/2066999/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069464] Re: On Ubuntu 24.04 installed auditd=1:3.1.2-2.1build1, The audit log starts printing on the console the error of audit: error in audit_log_object_context when deactivate apparmor and ac
SELinux and AppArmor both do pretty significant configuration during early boot, I can't imagine that live switching between the two at runtime is going to be well supported by anything. If you intend to replace AppArmor with SELinux, you should do that via the kernel command line flags so that the early configuration is correct. I think it would be something like lsm=selinux,capability,yama depending upon which modules you want to load and in which order they need to load. Thanks ** Changed in: audit (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069464 Title: On Ubuntu 24.04 installed auditd=1:3.1.2-2.1build1, The audit log starts printing on the console the error of audit: error in audit_log_object_context when deactivate apparmor and activate selinux To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/audit/+bug/2069464/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069394] Re: package openssh-server 1:8.9p1-3ubuntu0.7 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 10
I suspect that you've got a local problem with this configuration file, try reinstalling openssh-server but with some flags to force replacing the missing and changed configuration files: sudo apt-get --yes reinstall -o Dpkg::Options::="--force-confnew" -o Dpkg::Options::="--force-confmiss openssh-server Incidentally your mongodb is very unhappy, there's 171 instances of errors like this in your logs: [571662.165758] traps: mongod[2882116] trap invalid opcode ip:65329d429c0a sp:7fff9b7a3900 error:0 in mongod[653299318000+527e000] Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069394 Title: package openssh-server 1:8.9p1-3ubuntu0.7 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2069394/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060676] Re: login: remove pam_lastlog.so from config
Andrei, try to log in via multiple methods. Every service (ssh, login, gdm, xdm, etc) has its own PAM configuration and some of them may reference this module and some may not. Once you've logged in, edit the files in /etc/pam.d/ that reference this module. Remove or comment them out. Save, then test. Don't quit any root shells in the process of testing, because changing PAM configuration can lock you out of your system -- as you've discovered. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060676 Title: login: remove pam_lastlog.so from config To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/2060676/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069300] Re: Xorg crash
These nvidia drivers look really unhappy, the first trace: [ 11.997286] [ cut here ] [ 11.997290] UBSAN: array-index-out-of-bounds in build/nvidia/535.171.04/build/nvidia-uvm/uvm_pmm_gpu.c:2364:28 [ 11.997293] index 0 is out of range for type 'uvm_gpu_chunk_t *[*]' [ 11.997296] CPU: 15 PID: 2599 Comm: ollama Tainted: P O 6.8.0-35-generic #35-Ubuntu [ 11.997298] Hardware name: HP Victus by HP Gaming Laptop 16-s0xxx/8BD5, BIOS F.20 03/20/2024 [ 11.997300] Call Trace: [ 11.997301] [ 11.997305] dump_stack_lvl+0x48/0x70 [ 11.997313] dump_stack+0x10/0x20 [ 11.997315] __ubsan_handle_out_of_bounds+0xc6/0x110 [ 11.997320] split_gpu_chunk+0x13f/0x410 [nvidia_uvm] [ 11.997346] uvm_pmm_gpu_alloc+0x2da/0x6d0 [nvidia_uvm] [ 11.997366] phys_mem_allocate+0xac/0x230 [nvidia_uvm] [ 11.997389] allocate_directory+0xb4/0x130 [nvidia_uvm] [ 11.997405] ? allocate_directory+0xb4/0x130 [nvidia_uvm] [ 11.997422] uvm_page_tree_init+0x133/0x450 [nvidia_uvm] [ 11.997442] uvm_gpu_retain_by_uuid+0x19df/0x2b80 [nvidia_uvm] [ 11.997461] ? __mod_memcg_lruvec_state+0xd6/0x1a0 [ 11.997468] uvm_va_space_register_gpu+0x47/0x740 [nvidia_uvm] [ 11.997486] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997489] ? bdev_getblk+0x53/0x90 [ 11.997493] uvm_api_register_gpu+0x5a/0x90 [nvidia_uvm] [ 11.997510] uvm_ioctl+0x1a26/0x1cd0 [nvidia_uvm] [ 11.997526] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997528] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997530] ? xas_find+0x74/0x1e0 [ 11.997533] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997535] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997537] ? next_uptodate_folio+0xa9/0x320 [ 11.997541] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997542] ? _raw_spin_lock_irqsave+0xe/0x20 [ 11.997546] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997548] ? thread_context_non_interrupt_add+0x13a/0x250 [nvidia_uvm] [ 11.997568] uvm_unlocked_ioctl_entry.part.0+0x7b/0xf0 [nvidia_uvm] [ 11.997584] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997586] ? do_read_fault+0x112/0x1d0 [ 11.997589] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997591] ? do_fault+0x109/0x350 [ 11.997592] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997595] uvm_unlocked_ioctl_entry+0x6b/0x90 [nvidia_uvm] [ 11.997610] __x64_sys_ioctl+0xa0/0xf0 [ 11.997613] x64_sys_call+0x143b/0x25c0 [ 11.997616] do_syscall_64+0x7f/0x180 [ 11.997619] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997621] ? __count_memcg_events+0x6b/0x120 [ 11.997624] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997625] ? count_memcg_events.constprop.0+0x2a/0x50 [ 11.997628] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997630] ? handle_mm_fault+0xad/0x380 [ 11.997633] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997634] ? do_user_addr_fault+0x338/0x6b0 [ 11.997637] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997639] ? irqentry_exit_to_user_mode+0x7b/0x260 [ 11.997641] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997643] ? irqentry_exit+0x43/0x50 [ 11.997644] ? srso_alias_return_thunk+0x5/0xfbef5 [ 11.997646] ? exc_page_fault+0x94/0x1b0 [ 11.997648] entry_SYSCALL_64_after_hwframe+0x78/0x80 [ 11.997650] RIP: 0033:0x78462c924ded [ 11.997672] Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 [ 11.997674] RSP: 002b:7845dcbff4a0 EFLAGS: 0246 ORIG_RAX: 0010 [ 11.997676] RAX: ffda RBX: 7845bbd00860 RCX: 78462c924ded [ 11.997678] RDX: 7845dcbff540 RSI: 0025 RDI: 0008 [ 11.997679] RBP: 7845dcbff4f0 R08: 7845bbd008f0 R09: [ 11.997680] R10: 78462c80d630 R11: 0246 R12: 7845b003b8b6 [ 11.997681] R13: 7845bbd008f0 R14: 7845dcbff540 R15: 0008 [ 11.997684] [ 11.997692] ---[ end trace ]--- ** Also affects: nvidia-graphics-drivers-535 (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2069300 Title: Xorg crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2069300/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2069086] Re: package golang-github-googlecloudplatform-guest-logging-go-dev (not installed) failed to install/upgrade: intentando sobreescribir `/usr/share/gocode/src/github.com/GoogleCloudPlatfo
There's at least two errors here: - the title describes two packages that own the same file, these should both be fixed - the dpkg terminal log looks a bit like a full filesystem: Setting up apache2-bin (2.4.41-4ubuntu3.14) ... Setting up mysql-server (8.0.33-0ubuntu0.20.04.2) ... Setting up libapache2-mod-php7.4 (7.4.3-4ubuntu2.18) ... Package apache2 is not configured yet. Will defer actions by package libapache2-mod-php7.4. Creating config file /etc/php/7.4/apache2/php.ini with new version No module matches Setting up apache2 (2.4.41-4ubuntu3.14) ... Enabling module mpm_event. Enabling module authz_core. Enabling module authz_host. Enabling module authn_core. Enabling module auth_basic. Enabling module access_compat. Enabling module authn_file. Enabling module authz_user. Enabling module alias. Enabling module dir. Enabling module autoindex. Enabling module env. Enabling module mime. Enabling module negotiation. Enabling module setenvif. Enabling module filter. Enabling module deflate. Enabling module status. Enabling module reqtimeout. Enabling conf charset. Enabling conf localized-error-pages. Enabling conf other-vhosts-access-log. Enabling conf security. Enabling conf serve-cgi-bin. Enabling site 000-default. info: Switch to mpm prefork for package libapache2-mod-php7.4 Module mpm_event disabled. Enabling module mpm_prefork. info: Executing deferred 'a2enmod php7.4' for package libapache2-mod-php7.4 Enabling module php7.4. Created symlink /etc/systemd/system/multi-user.target.wants/apache2.service → /lib/systemd/system/apache2.service. Created symlink /etc/systemd/system/multi-user.target.wants/apache-htcacheclean.service → /lib/systemd/system/apache-htcacheclean.service. Setting up php7.4 (7.4.3-4ubuntu2.18) ... Setting up libapache2-mod-php (2:7.4+75) ... Setting up php (2:7.4+75) ... Processing triggers for ufw (0.36-6ubuntu1) ... Processing triggers for systemd (245.4-4ubuntu3.22) ... Processing triggers for man-db (2.9.1-1) ... Processing triggers for libc-bin (2.31-0ubuntu9.9) ... Processing triggers for linux-image-5.15.0-75-generic (5.15.0-75.82~20.04.1) ... /etc/kernel/postinst.d/initramfs-tools: update-initramfs: Generating /boot/initrd.img-5.15.0-75-generic I: The initramfs will attempt to resume from /dev/sda2 I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38) I: Set the RESUME variable to override this. Error 24 : Write error : cannot write compressed block E: mkinitramfs failure cpio 141 lz4 -9 -l 24 update-initramfs: failed for /boot/initrd.img-5.15.0-75-generic with 1. run-parts: /etc/kernel/postinst.d/initramfs-tools exited with return code 1 dpkg: error processing package linux-image-5.15.0-75-generic (--configure): installed linux-image-5.15.0-75-generic package post-installation script subprocess returned error exit status 1 Processing triggers for initramfs-tools (0.136ubuntu6.7) ... update-initramfs: Generating /boot/initrd.img-5.15.0-72-generic I: The initramfs will attempt to resume from /dev/sda2 I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38) I: Set the RESUME variable to override this. Error 24 : Write error : cannot write compressed block E: mkinitramfs failure cpio 141 lz4 -9 -l 24 update-initramfs: failed for /boot/initrd.img-5.15.0-72-generic with 1. dpkg: error processing package initramfs-tools (--configure): installed initramfs-tools package post-installation script subprocess returned error exit status 1 Processing triggers for php7.4-cli (7.4.3-4ubuntu2.18) ... Processing triggers for libapache2-mod-php7.4 (7.4.3-4ubuntu2.18) ... Errors were encountered while processing: linux-firmware linux-image-generic-hwe-20.04 linux-generic-hwe-20.04 linux-image-5.15.0-75-generic initramfs-tools Log ended: 2023-06-17 12:02:43 Log started: 2023-06-17 12:07:36 Setting up linux-image-5.15.0-75-generic (5.15.0-75.82~20.04.1) ... Setting up initramfs-tools (0.136ubuntu6.7) ... update-initramfs: deferring update (trigger activated) Setting up linux-firmware (1.187.39) ... update-initramfs: Generating /boot/initrd.img-5.15.0-72-generic I: The initramfs will attempt to resume from /dev/sda2 I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38) I: Set the RESUME variable to override this. Error 24 : Write error : cannot write compressed block E: mkinitramfs failure cpio 141 lz4 -9 -l 24 update-initramfs: failed for /boot/initrd.img-5.15.0-72-generic with 1. dpkg: error processing package linux-firmware (--configure): installed linux-firmware package post-installation script subprocess returned error exit status 1 dpkg: dependency problems prevent configuration of linux-image-generic-hwe-20.04: linux-image-generic-hwe-20.04 depends on linux-firmware; however: Package linux-firmware is not configured yet. dpkg: error processing package linux-image-generic-hwe-20.04 (--configure): dependency problems - leaving unconfigured dpkg: dependency problems prevent configuration of linux-generic-hwe-20.04: linux-generic-hwe-20.04 depends on linux-image-generic-hwe-20.04 (= 5.
[Bug 2068822] Re: unable to detach live patch as I try to do it because I was unable to see livepatch icon in top
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068822 Title: unable to detach live patch as I try to do it because I was unable to see livepatch icon in top To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2068822/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068823] Re: gofmt in golang-1.22-go flagged by multiple EDR software
Hello Ariel, thanks for the report; does Google say what exactly is wrong with this file? Thanks ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068823 Title: gofmt in golang-1.22-go flagged by multiple EDR software To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/golang-1.22/+bug/2068823/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068729] Re: pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not supported by protocol
Real, Lena is trying to fix the bug you reported. It would be helpful if you could test the fix. I suggest reading the https://wiki.ubuntu.com/StableReleaseUpdates page to better understand our process. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068729 Title: pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not supported by protocol To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpam-radius-auth/+bug/2068729/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068787] Re: ubuntu-release-upgrader
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068787 Title: ubuntu-release-upgrader To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2068787/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068698] Re: i recently start using ubuntu 24.04 version but facing lot of issues like crashing app late reposnse text disappear sometime when i open file manager . somethimes wifi not showing af
Probably this should be multiple bug reports, one per problem, but just in case this sounds familiar to someone else... ** Information type changed from Private Security to Public ** Package changed: ubuntu-meta (Ubuntu) => ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068698 Title: i recently start using ubuntu 24.04 version but facing lot of issues like crashing app late reposnse text disappear sometime when i open file manager . somethimes wifi not showing after some restart it work fine. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/2068698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2068601] Re: package amd64-microcode 3.20191218.1ubuntu2.1 failed to install/upgrade: podproces dpkg-deb --control zwrócił kod błędu 2
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2068601 Title: package amd64-microcode 3.20191218.1ubuntu2.1 failed to install/upgrade: podproces dpkg-deb --control zwrócił kod błędu 2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/2068601/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2066269] Re: [MIR] sysprof
** Tags added: sec-4574 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2066269 Title: [MIR] sysprof To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sysprof/+bug/2066269/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060992] Re: aws: Support hibernation on Graviton
Batch tested the proposed kernel for Jammy 6.5 and achieved 99+% success rate on CLI/console initiated Hibernate/Resumes. Complete batch tests across all ARM supported instance types ran previously, limited this test to the M6g family as confirmation. High level testing details: 1.) Spun up instance with patched AMI + this hibinit-agent ppa (https://launchpad.net/~mitchdz/+archive/ubuntu/ec2-hibinit-agent-arm). 2.) Started up bashscript "heartbeat" on the instance, pushing timestamp to dynamoDB table every 30 seconds. 3.) Hibernated instance through the AWS CLI 4.) Resumed instance through the AWS CLI 5.) Confirmed "heartbeat" updates to dynamoDB table after resume 6.) Repeated once more. Manually tested instance initiated hibernation successfully: High level testing details: 1.) Spun up instance with patched AMI + this hibinit-agent patch (https://git.launchpad.net/~secarola/ubuntu/+source/ec2-hibinit-agent/commit/?h=applied/ubuntu/jammy-devel&id=034ec3ffdc8cbd9d319aa5815f02d60ec3e27f93). 2.) Connected to the instance and started up bash script "heartbeat" on the instance, writing to text file every second with new timestamp. #!/bin/bash while : do echo $(date) > text.txt sleep 1 done 3.) Hibernated instance through the GuestOS. sudo swapon --priority=32767 /swap-hibinit sudo systemctl hibernate 4.) Confirmed that hosting environments reported the instance as Hibernated and not shutdown. 4.) Resumed instance through the AWS CLI 5.) Connected to the instance and confirmed the date was still being written to the text file cat text.txt ** Tags removed: verification-needed-jammy-linux-aws-6.5 ** Tags added: verification-done-jammy-linux-aws-6.5 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060992 Title: aws: Support hibernation on Graviton To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2060992/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2066999] Re: enable hibernation on ARM
Successfully tested with the agent on the M6g family. Received 599/600 successful hibernate resumes. The one failure was unrelated to the agent and within reasonable margins. High level testing steps: 1.) Run M6g Instance. 2.) Connect to the instance and install the PPA (https://launchpad.net/~mitchdz/+archive/ubuntu/ec2-hibinit-agent-arm) 3.) Install kernel with the changes in this bug so that hibernation is enabled. (https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2060992) 4.) Reboot instance and create an AMI from the instance. 5.) Use the created AMI in all remaining steps 6.) Run Instance 7.) Run script on instance to emit timestamped "heartbeat" to dynamoDB table 8.) Hibernate instance 9.) Resume instance 10.) Confirm "heartbeat" is emitted with a new timestamp after resume 11.) Repeat 8-10 once more. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2066999 Title: enable hibernation on ARM To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ec2-hibinit-agent/+bug/2066999/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067373] Re: [MIR] provd
** Tags added: sec-4374 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067373 Title: [MIR] provd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2067373/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067971] Re: System crached when using multi internet browsers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067971 Title: System crached when using multi internet browsers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067971/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067971] Re: System crached when using multi internet browsers
Hello, your logs are full of very unhappy messages. I'm hoping that this is the root of all your problems: [ 1509.531045] usb usb3-port11: Cannot enable. Maybe the USB cable is bad? but it's possible that your hardware is broken enough that this is just a bad guess. I suggest finding someone to help you troubleshoot your problems with you, either from IRC or askubuntu.com or a local user group, etc. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067971 Title: System crached when using multi internet browsers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067971/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067910] Re: gatewayd service listens on all interfaces by default
Hello James, thanks for the report. If I were designing this thing myself I certainly would have had different packages for journal sending than journal receiving, but whoever implemented it wanted to offer to both pull and push models and allow on-demand journal collecting from hosts. Given that most people using this will want to configure it to either accept logs from some sources or push logs to sinks, basically every installation will require configuration, which might mean turning this off entirely or configuring it for specific interfaces, as you have done. Certainly it's not ideal as it is. I assume it comes in part from the Debian Policy saying that daemons should be configured and running by default after installing packages -- another thing I wish were different from the start, but would be an immense challenge to change at this point. Anyway, I suspect this isn't likely to be a place where we'd want to deviate from Debian's choices, so I've marked this wontfix. If I'm wrong, surely someone will change that back. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067910 Title: gatewayd service listens on all interfaces by default To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2067910/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067910] Re: gatewayd service listens on all interfaces by default
** Information type changed from Private Security to Public Security ** Changed in: systemd (Ubuntu) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067910 Title: gatewayd service listens on all interfaces by default To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2067910/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067484] Re: Setting up tcpdump (4.9.3-4ubuntu0.3) ... useradd: cannot open /etc/passwd adduser: `/usr/sbin/useradd -d /nonexistent -g tcpdump -s /usr/sbin/nologin -u 114 tcpdump' returned error
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067484 Title: Setting up tcpdump (4.9.3-4ubuntu0.3) ... useradd: cannot open /etc/passwd adduser: `/usr/sbin/useradd -d /nonexistent -g tcpdump -s /usr/sbin/nologin -u 114 tcpdump' returned error code 1. Exiting. dpkg: error processing package tcpdump (--configure): installed tcpdump package post-installation script subprocess returned error exit status 1 Errors were encountered while processing: tcpdump Upgrade complete The upgrade has completed but there were errors d To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/2067484/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067416] Re: ubuntu-bug xorg
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067416 Title: ubuntu-bug xorg To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067416/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 244250] Re: Spurious reboot notifications caused by libssl upgrades.
Adrien, thanks so much for digging into this again. This is so very complicated, why does openssl need special handling in the world of needrestart? My inclination is to remove all this complexity and address any shortcomings of needrestart in the needrestart package. Am I off base? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/244250 Title: Spurious reboot notifications caused by libssl upgrades. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/244250/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067176] Re: Boot and memory test errors in grub
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067176 Title: Boot and memory test errors in grub To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2067176/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067216] Re: error id modified the contents of /etc/update-manager/releaes-upgrades
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067216 Title: error id modified the contents of /etc/update-manager/releaes- upgrades To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2067216/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067216] Re: error id modified the contents of /etc/update-manager/releaes-upgrades
Hello, I believe this means that the mirror you are using does not yet have the Ubuntu 24.04 LTS release. 2024-05-26 23:21:19,553 DEBUG s='http' n='mirrors.piconets.webwerks.in' p='/ubuntu-mirror/ubuntu//dists/noble/Release' q='' f='' 2024-05-26 23:21:19,619 DEBUG error from httplib: 'HTTP Error 404: Not Found' -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067216 Title: error id modified the contents of /etc/update-manager/releaes- upgrades To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2067216/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2067249] Re: cannot access ubuntu desktop or upgrade as passwords fail no authentification
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067249 Title: cannot access ubuntu desktop or upgrade as passwords fail no authentification To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/2067249/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065845] Re: installation crash
I can't promise that this is your problem but it looks like trouble: May 16 05:04:15 ubuntu ubiquity: /dev/sda5: Inodes that were part of a corrupted orphan linked list found. May 16 05:04:15 ubuntu ubiquity: May 16 05:04:15 ubuntu ubiquity: /dev/sda5: UNEXPECTED INCONSISTENCY; RUN fsck MANUALLY. May 16 05:04:15 ubuntu ubiquity: #011(i.e., without -a or -p options) May 16 05:04:19 ubuntu ubiquity: resize2fs 1.44.1 (24-Mar-2018) May 16 05:04:19 ubuntu ubiquity: Please run 'e2fsck -f /dev/sda5' first. May 16 05:04:19 ubuntu ubiquity: May 16 05:04:19 ubuntu partman: Error resizing the ext2/ext3/ext4 file system -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065845 Title: installation crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2065845/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065918] Re: Impossible to benefit from latest Linux security update
*** This bug is a duplicate of bug 2065678 *** https://bugs.launchpad.net/bugs/2065678 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065918 Title: Impossible to benefit from latest Linux security update To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-545/+bug/2065918/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065510] Re: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes
I've poked around a little bit and think this might not justify much time to fix: - it's suggested to be used in the initramfs, presumably before untrusted users are executing - it's apparently not going to work with luks2 format, only luks1, and I believe we've switched the default to luks2 In an ideal world this would be written in a better language, but if it hasn't already happened then it probably won't happen. Thanks ** Changed in: cryptsetup (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065510 Title: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/2065510/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065510] Re: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes
Nice find, Hadmut, thanks. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065510 Title: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/2065510/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2046609] Re: sync request: netatalk 3.1.18~ds-1 Debian sid main
Abraham, if you've got an easy test case for this, it might be useful to test the various versions released into 22.04 LTS: https://launchpad.net/ubuntu/jammy/+source/netatalk eg: pull-lp-debs netatalk jammy 3.1.12~ds-9ubuntu0.22.04.1 for all the versions listed, then try them in turn. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/2046609 Title: sync request: netatalk 3.1.18~ds-1 Debian sid main To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netatalk/+bug/2046609/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1461834] Re: 1024-bit signing keys should be deprecated
Jake, some progress is underway for Launchpad to automatically sign PPAs with RSA4096 keys https://discourse.ubuntu.com/t/new-requirements-for- apt-repository-signing-in-24-04/42854 It's also possible to dual-sign non-ppa repositories, eg: curl -s http://archive.ubuntu.com/ubuntu/dists/focal-updates/InRelease | gpg --verify This can really help migrating from unsafe key sizes to safe key sizes. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1461834 Title: 1024-bit signing keys should be deprecated To manage notifications about this bug go to: https://bugs.launchpad.net/launchpad/+bug/1461834/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1999490] Re: Missing CVE in Nvidia driver 515 packages
I think we fixed this in December 2022: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics- drivers-510/+bug/1997087 https://git.launchpad.net/ubuntu-cve- tracker/tree/active/CVE-2022-34673#n360 Thanks ** Information type changed from Private Security to Public Security ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-34673 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1999490 Title: Missing CVE in Nvidia driver 515 packages To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-515/+bug/1999490/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1673431] Re: Make kernel readable by non-root users
Hello KolAflash, thanks for writing; the wiki page in question has this suggestion: # echo "UMASK=0077" >> /etc/initramfs-tools/initramfs.conf Which should take care of the secrets in case the administrator chooses to use this mechanism to automatically supply keys to LUKS, right? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1673431 Title: Make kernel readable by non-root users To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libguestfs/+bug/1673431/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2060992] Re: aws: Support hibernation on Graviton
Batch tested the patched kernel and achieved 99+% success rate on CLI/console initiated Hibernate/Resumes across all ARM supported AWS EC2 instance families, C6g(d)(n), C7g(d), M6g(d), M7g(d), R6g(d), R7g(d), T4g. (4,175/4,200 test runs). High level testing details: 1.) Spun up instance with patched AMI + this hibinit-agent patch (https://git.launchpad.net/~secarola/ubuntu/+source/ec2-hibinit-agent/commit/?h=applied/ubuntu/jammy-devel&id=034ec3ffdc8cbd9d319aa5815f02d60ec3e27f93). 2.) Started up bashscript "heartbeat" on the instance, pushing timestamp to dynamoDB table every 30 seconds. 3.) Hibernated instance through the AWS CLI 4.) Resumed instance through the AWS CLI 5.) Confirmed "heartbeat" updates to dynamoDB table after resume 6.) Repeated once more. Manually tested instance initiated hibernation successfully: High level testing details: 1.) Spun up instance with patched AMI + this hibinit-agent patch (https://git.launchpad.net/~secarola/ubuntu/+source/ec2-hibinit-agent/commit/?h=applied/ubuntu/jammy-devel&id=034ec3ffdc8cbd9d319aa5815f02d60ec3e27f93). 2.) Connected to the instance and started up bash script "heartbeat" on the instance, writing to text file every second with new timestamp. #!/bin/bash while : do echo $(date) > text.txt sleep 1 done 3.) Hibernated instance through the GuestOS. sudo swapon --priority=32767 /swap-hibinit sudo systemctl hibernate 4.) Confirmed that hosting environments reported the instance as Hibernated and not shutdown. 4.) Resumed instance through the AWS CLI 5.) Connected to the instance and confirmed the date was still being written to the text file cat text.txt ** Tags removed: verification-needed-jammy-linux-aws ** Tags added: verification-done-jammy-linux-aws -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060992 Title: aws: Support hibernation on Graviton To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2060992/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2037897] Re: FreeCAD unable to create new document under wayland
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2037897 Title: FreeCAD unable to create new document under wayland To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/freecad/+bug/2037897/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1829588] Re: make it easy to add proposed; help text outdated
Apparently this exists now via the new -p flag, but doesn't currently work in releases with deb822 formatted sources lists: https://bugs.launchpad.net/ubuntu/+source/software- properties/+bug/2061128 ** Changed in: software-properties (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1829588 Title: make it easy to add proposed; help text outdated To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1829588/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064750] Re: block probing crashed with ValueError
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064750 Title: block probing crashed with ValueError To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/2064750/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064685] Re: write says write: effective gid does not match group of /dev/pts/5
Hello Robert, I believe this is intentional. If you wish to restore the previous behavior, it should be sufficient to change /usr/bin/write.ul to root:tty 02755. Thanks ** Changed in: util-linux (Ubuntu) Status: New => Confirmed ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064685 Title: write says write: effective gid does not match group of /dev/pts/5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/2064685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.
Two different services attempting to bind on a single (IP, port) tuple is going to lead to a failure of one of the services. Prior to this update it was a silent failure, which serves only to make debugging problems more difficult. I can empathize with the feeling that things shouldn't break in an LTS release, but it was quietly broken already. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2055776 Title: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064479] Re: file error keeps repeating after any Terminal installation with APT this is the error I receive "open `20auto-upgrades.merge-error"
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064479 Title: file error keeps repeating after any Terminal installation with APT this is the error I receive "open `20auto-upgrades.merge-error" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2064479/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064353] Re: nslookup - hit enter with no args or options, prompt advances one line and shows a > operator; then hit ctrl c and normal prompt returns, but now all entries typed at prompt are invi
Hello Spencer, thanks for the report. This is pretty common with programs that provide a more "interactive" experience. There's two tools that can help recover from this, reset(1) and stty(1). When this happens, run: reset or stty sane Both should fix this specific case. But sometimes one or the other one is required to fix your terminal, so it's helpful to know both of them. Thanks ** Information type changed from Private Security to Public ** Changed in: bind9 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064353 Title: nslookup - hit enter with no args or options, prompt advances one line and shows a > operator; then hit ctrl c and normal prompt returns, but now all entries typed at prompt are invisible as though entering a sudo password; commands still execute. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/2064353/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064306] Re: error
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064306 Title: error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2064306/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064141] Re: default config in noble prevents start of fail2ban
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064141 Title: default config in noble prevents start of fail2ban To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fail2ban/+bug/2064141/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2064007] Re: execve from NetworkManager fails - wrong path in app-armor profile?
Hello Christopher, thanks for the bug report. Note that due to ISC stepping back from their DHCP packages, we've switched to dhcpcd as the "default" dhcp client. Probably a patch to fix this would be accepted, but it might not be anybody's priority to work on it. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064007 Title: execve from NetworkManager fails - wrong path in app-armor profile? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/2064007/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2063932] Re: ULTS 24 AppArmor configuration parsing and loading error
** Information type changed from Private Security to Public ** Changed in: apparmor (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2063932 Title: ULTS 24 AppArmor configuration parsing and loading error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2063932/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs