[Bug 2083576] Re: failed upgrade, unhelpful looping

2024-10-03 Thread Seth Arnold
There's a chance this is caused by my file:///srv/mirror/ubuntu/ or
whatever I used in my apt sources. Replacing that with
http://archive.ubuntu.com/ubuntu/ let me upgrade my computer to 24.04
LTS.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083576

Title:
  failed upgrade, unhelpful looping

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2083576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083603] Re: x11vnc server icon at top bar not working, not clickable

2024-10-03 Thread Seth Arnold
This seems unlikely to be the kernel. If you're running something other
than gnome, maybe pick whatever your desktop environment is?

** Package changed: linux (Ubuntu) => gnome-shell (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083603

Title:
  x11vnc server icon at top bar not working, not clickable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2083603/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083638] [NEW] overnight crashes

2024-10-03 Thread Seth Arnold
Public bug reported:

Hello, twice recently my 20.04 LTS laptop in a docking station was very
unhappy after leaving it unattended overnight:

- the external monitor did not wake from dpms sleep when pressing keys on 
either the external keyboard or the built-in keyboard
- the built-in monitor did not wake from xrandr "off" state (I use this command 
to use only my external monitor within X11: xrandr --output DP-1-3 --auto 
--output eDP-1 --off)
- nmap port scan could find the open ssh port on my network
- connecting via ssh hangs long enough that I decided to force-power the laptop
- nothing stands out in journalctl logs for the two boots in question, except 
it is a little strange that the last log entries appear to be within thirty 
seconds of the cron.daily run:


$ journalctl -b-3 | tail -20
Sep 27 06:23:26 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 
processes of 1 users.
Sep 27 06:23:44 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:23:44 + src 46 
(fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 
0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 2,36@1 
3,27@0 3,29@0 3,30@0
Sep 27 06:23:45 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:23:45 + src 45 
(fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 
2,2@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0
Sep 27 06:24:15 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:24:15 + src 46 
(fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 
0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 
2,36@1 3,27@0 3,29@0 3,30@0
Sep 27 06:24:16 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:24:16 + src 45 
(fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 
2,2@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0
Sep 27 06:24:46 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:24:46 + src 46 
(fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 
0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,25@1 
2,36@1 3,27@0 3,29@0 3,30@0
Sep 27 06:24:47 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:24:47 + src 45 
(fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 
2,2@1 2,7@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,22@0
Sep 27 06:24:47 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 
processes of 1 users.
Sep 27 06:24:47 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 
processes of 1 users.
Sep 27 06:25:01 millbarge audit[864607]: USER_ACCT pid=864607 uid=0 
auid=4294967295 ses=4294967295 msg='op=PAM:accounting grantors=pam_permit 
acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success'
Sep 27 06:25:01 millbarge audit[864607]: CRED_ACQ pid=864607 uid=0 
auid=4294967295 ses=4294967295 msg='op=PAM:setcred grantors=pam_permit,pam_cap 
acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success'
Sep 27 06:25:01 millbarge audit[864607]: SYSCALL arch=c03e syscall=1 
success=yes exit=1 a0=7 a1=7fff051b2380 a2=1 a3=7f4ea1523371 items=0 ppid=2950 
pid=864607 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 
tty=(none) ses=825 comm="cron" exe="/usr/sbin/cron" key=(null)
Sep 27 06:25:01 millbarge audit: PROCTITLE 
proctitle=2F7573722F7362696E2F43524F4E002D66
Sep 27 06:25:02 millbarge CRON[864607]: pam_unix(cron:session): session opened 
for user root by (uid=0)
Sep 27 06:25:01 millbarge audit[864607]: USER_START pid=864607 uid=0 auid=0 
ses=825 msg='op=PAM:session_open 
grantors=pam_loginuid,pam_env,pam_env,pam_permit,pam_umask,pam_unix,pam_limits 
acct="root" exe="/usr/sbin/cron" hostname=? addr=? terminal=cron res=success'
Sep 27 06:25:02 millbarge CRON[864608]: (root) CMD (test -x /usr/sbin/anacron 
|| ( cd / && run-parts --report /etc/cron.daily ))
Sep 27 06:25:17 millbarge ubxtool[4438]: Fri, 27 Sep 2024 06:25:17 + src 46 
(fix: 3) currently receiving: 0,6@0 0,12@0 0,14@0 0,15@0 0,17@0 0,19@0 0,22@0 
0,24@0 1,131@0 1,133@0 1,135@0 2,2@1 2,8@1 2,10@1 2,11@1 2,14@1 2,24@1 2,36@1 
3,27@0 3,29@0 3,30@0
Sep 27 06:25:18 millbarge ubxtool[4437]: Fri, 27 Sep 2024 06:25:18 + src 45 
(fix: 3) currently receiving: 0,6@0 0,14@0 0,17@0 0,19@0 0,22@0 1,131@0 1,135@0 
2,2@1 2,7@1 2,10@1 2,11@1 2,24@1 2,25@1 2,36@1 6,11@0 6,12@0 6,21@0 6,22@0
Sep 27 06:25:19 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 
processes of 1 users.
Sep 27 06:25:19 millbarge rtkit-daemon[4551]: Supervising 8 threads of 3 
processes of 1 users.


$ journalctl -b-2 | tail -20
Oct 03 06:24:19 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 
processes of 1 users.
Oct 03 06:24:19 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 
processes of 1 users.
Oct 03 06:24:21 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 
processes of 1 users.
Oct 03 06:24:21 millbarge rtkit-daemon[6412]: Supervising 10 threads of 5 
processes of

[Bug 2083625] [NEW] Process '/usr/bin/unshare -m /usr/bin/snap auto-import --mount=/dev/nvme0n1' failed with exit code 1.

2024-10-03 Thread Seth Arnold
Public bug reported:

Hello, I noticed a lot of these auto-import errors in my journalctl
output after an upgrade to Ubuntu 24.04 LTS:

[...]
Oct 03 08:36:08 wopr systemd-udevd[937]: Using default interface naming scheme 
'v255'.
Oct 03 08:36:08 wopr systemd-journald[891]: Time spent on flushing to 
/var/log/journal/73a51a48edaf17749759c4d85701d9e3 is 79.467ms for 1784 entries.
Oct 03 08:36:08 wopr systemd-journald[891]: System Journal 
(/var/log/journal/73a51a48edaf17749759c4d85701d9e3) is 3.5G, max 3.6G, 63.4M 
free.
Oct 03 08:36:09 wopr systemd-journald[891]: Received client request to flush 
runtime journal.
Oct 03 08:36:09 wopr systemd-journald[891]: 
/var/log/journal/73a51a48edaf17749759c4d85701d9e3/system.journal: Journal file 
uses a different sequence number ID, rotating.
Oct 03 08:36:09 wopr systemd-journald[891]: Rotating system journal.
Oct 03 08:36:09 wopr kernel: spl: loading out-of-tree module taints kernel.
Oct 03 08:36:09 wopr kernel: IPMI message handler: version 39.2
Oct 03 08:36:08 wopr systemd[1]: Started systemd-udevd.service - Rule-based 
Manager for Device Events and Files.
Oct 03 08:36:08 wopr systemd[1]: nvmefc-boot-connections.service - Auto-connect 
to subsystems on FC-NVME devices found during boot was skipped because of an 
unmet conditio>
Oct 03 08:36:08 wopr systemd[1]: Reached target local-fs-pre.target - 
Preparation for Local File Systems.
Oct 03 08:36:09 wopr systemd[1]: Finished systemd-udev-trigger.service - 
Coldplug All udev Devices.
Oct 03 08:36:09 wopr (udev-worker)[1043]: nvme0n1: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/nvme0n1' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[976]: sdo: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdo' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[987]: sdm: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdm' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1021]: sdb: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdb' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1040]: sdi: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdi' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1049]: sdh: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdh' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[969]: sdj: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdj' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1054]: sda: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sda' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1035]: sdc: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdc' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[983]: md127: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/md127' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1043]: nvme0n1p1: Process '/usr/bin/unshare 
-m /usr/bin/snap auto-import --mount=/dev/nvme0n1p1' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1020]: sdg: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdg' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1022]: sdp: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdp' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[991]: sdq: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdq' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1038]: nvme0n1p2: Process '/usr/bin/unshare 
-m /usr/bin/snap auto-import --mount=/dev/nvme0n1p2' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[986]: sdn: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdn' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[974]: sdk: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdk' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1057]: sdl: Process '/usr/bin/unshare -m 
/usr/bin/snap auto-import --mount=/dev/sdl' failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1057]: sdl: Process '/lib/udev/hdparm' 
failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[991]: sdq: Process '/lib/udev/hdparm' failed 
with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[986]: sdn: Process '/lib/udev/hdparm' failed 
with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[987]: sdm: Process '/lib/udev/hdparm' failed 
with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1020]: sdg: Process '/lib/udev/hdparm' 
failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1022]: sdp: Process '/lib/udev/hdparm' 
failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1021]: sdb: Process '/lib/udev/hdparm' 
failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[1035]: sdc: Process '/lib/udev/hdparm' 
failed with exit code 1.
Oct 03 08:36:09 wopr (udev-worker)[974]: sdk: P

[Bug 2083576] [NEW] failed upgrade, unhelpful looping

2024-10-02 Thread Seth Arnold
Public bug reported:

Hello, after correcting the ubuntu-minimal problem and wrong release in
my sources caused by bug 2083575 I started over again, and got new
errors, but unfortunately without useful error messages. Further
unfortunately, what's left on the terminal is a partial view of the
total mess. I saw the "=== ... command terminated ... ===" prompt
several times, and tried to restore the window with 'r' a few times, and
it ran through this same sequence of output each time, until I got tired
of the game and hit 'x' to kill the screen session.

Checking package manager
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
Get:1 file:/srv/mirror/ubuntu jammy InRelease [270 kB]  

   
Get:2 file:/srv/mirror/ubuntu jammy InRelease [270 kB]  

   
Get:3 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB]  

   
Get:4 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB] 

   
Get:5 file:/srv/mirror/ubuntu jammy-updates InRelease [128 kB]  

   
Get:6 file:/srv/mirror/ubuntu jammy-security InRelease [129 kB] 

   
Hit http://security.ubuntu.com/ubuntu jammy-security InRelease  

   
Get:7 http://ddebs.ubuntu.com noble InRelease [41.3 kB] 

   
Get:8 https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease [7,532 
B]  
 
Get:9 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB] 

   
Get:10 https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease [7,468 
B]  
 
Hit http://ddebs.ubuntu.com noble-proposed InRelease

   
Get:11 https://esm.ubuntu.com/infra/ubuntu noble-infra-security InRelease 
[7,462 B]   
 
Get:12 https://esm.ubuntu.com/infra/ubuntu noble-infra-updates InRelease [7,461 
B]  
   
Fetched 113 kB in 0s (0 B/s)

   
Reading package lists... Done
Building dependency tree... Done 
Reading state information... Done

Checking for installed snaps

Calculating snap size requirements

Updating repository information

Third party sources disabled

Some third party entries in your sources.list were disabled. You can 
re-enable them after the upgrade with the 'software-properties' tool 
or your package manager. 

To continue please press [ENTER]

Get:1 http://security.ubuntu.com/ubuntu noble-security InRelease [126 kB]   

   
Get:2 http://ddebs.ubuntu.com noble InRelease [41.3 kB] 

   
Get:3 http://ddebs.ubuntu.com noble-updates InRelease [41.3 kB] 

   
Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-security InRelease

   
Hit http://ddebs.ubuntu.com noble-proposed InRelease

   
Get:4 http://security.ubuntu.com/ubuntu noble-security/universe Sources [252 
kB] 
  
Hit https://esm.ubuntu.com/apps/ubuntu noble-apps-updates InRelease 

   
Hit https://esm.ubuntu.com/infra/ubuntu noble-infra-secur

[Bug 2083575] [NEW] failed upgrade left apt sources on wrong release

2024-10-02 Thread Seth Arnold
Public bug reported:

Hello, I tried to upgrade a jammy machine to noble with do-release-
upgrade and got a failure very early in the process. After the failure,
my apt sources were left pointing to the new release, they weren't
rolled back to the currently running release.

These are the sources that the upgrader left for me:

$ cat /etc/apt/sources.list
# deb http://mirrors.kernel.org/ubuntu/ xenial main restricted
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted
# deb http://mirrors.kernel.org/ubuntu/ xenial universe
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates universe
# deb http://mirrors.kernel.org/ubuntu/ xenial multiverse
# deb http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse
# deb-src http://mirrors.kernel.org/ubuntu/ xenial main restricted
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates main restricted
# deb-src http://mirrors.kernel.org/ubuntu/ xenial universe
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates universe
# deb-src http://mirrors.kernel.org/ubuntu/ xenial multiverse
# deb-src http://mirrors.kernel.org/ubuntu/ xenial-updates multiverse
# deb file:///srv/mirror/ubuntu/ bionic main restricted
# deb file:///srv/mirror/ubuntu/ bionic-updates main restricted
# deb file:///srv/mirror/ubuntu/ bionic universe
# deb file:///srv/mirror/ubuntu/ bionic-updates universe
# deb file:///srv/mirror/ubuntu/ bionic multiverse
# deb file:///srv/mirror/ubuntu/ bionic-updates multiverse
# deb-src file:///srv/mirror/ubuntu/ bionic main restricted
# deb-src file:///srv/mirror/ubuntu/ bionic-updates main restricted
# deb-src file:///srv/mirror/ubuntu/ bionic universe
# deb-src file:///srv/mirror/ubuntu/ bionic-updates universe
# deb-src file:///srv/mirror/ubuntu/ bionic multiverse
# deb-src file:///srv/mirror/ubuntu/ bionic-updates multiverse

## # deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 
(20160325)]/ xenial main restricted
## 
## #deb cdrom:[Ubuntu-Server 16.04 LTS _Xenial Xerus_ - Beta amd64 (20160325)]/ 
xenial main restricted
## 
## # See http://help.ubuntu.com/community/UpgradeNotes for how to upgrade to
## # newer versions of the distribution.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial main restricted
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial main restricted
## 
## ## Major bug fix updates produced after the final release of the
## ## distribution.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates main restricted
## 
## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu
## ## team, and may not be under a free licence. Please satisfy yourself as to
## ## your rights to use the software. Also, please note that software in
## ## universe WILL NOT receive any review or updates from the Ubuntu security
## ## team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial universe
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial universe
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates universe
## 
## ## N.B. software from this repository is ENTIRELY UNSUPPORTED by the Ubuntu 
## ## team, and may not be under a free licence. Please satisfy yourself as to 
## ## your rights to use the software. Also, please note that software in 
## ## multiverse WILL NOT receive any review or updates from the Ubuntu
## ## security team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial multiverse
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-updates multiverse
## 
## ## N.B. software from this repository may not have been tested as
## ## extensively as that contained in the main release, although it includes
## ## newer versions of some applications which may provide useful features.
## ## Also, please note that software in backports WILL NOT receive any review
## ## or updates from the Ubuntu security team.
## deb http://us.archive.ubuntu.com/ubuntu/ xenial-backports main restricted 
universe multiverse
## # deb-src http://us.archive.ubuntu.com/ubuntu/ xenial-backports main 
restricted universe multiverse
## 
## ## Uncomment the following two lines to add software from Canonical's
## ## 'partner' repository.
## ## This software is not part of Ubuntu, but is offered by Canonical and the
## ## respective vendors as a service to Ubuntu users.

deb http://security.ubuntu.com/ubuntu noble-security main restricted multiverse 
universe
# deb file:///srv/mirror/ubuntu/ noble main restricted multiverse universe # 
disabled on upgrade to noble
# deb file:///srv/mirror/ubuntu/ jammy-updates main restricted multiverse 
universe # disabled on upgrade to noble
# deb file:///srv/mirror/ubuntu/ jammy-security main restricted multiverse 
universe # disabled on upgrade to noble

deb-src http

[Bug 2083464] [NEW] error: invalid application of 'sizeof' to an incomplete type 'struct bpf_timer'

2024-10-01 Thread Seth Arnold
Public bug reported:

I received multiple errors while trying to run tcptop-bpfcc:

$ sudo tcptop-bpfcc
[sudo] password for sarnold: 
In file included from :2:
In file included from /virtual/include/bcc/bpf.h:12:
In file included from include/linux/types.h:6:
In file included from include/uapi/linux/types.h:14:
In file included from include/uapi/linux/posix_types.h:5:
In file included from include/linux/stddef.h:5:
In file included from include/uapi/linux/stddef.h:5:
In file included from include/linux/compiler_types.h:80:
include/linux/compiler-clang.h:41:9: warning: '__HAVE_BUILTIN_BSWAP32__' macro 
redefined [-Wmacro-redefined]
#define __HAVE_BUILTIN_BSWAP32__
^
:4:9: note: previous definition is here
#define __HAVE_BUILTIN_BSWAP32__ 1
^
In file included from :2:
In file included from /virtual/include/bcc/bpf.h:12:
In file included from include/linux/types.h:6:
In file included from include/uapi/linux/types.h:14:
In file included from include/uapi/linux/posix_types.h:5:
In file included from include/linux/stddef.h:5:
In file included from include/uapi/linux/stddef.h:5:
In file included from include/linux/compiler_types.h:80:
include/linux/compiler-clang.h:42:9: warning: '__HAVE_BUILTIN_BSWAP64__' macro 
redefined [-Wmacro-redefined]
#define __HAVE_BUILTIN_BSWAP64__
^
:5:9: note: previous definition is here
#define __HAVE_BUILTIN_BSWAP64__ 1
^
In file included from :2:
In file included from /virtual/include/bcc/bpf.h:12:
In file included from include/linux/types.h:6:
In file included from include/uapi/linux/types.h:14:
In file included from include/uapi/linux/posix_types.h:5:
In file included from include/linux/stddef.h:5:
In file included from include/uapi/linux/stddef.h:5:
In file included from include/linux/compiler_types.h:80:
include/linux/compiler-clang.h:43:9: warning: '__HAVE_BUILTIN_BSWAP16__' macro 
redefined [-Wmacro-redefined]
#define __HAVE_BUILTIN_BSWAP16__
^
:3:9: note: previous definition is here
#define __HAVE_BUILTIN_BSWAP16__ 1
^
In file included from /virtual/main.c:15:
In file included from include/net/sock.h:46:
In file included from include/linux/netdevice.h:41:
In file included from include/net/netprio_cgroup.h:11:
In file included from include/linux/cgroup.h:28:
In file included from include/linux/cgroup-defs.h:22:
In file included from include/linux/bpf-cgroup.h:5:
include/linux/bpf.h:220:35: error: invalid application of 'sizeof' to an 
incomplete type 'struct bpf_timer'
memset(dst + map->timer_off, 0, sizeof(struct bpf_timer));
^ ~~
include/linux/bpf.h:220:49: note: forward declaration of 'struct bpf_timer'
memset(dst + map->timer_off, 0, sizeof(struct bpf_timer));
  ^
include/linux/bpf.h:234:10: error: invalid application of 'sizeof' to an 
incomplete type 'struct bpf_timer'
t_sz = sizeof(struct bpf_timer);
   ^ ~~
include/linux/bpf.h:234:24: note: forward declaration of 'struct bpf_timer'
t_sz = sizeof(struct bpf_timer);
 ^
include/linux/bpf.h:548:26: error: use of undeclared identifier 
'BPF_PSEUDO_FUNC'
   insn->src_reg == BPF_PSEUDO_FUNC;
^
In file included from /virtual/main.c:15:
In file included from include/net/sock.h:59:
include/linux/filter.h:1520:44: error: use of undeclared identifier 
'BPF_F_BROADCAST'; did you mean 'IFF_BROADCAST'?
if (unlikely(!ri->tgt_value) && !(flags & BPF_F_BROADCAST)) {
  ^~~
  IFF_BROADCAST
include/uapi/linux/if.h:86:2: note: 'IFF_BROADCAST' declared here
IFF_BROADCAST   = 1<<1,  /* volatile */
^
In file included from /virtual/main.c:15:
In file included from include/net/sock.h:59:
include/linux/filter.h:1535:14: error: use of undeclared identifier 
'BPF_F_BROADCAST'; did you mean 'IFF_BROADCAST'?
if (flags & BPF_F_BROADCAST) {
^~~
IFF_BROADCAST
include/uapi/linux/if.h:86:2: note: 'IFF_BROADCAST' declared here
IFF_BROADCAST   = 1<<1,  /* volatile */
^
3 warnings and 5 errors generated.
Traceback (most recent call last):
  File "/usr/sbin/tcptop-bpfcc", line 225, in 
b = BPF(text=bpf_text)
  File "/usr/lib/python3/dist-packages/bcc/__init__.py", line 364, in __init__
raise Exception("Failed to compile BPF module %s" % (src_file or ""))
Exception: Failed to compile BPF module 

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: bpfcc-tools 0.18.0+ds-2
ProcVersionSignature: Ubuntu 5.15.0-113.123-generic 5.15.152
Uname: Linux 5.15.0-113-generic x86_64
NonfreeKernelModules: lkp_Ubuntu_5_15_0_113_123_generic_106 zfs zunicode zavl 
icp zcommon zn

[Bug 2058192] Re: [MIR] lenovo-wwan-unlock

2024-10-01 Thread Seth Arnold
At today's MIR team meeting, we weren't entirely sure what the next
steps for this package should be, and we ran out of time to try to find
a resolution.

So I'll ask here -- what is the next step?

I see comment #5 had required and recommended todos. Comment #7 said
that some issues had been fixed in a given tagged release, but not a
list of what specifically had been fixed, and how.

Comment #16 demonstrated the risks of changes to software that we can't
see -- and comment #17 included a mangled diff that doesn't quite show
what was added, removed, or context, but suggests that something was
done. 2.1.2 was tagged on August 15, the missing AppArmor rules were
found September 27, and fixed September 29. This is fine pre-release,
we've all got things to do, but post-release it would be troubling. So I
feel I should ask about it now, will these be found sooner over the next
twelve to twenty years?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058192

Title:
  [MIR] lenovo-wwan-unlock

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058192] Re: [MIR] lenovo-wwan-unlock

2024-09-17 Thread Seth Arnold
Marking this incomplete so that it'll show up in next week's MIR team
meeting. In the meantime, let's try to find out who would know more
about the OEM archive and OEM process to see if this an appropriate
outcome for this package.

Thanks

** Changed in: lenovo-wwan-unlock (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058192

Title:
  [MIR] lenovo-wwan-unlock

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/2058192/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077576] Re: SSH client doesn't handle properly non-ASCII chars

2024-09-04 Thread Seth Arnold
This change makes me uneasy:

- I see no terminal-aware filtering applied in the notify_start() ->
xvasprintf() -> writemsg() -> write() path. The remote server may not be
entirely untrusted but it's also not exactly trusted, either, especially
on the first use. There's a long and glorious history of surprising
outcomes due to terminal escape sequences
https://www.cyberark.com/resources/threat-research-blog/dont-trust-this-
title-abusing-terminal-emulators-with-ansi-escape-characters

- I'm not sure it's even necessary: my phone was easily able to read
pure-ascii QR codes as easily as the (admittedly much better looking)
utf-8 based codes. Try a few:

sudo apt install qrencode
u=`cat /proc/sys/kernel/random/uuid` ; for t in ANSI ANSI256 ASCII ASCIIi UTF8 
ANSIUTF8 ; do qrencode -t $t $u  ; done ; echo $u ; unset u

Are ascii-encoded qr codes known to be insufficient?

- As for the actual code changes, they seemed fairly straightforward,
and I found no issues. I'm very wary about undoing a safety mechanism
from the past, put in place by people who thought about this
significantly more than I have.

- Upstream might have been engaging for a while but now appears entirely
silent. This reminds me too much of dpkg+zstd, where a similar train of
engagement lead to Ubuntu forking the dpkg ecosystem and carrying a
patch without a clear way to reunify the ecosystem. Will we do the same
to OpenSSH? (We might have already passed this point if we chose to ship
this in Noble rather than wait for Oracular to test this out.)

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077576

Title:
  SSH client doesn't handle properly non-ASCII chars

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2077576/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072621] Re: [MIR] rpds-py

2024-08-27 Thread Seth Arnold
** Tags added: sec-4902

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072621

Title:
  [MIR] rpds-py

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rpds-py/+bug/2072621/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073783] Re: [MIR] exfatprogs

2024-08-27 Thread Seth Arnold
** Tags added: sec-4903

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073783

Title:
  [MIR] exfatprogs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exfatprogs/+bug/2073783/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074086] Re: MIR libimobiledevice-glue

2024-08-20 Thread Seth Arnold
There's embedded copies of sha1, sha256, sha512 in the upstream package:
https://github.com/libimobiledevice/libimobiledevice-
glue/tree/master/src

I haven't yet looked at our version of the package.

The libimobiledevice library is licensed LGPL; the libtomcrypt code has
been placed in the public domain.

I'm sure our certifications team would much prefer if this could be
switched to use OpenSSL instead so that we can rely upon an already-
certified cryptography implementation. What would it look like to switch
this package to relying upon some already-certified cryptography?
(Upstream may or may not want to link against OpenSSL, not everyone is
prepared to treat it as a "system library". They may also not wish to
use the OpenSSL APIs, not everyone is prepared to like those.)

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074086

Title:
  MIR libimobiledevice-glue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libimobiledevice-glue/+bug/2074086/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073783] Re: [MIR] exfatprogs

2024-08-20 Thread Seth Arnold
Filesystems, especially new ones, are a frequent source of problems due
to poor parsing. Do you know if exfatprogs already has some fuzzing
integration with eg ossfuzz or run during the build or by the authors?
If not, could you suggest it to the authors?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073783

Title:
  [MIR] exfatprogs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exfatprogs/+bug/2073783/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074086] Re: MIR libimobiledevice-glue

2024-08-08 Thread Seth Arnold
** Tags added: sec-4836

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074086

Title:
  MIR libimobiledevice-glue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libimobiledevice-glue/+bug/2074086/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070882] Re: [MIR] jpeg-xl

2024-08-08 Thread Seth Arnold
** Tags added: sec-4835

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070882

Title:
  [MIR] jpeg-xl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jpeg-xl/+bug/2070882/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2075542] Re: bind9 1:9.18.28-0ubuntu0.20.04.1 breakes local system

2024-08-05 Thread Seth Arnold
Manus, I believe you've got a different issue: libuv1 version 1.44.2
does not exist in a currently supported release of Ubuntu. Ubuntu 20.04
LTS is still on 1.34.2-ish versions:

$ rmadison libuv1  | grep 1.44.2
$ rmadison libuv1  | grep focal
 libuv1 | 1.34.2-1ubuntu1   | focal   | source, amd64, arm64, armhf, 
i386, ppc64el, riscv64, s390x
 libuv1 | 1.34.2-1ubuntu1.5 | focal-security  | source, amd64, arm64, armhf, 
i386, ppc64el, riscv64, s390x
 libuv1 | 1.34.2-1ubuntu1.5 | focal-updates   | source, amd64, arm64, armhf, 
i386, ppc64el, riscv64, s390x

If you're still on Kinetic, Lunar, or Mantic, I strongly recommend
upgrading to a supported release. Upgrading after releases have hit
their end of life can be a challenge, this wiki page may be useful to
you: https://help.ubuntu.com/community/EOLUpgrades

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075542

Title:
  bind9 1:9.18.28-0ubuntu0.20.04.1 breakes local system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/2075542/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2075118] Re: PNG images in .deb don't match md5sums file or local build

2024-07-31 Thread Seth Arnold
Stephen, thanks for the excellent bug report.

I don't know Debian packaging well enough to point to the exact error in
the build rules, but this is the order of operations described in the
build log:

https://launchpadlibrarian.net/593502889/buildlog_ubuntu-jammy-
amd64.sunpy_3.1.5-1_BUILDING.txt.gz

...
   dh_gencontrol -O--buildsystem=pybuild
dpkg-gencontrol: warning: package python3-sunpy: substitution variable 
${python3:Provides} unused, but is defined
dpkg-gencontrol: warning: package python3-sunpy: substitution variable 
${python3:Versions} unused, but is defined
dpkg-gencontrol: warning: package python3-sunpy: substitution variable 
${python3:Provides} unused, but is defined
dpkg-gencontrol: warning: package python3-sunpy: substitution variable 
${python3:Versions} unused, but is defined
   dh_md5sums -O--buildsystem=pybuild
   dh_builddeb -O--buildsystem=pybuild
INFO: pkgstriptranslations version 149
INFO: pkgstriptranslations version 149
pkgstriptranslations: processing python3-sunpy (in debian/python3-sunpy); 
do_strip: , oemstrip: 
pkgstriptranslations: processing python3-sunpy-dbgsym (in 
debian/.debhelper/python3-sunpy/dbgsym-root); do_strip: , oemstrip: 
pkgmaintainermangler: Maintainer field overridden to "Ubuntu Developers 
"
pkgstripfiles: processing control file: debian/python3-sunpy/DEBIAN/control, 
package python3-sunpy, directory debian/python3-sunpy
pkgstripfiles: Truncating usr/share/doc/python3-sunpy/changelog.Debian.gz to 
topmost ten records
pkgstripfiles: Running PNG optimization (using 4 cpus) for package 
python3-sunpy ...
xargs: warning: options --max-lines and --replace/-I/-i are mutually exclusive, 
ignoring previous --max-lines value
oopkgmaintainermangler: Maintainer field overridden to "Ubuntu Developers 
"
pkgstripfiles: processing control file: 
debian/.debhelper/python3-sunpy/dbgsym-root/DEBIAN/control, package 
python3-sunpy-dbgsym, directory debian/.debhelper/python3-sunpy/dbgsym-root
dpkg-deb: building package 'python3-sunpy-dbgsym' in 
'debian/.debhelper/scratch-space/build-python3-sunpy/python3-sunpy-dbgsym_3.1.5-1_amd64.deb'.
Renaming python3-sunpy-dbgsym_3.1.5-1_amd64.deb to 
python3-sunpy-dbgsym_3.1.5-1_amd64.ddeb
oo
pkgstripfiles: PNG optimization (4/0) for package python3-sunpy took 6 s
dpkg-deb: building package 'python3-sunpy' in 
'../python3-sunpy_3.1.5-1_amd64.deb'.
...


Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075118

Title:
  PNG images in .deb don't match md5sums file or local build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sunpy/+bug/2075118/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2075118] Re: PNG images in .deb don't match md5sums file or local build

2024-07-31 Thread Seth Arnold
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075118

Title:
  PNG images in .deb don't match md5sums file or local build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sunpy/+bug/2075118/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073895] Re: [MIR] isa-support

2024-07-30 Thread Seth Arnold
There's a typo in the package description:

>   x86-64 architecture, corresponding to x86-65 psABI v1.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073895

Title:
  [MIR] isa-support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/isa-support/+bug/2073895/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074110] Re: Trying to resolve NordVpn configuration issues

2024-07-25 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074110

Title:
  Trying to resolve NordVpn configuration issues

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2074110/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074104] Re: package sgml-base 1.31 failed to install/upgrade: paleidikliai vykdomi ciklu, palikta

2024-07-25 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Attachment removed: "Dmesg.txt"
   
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2074104/+attachment/5800295/+files/Dmesg.txt

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074104

Title:
  package sgml-base 1.31 failed to install/upgrade: paleidikliai vykdomi
  ciklu, palikta

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sgml-base/+bug/2074104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073974] Re: package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to install/upgrade: problemas de dependencias - se deja sin configurar

2024-07-25 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073974

Title:
  package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to
  install/upgrade: problemas de dependencias - se deja sin configurar

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/proftpd-dfsg/+bug/2073974/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073735] Re: emacs-lucid (1:29.3+1-1ubuntu2) font-selection Ubuntu needs to be restarted

2024-07-25 Thread Seth Arnold
Hello Uwe, thanks for the bug report. On a first look this doesn't feel
like a security issue, it can probably be addressed by (a) removing
fonts (b) adding memory (c) limiting the memory available to the process
/ user and thus preventing the user from causing problems.

Does this allow crossing security boundaries?

Thanks

** Information type changed from Private Security to Public Security

** Changed in: emacs (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073735

Title:
  emacs-lucid (1:29.3+1-1ubuntu2) font-selection Ubuntu needs to be
  restarted

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/emacs/+bug/2073735/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073033] Re: request to /storage/v2/edit_partition crashed with Exception | I like specifc byte count with files in Gnome It is no longer available I use them for comparison Only GB & MB are avai

2024-07-25 Thread Seth Arnold
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073033

Title:
  request to /storage/v2/edit_partition crashed with Exception  |  I
  like specifc byte count with files in Gnome It is no longer available
  I use them for comparison Only GB & MB are available in this version
  of Gnome

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/2073033/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070807] Re: [MIR] highway

2024-07-23 Thread Seth Arnold
** Tags added: sec-4768

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070807

Title:
  [MIR] highway

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/highway/+bug/2070807/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073637] Re: Screen locking issue

2024-07-19 Thread Seth Arnold
Thanks, Mani. You're right, the photo is hard to see what's going on,
but it does show that something is visible when probably nothing should
be visible.

Thanks

** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073637

Title:
  Screen locking issue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2073637/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073167] Re: No puedo instalar

2024-07-19 Thread Seth Arnold
Hello, I think these lines in your logs mean that your system BIOS is
configured to prevent changing the boot environment. Look for
"antivirus" or "boot protection" in your BIOS.

Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: No se puede 
establecer la variable de EFI Boot0003.
Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: 
efivarfs_set_variable: writing to fd 8 failed: Argumento inválido.
Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: 
_efi_set_variable_mode: ops->set_variable() failed: Argumento inválido.
Jul 15 20:59:06 ubuntu grub-installer: grub-install: error: no se pudo 
registrar la entrada de arranque de EFI: Argumento inválido.

Thanks

** Information type changed from Private Security to Public

** Changed in: grub-installer (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073167

Title:
  No puedo instalar

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/2073167/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073016] Re: lock screen leaves left dock exposed and clickable

2024-07-19 Thread Seth Arnold
Hello Carlos. thanks for the report; if you've installed any gnome
extensions yourself, I'd suggest to remove them all as a first debugging
step. They are apparently very easy to screw up. If the problem goes
away, try bisecting your extensions to find out which one or combination
leads to the problem.

Thanks

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073016

Title:
  lock screen leaves left dock exposed and clickable

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2073016/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072917] Re: when installing ubuntu

2024-07-19 Thread Seth Arnold
Thank you for taking the time to report this bug and helping to make
Ubuntu better.  Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware.  I'd recommend
performing a back up and then investigating the situation.  Measures you
might take include checking cable connections and using software tools
to investigate the health of your hardware.  In the event that is is not
in fact an error with your hardware please set the bug's status back to
New.  Thanks and good luck!

** Information type changed from Private Security to Public

** Changed in: ubiquity (Ubuntu)
   Status: New => Invalid

** Changed in: ubiquity (Ubuntu)
   Importance: Undecided => Low

** Tags added: hardware-error

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072917

Title:
  when installing ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2072917/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073000] Re: many vulnerabilities on ubuntu20 package linux-image-aws - 5.15.0.1063.69

2024-07-19 Thread Seth Arnold
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073000

Title:
  many vulnerabilities on ubuntu20 package linux-image-aws -
  5.15.0.1063.69

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws-5.15/+bug/2073000/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2072406] Re: subtile flaw in kernel packet filter nftables

2024-07-19 Thread Seth Arnold
Thanks for the link to the upstream bug. I'll mirror their "wontfix"
here, as we're unlikely to invest the resources to invent new
functionality for the firewall that differs from upstream's choices.

** Changed in: linux (Ubuntu)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072406

Title:
  subtile flaw in kernel packet filter nftables

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2072406/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071631] Re: [81DE, Realtek ALC236, Mic, Internal] No sound at all

2024-07-19 Thread Seth Arnold
*** This bug is a duplicate of bug 2071633 ***
https://bugs.launchpad.net/bugs/2071633

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071631

Title:
  [81DE, Realtek ALC236, Mic, Internal] No sound at all

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/2071631/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073269] Re: Replace radsecret script to avoid new perl dependencies from universe

2024-07-16 Thread Seth Arnold
Of these three, I prefer the shell. (I know, I'm as surprised as you.)

Please use this version, unless there's a compelling reason to prefer
Python:

#!/bin/bash
data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z')
echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${data:16:4}


Why I prefer the shell version, and an important change I made to it:

The shell script executes in roughly 20% the time of the python scripts.
(4s vs 22s for 1000 iterations.)

We should be selecting 13 bytes, not 12, from /dev/urandom. (I'll show
why near the end.)

The very long python script has an unexpected behavior, so if this is
the version that is selected, it needs the same .rstrip('=') treatment
as the short one:

$ ./uuid1.py
376y-fuyc-d5a7-6sjz-uhwa-


When playing with the shell script I thought I noticed patterns in the last 
character of the output so I investigated further to make sure that these are 
actually emitting roughly what we expect:


$ for i in `seq 1 1`; do ./uuid ; done | ent -c
Value Char Occurrences Fraction
 101   0.04
 45   -4   0.16
 50   2 6056   0.024224
 51   3 5860   0.023440
 52   4 5946   0.023784
 53   5 6102   0.024408
 54   6 5951   0.023804
 55   7 5731   0.022924
 97   a10761   0.043044
 98   b 5887   0.023548
 99   c 5847   0.023388
100   d 5938   0.023752
101   e 5929   0.023716
102   f 5936   0.023744
103   g 5922   0.023688
104   h 5934   0.023736
105   i 5940   0.023760
106   j 5834   0.023336
107   k 5997   0.023988
108   l 6005   0.024020
109   m 5940   0.023760
110   n 6026   0.024104
111   o 6081   0.024324
112   p 5909   0.023636
113   q10947   0.043788
114   r 5918   0.023672
115   s 5892   0.023568
116   t 5908   0.023632
117   u 6033   0.024132
118   v 5912   0.023648
119   w 5934   0.023736
120   x 6067   0.024268
121   y 5892   0.023568
122   z 5965   0.023860

Total:25   1.00


$ for i in `seq 1 1`; do ./uuid1.py ; done | ent -c
Value Char Occurrences Fraction
 101   0.03
 45   -5   0.17
 50   2 5953   0.019843
 51   3 5972   0.019907
 52   4 5893   0.019643
 53   5 5943   0.019810
 54   6 5940   0.019800
 55   7 5770   0.019233
 61   =4   0.13 # 
 97   a10872   0.036240
 98   b 6011   0.020037
 99   c 5957   0.019857
100   d 5879   0.019597
101   e 5840   0.019467
102   f 5888   0.019627
103   g 5890   0.019633
104   h 5827   0.019423
105   i 5979   0.019930
106   j 5921   0.019737
107   k 5987   0.019957
108   l 5953   0.019843
109   m 6083   0.020277
110   n 5886   0.019620
111   o 6054   0.020180
112   p 5856   0.019520
113   q10923   0.036410
114   r 6013   0.020043
115   s 5894   0.019647
116   t 6021   0.020070
117   u 6038   0.020127
118   v 5859   0.019530
119   w 5928   0.019760
120   x 6000   0.02
121   y 5939   0.019797
122   z 6031   0.020103

Total:30   1.00


$ for i in `seq 1 1`; do ./uuid2.py ; done | ent -c
Value Char Occurrences Fraction
 101   0.04
 45   -4   0.16
 50   2 5967   0.023868
 51   3 5954   0.023816
 52   4 5864   0.023456
 53   5 5849   0.023396
 54   6 5967   0.023868
 55   7 5985   0.023940
 97   a11095   0.044380
 98   b 5892   0.023568
 99   c 5963   0.023852
100   d 5847   0.023388
101   e 5909   0.023636
102   f 5939   0.023756
103   g 5893   0.023572
104   h 5938   0.023752
105   i 6000   0.024000
106   j 6019   0.024076
107   k 5887   0.023548
108   l 5947   0.023788
109   m 5935   0.023740
110   n 5965   0.023860
111   o 6186   0.024744
112   p 5999   0.023996
113   q10918   0.043672
114   r 5966   0.023864
115   s 5755   0.023020
116   t 5820   0.023280
117   u 5935   0.023740
118   v 5858   0.023432
119   w 5881   0.023524
120   x 5997   0.023988
121   y 6039   0.024156
122   z 5831   0.023324

Total:25   1.00


The output is far more balanced if we select 13 bytes, instead of 12:

$ cat uuid13 
#!/bin/bash
data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z')
echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${data:16:4}

$ for i in `seq 1 1`; do ./uuid13 ; done | ent -c
Value Char Occurrences Fraction
 10100

[Bug 2072406] Re: subtile flaw in kernel packet filter nftables

2024-07-12 Thread Seth Arnold
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072406

Title:
  subtile flaw in kernel packet filter nftables

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2072406/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071815] Re: Investigate ASLR re-randomization being disabled for children

2024-07-11 Thread Seth Arnold
These might be related and might help the underlying problem:

https://github.com/openssh/openssh-portable/commit/8785491123d4d722b310c20f383570be758f8263
https://github.com/openssh/openssh-portable/commit/c0cb3b8c837761816a60a3cdb54062668df09652

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071815

Title:
  Investigate ASLR re-randomization being disabled for children

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2071815/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1999345] Re: please add luks2 module to the signed grub2 images

2024-07-08 Thread Seth Arnold
.. It turns out that this was a bad experience all around:

https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2043101

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999345

Title:
  please add luks2 module to the signed grub2 images

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1999345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071493]

2024-06-28 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071493

Title:
  UPnP should be turned off by default on focal & jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qbittorrent/+bug/2071493/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071493] Re: UPnP should be turned off by default on focal & jammy

2024-06-28 Thread Seth Arnold
Thanks for the report; what's the consequences of that configuration
change? I'm guessing that it would remove the qbittorrent administrative
interface from the public IP address of the UPnP router, with no way to
re-enable it. Is that correct?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071493

Title:
  UPnP should be turned off by default on focal & jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/qbittorrent/+bug/2071493/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070387] Re: python3: installed python3 package post-installation script subprocess returned error exit status 4

2024-06-27 Thread Seth Arnold
Hello Solaris, there's not much here to work with; please run apport-
collect 2070387 to attach some logs and package statuses to inspect.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070387

Title:
   python3: installed python3 package post-installation script
  subprocess returned error exit status 4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/2070387/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070387] Re: python3: installed python3 package post-installation script subprocess returned error exit status 4

2024-06-27 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070387

Title:
   python3: installed python3 package post-installation script
  subprocess returned error exit status 4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/2070387/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069308] Re: MIR xdg-terminal-exec

2024-06-27 Thread Seth Arnold
** Tags added: sec-4642

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069308

Title:
  MIR xdg-terminal-exec

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xdg-terminal-exec/+bug/2069308/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2070025] Re: [MIR] wsdd

2024-06-25 Thread Seth Arnold
** Tags added: sec-4626

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070025

Title:
  [MIR] wsdd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsdd/+bug/2070025/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1991859] Re: pro attach does not cope well with squid-deb-proxy ACLs

2024-06-24 Thread Seth Arnold
Awesome, thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1991859

Title:
  pro attach does not cope well with squid-deb-proxy ACLs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1991859/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069774] Re: package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed to install/upgrade: il sottoprocesso installato pacchetto linux-modules-nvidia-535-6.8.0-35-generic script post-i

2024-06-21 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069774

Title:
  package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed
  to install/upgrade: il sottoprocesso installato pacchetto linux-
  modules-nvidia-535-6.8.0-35-generic script post-installation ha
  restituito lo stato di errore 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-restricted-modules/+bug/2069774/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069499] Re: ubuntu install failed

2024-06-21 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069499

Title:
  ubuntu install failed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2069499/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069523] Re: package click 0.5.2-2ubuntu4 failed to install/upgrade: installed click package post-installation script subprocess returned error exit status 1

2024-06-21 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069523

Title:
  package click 0.5.2-2ubuntu4 failed to install/upgrade: installed
  click package post-installation script subprocess returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/2069523/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069308] Re: MIR xdg-terminal-exec

2024-06-18 Thread Seth Arnold
I'm curious if a config change in xdg-utils is all that's needed to get
something similar:

$ locate xdg-terminal x/xdg-utils
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1.16.04.5/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1.16.04.5/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2.5/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.2-1ubuntu2.5/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1.20.04.2/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-2ubuntu1.20.04.2/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu1/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3/scripts/desc/xdg-terminal.xml
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3~22.04.1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.3-4.1ubuntu3~22.04.1/scripts/desc/xdg-terminal.xml

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069308

Title:
  MIR xdg-terminal-exec

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xdg-terminal-exec/+bug/2069308/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069464] Re: On Ubuntu 24.04 installed auditd=1:3.1.2-2.1build1, The audit log starts printing on the console the error of audit: error in audit_log_object_context when deactivate apparmor and ac

2024-06-14 Thread Seth Arnold
SELinux and AppArmor both do pretty significant configuration during
early boot, I can't imagine that live switching between the two at
runtime is going to be well supported by anything.

If you intend to replace AppArmor with SELinux, you should do that via
the kernel command line flags so that the early configuration is
correct. I think it would be something like lsm=selinux,capability,yama
depending upon which modules you want to load and in which order they
need to load.

Thanks

** Changed in: audit (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069464

Title:
  On Ubuntu 24.04 installed auditd=1:3.1.2-2.1build1, The audit log
  starts printing on the console the error of audit: error in
  audit_log_object_context when deactivate apparmor and activate selinux

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/audit/+bug/2069464/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069394] Re: package openssh-server 1:8.9p1-3ubuntu0.7 failed to install/upgrade: installed openssh-server package post-installation script subprocess returned error exit status 10

2024-06-14 Thread Seth Arnold
I suspect that you've got a local problem with this configuration file,
try reinstalling openssh-server but with some flags to force replacing
the missing and changed configuration files:

sudo apt-get --yes reinstall -o Dpkg::Options::="--force-confnew" -o
Dpkg::Options::="--force-confmiss openssh-server

Incidentally your mongodb is very unhappy, there's 171 instances of
errors like this in your logs:

[571662.165758] traps: mongod[2882116] trap invalid opcode
ip:65329d429c0a sp:7fff9b7a3900 error:0 in mongod[653299318000+527e000]

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069394

Title:
  package openssh-server 1:8.9p1-3ubuntu0.7 failed to install/upgrade:
  installed openssh-server package post-installation script subprocess
  returned error exit status 10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/2069394/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060676] Re: login: remove pam_lastlog.so from config

2024-06-14 Thread Seth Arnold
Andrei, try to log in via multiple methods. Every service (ssh, login,
gdm, xdm, etc) has its own PAM configuration and some of them may
reference this module and some may not.

Once you've logged in, edit the files in /etc/pam.d/ that reference this
module. Remove or comment them out. Save, then test. Don't quit any root
shells in the process of testing, because changing PAM configuration can
lock you out of your system -- as you've discovered.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060676

Title:
  login: remove pam_lastlog.so from config

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/2060676/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069300] Re: Xorg crash

2024-06-14 Thread Seth Arnold
These nvidia drivers look really unhappy, the first trace:

[   11.997286] [ cut here ]
[   11.997290] UBSAN: array-index-out-of-bounds in 
build/nvidia/535.171.04/build/nvidia-uvm/uvm_pmm_gpu.c:2364:28
[   11.997293] index 0 is out of range for type 'uvm_gpu_chunk_t *[*]'
[   11.997296] CPU: 15 PID: 2599 Comm: ollama Tainted: P   O   
6.8.0-35-generic #35-Ubuntu
[   11.997298] Hardware name: HP Victus by HP Gaming Laptop 16-s0xxx/8BD5, BIOS 
F.20 03/20/2024
[   11.997300] Call Trace:
[   11.997301]  
[   11.997305]  dump_stack_lvl+0x48/0x70
[   11.997313]  dump_stack+0x10/0x20
[   11.997315]  __ubsan_handle_out_of_bounds+0xc6/0x110
[   11.997320]  split_gpu_chunk+0x13f/0x410 [nvidia_uvm]
[   11.997346]  uvm_pmm_gpu_alloc+0x2da/0x6d0 [nvidia_uvm]
[   11.997366]  phys_mem_allocate+0xac/0x230 [nvidia_uvm]
[   11.997389]  allocate_directory+0xb4/0x130 [nvidia_uvm]
[   11.997405]  ? allocate_directory+0xb4/0x130 [nvidia_uvm]
[   11.997422]  uvm_page_tree_init+0x133/0x450 [nvidia_uvm]
[   11.997442]  uvm_gpu_retain_by_uuid+0x19df/0x2b80 [nvidia_uvm]
[   11.997461]  ? __mod_memcg_lruvec_state+0xd6/0x1a0
[   11.997468]  uvm_va_space_register_gpu+0x47/0x740 [nvidia_uvm]
[   11.997486]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997489]  ? bdev_getblk+0x53/0x90
[   11.997493]  uvm_api_register_gpu+0x5a/0x90 [nvidia_uvm]
[   11.997510]  uvm_ioctl+0x1a26/0x1cd0 [nvidia_uvm]
[   11.997526]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997528]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997530]  ? xas_find+0x74/0x1e0
[   11.997533]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997535]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997537]  ? next_uptodate_folio+0xa9/0x320
[   11.997541]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997542]  ? _raw_spin_lock_irqsave+0xe/0x20
[   11.997546]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997548]  ? thread_context_non_interrupt_add+0x13a/0x250 [nvidia_uvm]
[   11.997568]  uvm_unlocked_ioctl_entry.part.0+0x7b/0xf0 [nvidia_uvm]
[   11.997584]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997586]  ? do_read_fault+0x112/0x1d0
[   11.997589]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997591]  ? do_fault+0x109/0x350
[   11.997592]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997595]  uvm_unlocked_ioctl_entry+0x6b/0x90 [nvidia_uvm]
[   11.997610]  __x64_sys_ioctl+0xa0/0xf0
[   11.997613]  x64_sys_call+0x143b/0x25c0
[   11.997616]  do_syscall_64+0x7f/0x180
[   11.997619]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997621]  ? __count_memcg_events+0x6b/0x120
[   11.997624]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997625]  ? count_memcg_events.constprop.0+0x2a/0x50
[   11.997628]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997630]  ? handle_mm_fault+0xad/0x380
[   11.997633]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997634]  ? do_user_addr_fault+0x338/0x6b0
[   11.997637]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997639]  ? irqentry_exit_to_user_mode+0x7b/0x260
[   11.997641]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997643]  ? irqentry_exit+0x43/0x50
[   11.997644]  ? srso_alias_return_thunk+0x5/0xfbef5
[   11.997646]  ? exc_page_fault+0x94/0x1b0
[   11.997648]  entry_SYSCALL_64_after_hwframe+0x78/0x80
[   11.997650] RIP: 0033:0x78462c924ded
[   11.997672] Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 
10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 
00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00
[   11.997674] RSP: 002b:7845dcbff4a0 EFLAGS: 0246 ORIG_RAX: 
0010
[   11.997676] RAX: ffda RBX: 7845bbd00860 RCX: 78462c924ded
[   11.997678] RDX: 7845dcbff540 RSI: 0025 RDI: 0008
[   11.997679] RBP: 7845dcbff4f0 R08: 7845bbd008f0 R09: 
[   11.997680] R10: 78462c80d630 R11: 0246 R12: 7845b003b8b6
[   11.997681] R13: 7845bbd008f0 R14: 7845dcbff540 R15: 0008
[   11.997684]  
[   11.997692] ---[ end trace ]---

** Also affects: nvidia-graphics-drivers-535 (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069300

Title:
  Xorg crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2069300/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2069086] Re: package golang-github-googlecloudplatform-guest-logging-go-dev (not installed) failed to install/upgrade: intentando sobreescribir `/usr/share/gocode/src/github.com/GoogleCloudPlatfo

2024-06-14 Thread Seth Arnold
There's at least two errors here:

- the title describes two packages that own the same file, these should
both be fixed

- the dpkg terminal log looks a bit like a full filesystem:

Setting up apache2-bin (2.4.41-4ubuntu3.14) ...
Setting up mysql-server (8.0.33-0ubuntu0.20.04.2) ...
Setting up libapache2-mod-php7.4 (7.4.3-4ubuntu2.18) ...
Package apache2 is not configured yet. Will defer actions by package 
libapache2-mod-php7.4.

Creating config file /etc/php/7.4/apache2/php.ini with new version
No module matches 
Setting up apache2 (2.4.41-4ubuntu3.14) ...
Enabling module mpm_event.
Enabling module authz_core.
Enabling module authz_host.
Enabling module authn_core.
Enabling module auth_basic.
Enabling module access_compat.
Enabling module authn_file.
Enabling module authz_user.
Enabling module alias.
Enabling module dir.
Enabling module autoindex.
Enabling module env.
Enabling module mime.
Enabling module negotiation.
Enabling module setenvif.
Enabling module filter.
Enabling module deflate.
Enabling module status.
Enabling module reqtimeout.
Enabling conf charset.
Enabling conf localized-error-pages.
Enabling conf other-vhosts-access-log.
Enabling conf security.
Enabling conf serve-cgi-bin.
Enabling site 000-default.
info: Switch to mpm prefork for package libapache2-mod-php7.4
Module mpm_event disabled.
Enabling module mpm_prefork.
info: Executing deferred 'a2enmod php7.4' for package libapache2-mod-php7.4
Enabling module php7.4.
Created symlink /etc/systemd/system/multi-user.target.wants/apache2.service → 
/lib/systemd/system/apache2.service.
Created symlink 
/etc/systemd/system/multi-user.target.wants/apache-htcacheclean.service → 
/lib/systemd/system/apache-htcacheclean.service.
Setting up php7.4 (7.4.3-4ubuntu2.18) ...
Setting up libapache2-mod-php (2:7.4+75) ...
Setting up php (2:7.4+75) ...
Processing triggers for ufw (0.36-6ubuntu1) ...
Processing triggers for systemd (245.4-4ubuntu3.22) ...
Processing triggers for man-db (2.9.1-1) ...
Processing triggers for libc-bin (2.31-0ubuntu9.9) ...
Processing triggers for linux-image-5.15.0-75-generic (5.15.0-75.82~20.04.1) ...
/etc/kernel/postinst.d/initramfs-tools:
update-initramfs: Generating /boot/initrd.img-5.15.0-75-generic
I: The initramfs will attempt to resume from /dev/sda2
I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38)
I: Set the RESUME variable to override this.
Error 24 : Write error : cannot write compressed block 
E: mkinitramfs failure cpio 141 lz4 -9 -l 24
update-initramfs: failed for /boot/initrd.img-5.15.0-75-generic with 1.
run-parts: /etc/kernel/postinst.d/initramfs-tools exited with return code 1
dpkg: error processing package linux-image-5.15.0-75-generic (--configure):
 installed linux-image-5.15.0-75-generic package post-installation script 
subprocess returned error exit status 1
Processing triggers for initramfs-tools (0.136ubuntu6.7) ...
update-initramfs: Generating /boot/initrd.img-5.15.0-72-generic
I: The initramfs will attempt to resume from /dev/sda2
I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38)
I: Set the RESUME variable to override this.
Error 24 : Write error : cannot write compressed block 
E: mkinitramfs failure cpio 141 lz4 -9 -l 24
update-initramfs: failed for /boot/initrd.img-5.15.0-72-generic with 1.
dpkg: error processing package initramfs-tools (--configure):
 installed initramfs-tools package post-installation script subprocess returned 
error exit status 1
Processing triggers for php7.4-cli (7.4.3-4ubuntu2.18) ...
Processing triggers for libapache2-mod-php7.4 (7.4.3-4ubuntu2.18) ...
Errors were encountered while processing:
 linux-firmware
 linux-image-generic-hwe-20.04
 linux-generic-hwe-20.04
 linux-image-5.15.0-75-generic
 initramfs-tools
Log ended: 2023-06-17  12:02:43

Log started: 2023-06-17  12:07:36
Setting up linux-image-5.15.0-75-generic (5.15.0-75.82~20.04.1) ...
Setting up initramfs-tools (0.136ubuntu6.7) ...
update-initramfs: deferring update (trigger activated)
Setting up linux-firmware (1.187.39) ...
update-initramfs: Generating /boot/initrd.img-5.15.0-72-generic
I: The initramfs will attempt to resume from /dev/sda2
I: (UUID=068b70be-bb90-4e9d-9953-ca6e74332f38)
I: Set the RESUME variable to override this.
Error 24 : Write error : cannot write compressed block 
E: mkinitramfs failure cpio 141 lz4 -9 -l 24
update-initramfs: failed for /boot/initrd.img-5.15.0-72-generic with 1.
dpkg: error processing package linux-firmware (--configure):
 installed linux-firmware package post-installation script subprocess returned 
error exit status 1
dpkg: dependency problems prevent configuration of 
linux-image-generic-hwe-20.04:
 linux-image-generic-hwe-20.04 depends on linux-firmware; however:
  Package linux-firmware is not configured yet.

dpkg: error processing package linux-image-generic-hwe-20.04 (--configure):
 dependency problems - leaving unconfigured
dpkg: dependency problems prevent configuration of linux-generic-hwe-20.04:
 linux-generic-hwe-20.04 depends on linux-image-generic-hwe-20.04 (= 
5.

[Bug 2068822] Re: unable to detach live patch as I try to do it because I was unable to see livepatch icon in top

2024-06-14 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068822

Title:
  unable to detach live patch as I try to do it because I was unable to
  see livepatch icon in top

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/2068822/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068823] Re: gofmt in golang-1.22-go flagged by multiple EDR software

2024-06-14 Thread Seth Arnold
Hello Ariel, thanks for the report; does Google say what exactly is
wrong with this file?

Thanks

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068823

Title:
  gofmt in golang-1.22-go flagged by multiple EDR software

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/golang-1.22/+bug/2068823/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068729] Re: pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not supported by protocol

2024-06-14 Thread Seth Arnold
Real, Lena is trying to fix the bug you reported. It would be helpful if
you could test the fix.

I suggest reading the https://wiki.ubuntu.com/StableReleaseUpdates page
to better understand our process.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068729

Title:
  pam_radius_auth: Failed to open RADIUS IPv6 socket: Address family not
  supported by protocol

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libpam-radius-auth/+bug/2068729/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068787] Re: ubuntu-release-upgrader

2024-06-14 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068787

Title:
  ubuntu-release-upgrader

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2068787/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068698] Re: i recently start using ubuntu 24.04 version but facing lot of issues like crashing app late reposnse text disappear sometime when i open file manager . somethimes wifi not showing af

2024-06-14 Thread Seth Arnold
Probably this should be multiple bug reports, one per problem, but just
in case this sounds familiar to someone else...

** Information type changed from Private Security to Public

** Package changed: ubuntu-meta (Ubuntu) => ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068698

Title:
  i recently start using ubuntu 24.04 version but facing lot of issues
  like crashing app  late reposnse text disappear sometime when i open
  file manager . somethimes  wifi not showing after some restart it work
  fine.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2068698/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068601] Re: package amd64-microcode 3.20191218.1ubuntu2.1 failed to install/upgrade: podproces dpkg-deb --control zwrócił kod błędu 2

2024-06-14 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068601

Title:
  package amd64-microcode 3.20191218.1ubuntu2.1 failed to
  install/upgrade: podproces dpkg-deb --control zwrócił kod błędu 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amd64-microcode/+bug/2068601/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066269] Re: [MIR] sysprof

2024-06-14 Thread Seth Arnold
** Tags added: sec-4574

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066269

Title:
  [MIR] sysprof

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sysprof/+bug/2066269/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067373] Re: [MIR] provd

2024-06-04 Thread Seth Arnold
** Tags added: sec-4374

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067373

Title:
  [MIR] provd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2067373/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067971] Re: System crached when using multi internet browsers

2024-06-03 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067971

Title:
  System crached when using multi internet browsers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067971/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067971] Re: System crached when using multi internet browsers

2024-06-03 Thread Seth Arnold
Hello, your logs are full of very unhappy messages. I'm hoping that this
is the root of all your problems:

[ 1509.531045] usb usb3-port11: Cannot enable. Maybe the USB cable is
bad?

but it's possible that your hardware is broken enough that this is just
a bad guess.

I suggest finding someone to help you troubleshoot your problems with
you, either from IRC or askubuntu.com or a local user group, etc.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067971

Title:
  System crached when using multi internet browsers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067971/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067910] Re: gatewayd service listens on all interfaces by default

2024-06-03 Thread Seth Arnold
Hello James, thanks for the report.

If I were designing this thing myself I certainly would have had
different packages for journal sending than journal receiving, but
whoever implemented it wanted to offer to both pull and push models and
allow on-demand journal collecting from hosts.

Given that most people using this will want to configure it to either
accept logs from some sources or push logs to sinks, basically every
installation will require configuration, which might mean turning this
off entirely or configuring it for specific interfaces, as you have
done.

Certainly it's not ideal as it is. I assume it comes in part from the
Debian Policy saying that daemons should be configured and running by
default after installing packages -- another thing I wish were different
from the start, but would be an immense challenge to change at this
point.

Anyway, I suspect this isn't likely to be a place where we'd want to
deviate from Debian's choices, so I've marked this wontfix. If I'm
wrong, surely someone will change that back.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067910

Title:
  gatewayd service listens on all interfaces by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2067910/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067910] Re: gatewayd service listens on all interfaces by default

2024-06-03 Thread Seth Arnold
** Information type changed from Private Security to Public Security

** Changed in: systemd (Ubuntu)
   Status: New => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067910

Title:
  gatewayd service listens on all interfaces by default

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2067910/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067484] Re: Setting up tcpdump (4.9.3-4ubuntu0.3) ... useradd: cannot open /etc/passwd adduser: `/usr/sbin/useradd -d /nonexistent -g tcpdump -s /usr/sbin/nologin -u 114 tcpdump' returned error

2024-05-29 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067484

Title:
  Setting up tcpdump (4.9.3-4ubuntu0.3) ... useradd: cannot open
  /etc/passwd adduser: `/usr/sbin/useradd -d /nonexistent -g tcpdump -s
  /usr/sbin/nologin -u 114 tcpdump' returned error code 1. Exiting.
  dpkg: error processing package tcpdump (--configure):  installed
  tcpdump package post-installation script subprocess returned error
  exit status 1 Errors were encountered while processing:  tcpdump
  Upgrade complete  The upgrade has completed but there were errors d

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tcpdump/+bug/2067484/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067416] Re: ubuntu-bug xorg

2024-05-29 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067416

Title:
  ubuntu-bug xorg

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2067416/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 244250] Re: Spurious reboot notifications caused by libssl upgrades.

2024-05-29 Thread Seth Arnold
Adrien, thanks so much for digging into this again.

This is so very complicated, why does openssl need special handling in
the world of needrestart? My inclination is to remove all this
complexity and address any shortcomings of needrestart in the
needrestart package. Am I off base?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/244250

Title:
  Spurious reboot notifications caused by libssl upgrades.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/244250/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067176] Re: Boot and memory test errors in grub

2024-05-29 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067176

Title:
  Boot and memory test errors in grub

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2067176/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067216] Re: error id modified the contents of /etc/update-manager/releaes-upgrades

2024-05-29 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067216

Title:
  error id modified the contents of   /etc/update-manager/releaes-
  upgrades

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2067216/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067216] Re: error id modified the contents of /etc/update-manager/releaes-upgrades

2024-05-29 Thread Seth Arnold
Hello, I believe this means that the mirror you are using does not yet
have the Ubuntu 24.04 LTS release.

2024-05-26 23:21:19,553 DEBUG s='http' n='mirrors.piconets.webwerks.in' 
p='/ubuntu-mirror/ubuntu//dists/noble/Release' q='' f=''
2024-05-26 23:21:19,619 DEBUG error from httplib: 'HTTP Error 404: Not Found'

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067216

Title:
  error id modified the contents of   /etc/update-manager/releaes-
  upgrades

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2067216/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067249] Re: cannot access ubuntu desktop or upgrade as passwords fail no authentification

2024-05-29 Thread Seth Arnold
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067249

Title:
  cannot access ubuntu desktop or upgrade as passwords fail no
  authentification

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/accountsservice/+bug/2067249/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065845] Re: installation crash

2024-05-28 Thread Seth Arnold
I can't promise that this is your problem but it looks like trouble:

May 16 05:04:15 ubuntu ubiquity: /dev/sda5: Inodes that were part of a 
corrupted orphan linked list found.
May 16 05:04:15 ubuntu ubiquity: 
May 16 05:04:15 ubuntu ubiquity: /dev/sda5: UNEXPECTED INCONSISTENCY; RUN fsck 
MANUALLY.
May 16 05:04:15 ubuntu ubiquity: #011(i.e., without -a or -p options)
May 16 05:04:19 ubuntu ubiquity: resize2fs 1.44.1 (24-Mar-2018)
May 16 05:04:19 ubuntu ubiquity: Please run 'e2fsck -f /dev/sda5' first.
May 16 05:04:19 ubuntu ubiquity: 
May 16 05:04:19 ubuntu partman: Error resizing the ext2/ext3/ext4 file system

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065845

Title:
  installation crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2065845/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065918] Re: Impossible to benefit from latest Linux security update

2024-05-28 Thread Seth Arnold
*** This bug is a duplicate of bug 2065678 ***
https://bugs.launchpad.net/bugs/2065678

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065918

Title:
  Impossible to benefit from latest Linux security update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-545/+bug/2065918/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065510] Re: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes

2024-05-28 Thread Seth Arnold
I've poked around a little bit and think this might not justify much
time to fix:

- it's suggested to be used in the initramfs, presumably before untrusted users 
are executing
- it's apparently not going to work with luks2 format, only luks1, and I 
believe we've switched the default to luks2

In an ideal world this would be written in a better language, but if it
hasn't already happened then it probably won't happen.

Thanks

** Changed in: cryptsetup (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065510

Title:
  /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to
  non-root processes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/2065510/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065510] Re: /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to non-root processes

2024-05-28 Thread Seth Arnold
Nice find, Hadmut, thanks.

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065510

Title:
  /lib/cryptsetup/scripts/decrypt_derived reveals encryption keys to
  non-root processes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/2065510/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2046609] Re: sync request: netatalk 3.1.18~ds-1 Debian sid main

2024-05-28 Thread Seth Arnold
Abraham, if you've got an easy test case for this, it might be useful to
test the various versions released into 22.04 LTS:
https://launchpad.net/ubuntu/jammy/+source/netatalk

eg:

pull-lp-debs netatalk jammy 3.1.12~ds-9ubuntu0.22.04.1

for all the versions listed, then try them in turn.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2046609

Title:
  sync request: netatalk 3.1.18~ds-1 Debian sid main

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netatalk/+bug/2046609/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1461834] Re: 1024-bit signing keys should be deprecated

2024-05-28 Thread Seth Arnold
Jake, some progress is underway for Launchpad to automatically sign PPAs
with RSA4096 keys https://discourse.ubuntu.com/t/new-requirements-for-
apt-repository-signing-in-24-04/42854

It's also possible to dual-sign non-ppa repositories, eg:

curl -s http://archive.ubuntu.com/ubuntu/dists/focal-updates/InRelease
| gpg --verify

This can really help migrating from unsafe key sizes to safe key sizes.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1461834

Title:
  1024-bit signing keys should be deprecated

To manage notifications about this bug go to:
https://bugs.launchpad.net/launchpad/+bug/1461834/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1999490] Re: Missing CVE in Nvidia driver 515 packages

2024-05-23 Thread Seth Arnold
I think we fixed this in December 2022:

https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/+bug/1997087

https://git.launchpad.net/ubuntu-cve-
tracker/tree/active/CVE-2022-34673#n360

Thanks

** Information type changed from Private Security to Public Security

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-34673

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999490

Title:
  Missing CVE in Nvidia driver 515 packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-515/+bug/1999490/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1673431] Re: Make kernel readable by non-root users

2024-05-23 Thread Seth Arnold
Hello KolAflash, thanks for writing; the wiki page in question has this
suggestion:

# echo "UMASK=0077" >> /etc/initramfs-tools/initramfs.conf

Which should take care of the secrets in case the administrator chooses
to use this mechanism to automatically supply keys to LUKS, right?

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1673431

Title:
  Make kernel readable by non-root users

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libguestfs/+bug/1673431/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2037897] Re: FreeCAD unable to create new document under wayland

2024-05-07 Thread Seth Arnold
** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2037897

Title:
  FreeCAD unable to create new document under wayland

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/freecad/+bug/2037897/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1829588] Re: make it easy to add proposed; help text outdated

2024-05-04 Thread Seth Arnold
Apparently this exists now via the new -p flag, but doesn't currently
work in releases with deb822 formatted sources lists:
https://bugs.launchpad.net/ubuntu/+source/software-
properties/+bug/2061128

** Changed in: software-properties (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829588

Title:
  make it easy to add proposed; help text outdated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/1829588/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064750] Re: block probing crashed with ValueError

2024-05-03 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064750

Title:
  block probing crashed with ValueError

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/2064750/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064685] Re: write says write: effective gid does not match group of /dev/pts/5

2024-05-02 Thread Seth Arnold
Hello Robert, I believe this is intentional.

If you wish to restore the previous behavior, it should be sufficient to
change /usr/bin/write.ul to root:tty 02755.

Thanks

** Changed in: util-linux (Ubuntu)
   Status: New => Confirmed

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064685

Title:
  write says write: effective gid does not match group of /dev/pts/5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/2064685/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-05-02 Thread Seth Arnold
Two different services attempting to bind on a single (IP, port) tuple
is going to lead to a failure of one of the services. Prior to this
update it was a silent failure, which serves only to make debugging
problems more difficult.

I can empathize with the feeling that things shouldn't break in an LTS
release, but it was quietly broken already.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064479] Re: file error keeps repeating after any Terminal installation with APT this is the error I receive "open `20auto-upgrades.merge-error"

2024-05-02 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064479

Title:
  file error keeps repeating after any Terminal installation with APT
  this is the error I receive "open `20auto-upgrades.merge-error"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2064479/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064353] Re: nslookup - hit enter with no args or options, prompt advances one line and shows a > operator; then hit ctrl c and normal prompt returns, but now all entries typed at prompt are invi

2024-05-02 Thread Seth Arnold
Hello Spencer, thanks for the report. This is pretty common with
programs that provide a more "interactive" experience. There's two tools
that can help recover from this, reset(1) and stty(1). When this
happens, run:

reset
or
stty sane

Both should fix this specific case. But sometimes one or the other one
is required to fix your terminal, so it's helpful to know both of them.

Thanks

** Information type changed from Private Security to Public

** Changed in: bind9 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064353

Title:
  nslookup - hit enter with no args or options, prompt advances one line
  and shows a > operator; then hit ctrl c and normal prompt returns, but
  now all entries typed at prompt are invisible as though entering a
  sudo password; commands still execute.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind9/+bug/2064353/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064306] Re: error

2024-05-02 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064306

Title:
  error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2064306/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064141] Re: default config in noble prevents start of fail2ban

2024-05-02 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064141

Title:
  default config in noble prevents start of fail2ban

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fail2ban/+bug/2064141/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064007] Re: execve from NetworkManager fails - wrong path in app-armor profile?

2024-05-02 Thread Seth Arnold
Hello Christopher, thanks for the bug report. Note that due to ISC
stepping back from their DHCP packages, we've switched to dhcpcd as the
"default" dhcp client. Probably a patch to fix this would be accepted,
but it might not be anybody's priority to work on it.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064007

Title:
  execve from NetworkManager fails - wrong path in app-armor profile?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/2064007/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063932] Re: ULTS 24 AppArmor configuration parsing and loading error

2024-05-02 Thread Seth Arnold
** Information type changed from Private Security to Public

** Changed in: apparmor (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063932

Title:
  ULTS 24 AppArmor configuration parsing and loading error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2063932/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063927] Re: package libc6 2.35-0ubuntu3.6 failed to install/upgrade: yeni libc6:amd64 paketi pre-installation betiği alt süreci 2 hatalı çıkış kodu ile sona erdi

2024-05-02 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063927

Title:
  package libc6 2.35-0ubuntu3.6 failed to install/upgrade: yeni
  libc6:amd64 paketi pre-installation betiği alt süreci 2 hatalı çıkış
  kodu ile sona erdi

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2063927/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064192] Re: Unable to resize windows

2024-05-02 Thread Seth Arnold
** Package changed: ubuntu => gnome-shell (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064192

Title:
  Unable to resize windows

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2064192/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2064530] Re: Include support for .NET 8 for Ubuntu on Power

2024-05-01 Thread Seth Arnold
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been trivial then, I don't know
what the path is for this now, but it won't be as quick and easy.

I suggest working on a debdiff for the dotnet8 package to get it to
build and pass the test suites etc.

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064530

Title:
  Include support for .NET 8 for Ubuntu on Power

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2064530/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062667] Re: Fails on (and should be removed from) raspi desktop

2024-04-29 Thread Seth Arnold
I'm having trouble seeing what the consequences are:

> the result is a permanently failed service

vs

> this is was a major annoyance on my m2 air after upgrading to noble

Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other service if it isn't
running?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062667

Title:
  Fails on (and should be removed from) raspi desktop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug/2062667/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054296] Re: Don't restrict to linux-laptop

2024-04-29 Thread Seth Arnold
@Tobias, that bug is 15 years old. Perhaps you meant another one?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054296

Title:
  Don't restrict to linux-laptop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/protection-domain-mapper/+bug/2054296/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056627] Re: PHPStorm crashes when opening a project

2024-04-26 Thread Seth Arnold
The unfortunate thing with AppImage is that there's no easy default path
that can be confined as can be done for other systems. So you'll need to
construct an AppArmor profile for your applications following the
instructions at https://discourse.ubuntu.com/t/noble-numbat-release-
notes/39890#unprivileged-user-namespace-restrictions-15

Thanks

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056627

Title:
  PHPStorm crashes when opening a project

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/2056627/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063830] Re: package nginx-core (not installed) failed to install/upgrade: installed nginx-core package post-installation script subprocess returned error exit status 1

2024-04-26 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063830

Title:
  package nginx-core (not installed) failed to install/upgrade:
  installed nginx-core package post-installation script subprocess
  returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nginx/+bug/2063830/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2041751] Re: RM: Remove dangerously insecure MPPE PPTP from Ubuntu

2024-04-26 Thread Seth Arnold
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2041751

Title:
  RM: Remove dangerously insecure MPPE PPTP from Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2041751/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063536] Re: flickering screen

2024-04-26 Thread Seth Arnold
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063536

Title:
  flickering screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2063536/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >