$ dpkg -l systemd rsyslog | cat
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name Version Architecture Description
+++-==-
Public bug reported:
Similar to bug 1484027, but that's marked 'Fix released', so something
must have regressed in the meantime.
$ journalctl | grep "Duplicate line" | wc -l
58
$ grep "/var/log " /usr/lib/tmpfiles.d/*
/usr/lib/tmpfiles.d/00rsyslog.conf:# Override systemd's default
tmpfiles.d/va
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1727933
Title:
as
Status in xorg package in Ubuntu:
New
Bug des
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Kevin, I don't want to step on Colin's toes here, but I couldn't
sort out anything from the logs or files so far. I've had success before
with perf to grab call graph information. The usual process is along the
lines of:
- enable the ddebs.ubuntu.com repository to get access to debug symbols
>From journal.txt in the adt artifacts:
Oct 25 13:55:35 autopkgtest systemd[1]: lightdm.service: Main process exited,
code=exited, status=1/FAILURE
Oct 25 13:55:35 autopkgtest systemd[1]: lightdm.service: Unit entered failed
state.
Oct 25 13:55:35 autopkgtest systemd[1]: lightdm.service: Failed
When I run the systemd tests locally using autopkgtest I cannot
reproduce this failure.
** Tags removed: kernel-adt-failure
** Tags added: kernel-adt-failure-hwe-edge-4.13
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to syste
boot-smoke test fails:
checking that there are no running jobs
FAIL: expected: '' actual: '550 lightdm.service start running'
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-xenial/xenial/amd64/s/systemd/20171025_152041_0db62@/log.gz
** Affects: systemd (Ubuntu)
Importance: Undecided
Status: New
** T
Hello Aleksandr,
I believe this is expected behaviour: when a GUI program is suspended,
the GUI cannot respond to events. Running 'fg' or 'bg' in the shell will
cause it to resume, and respond to clicks.
Thanks
** Package changed: ecryptfs-utils (Ubuntu) => apport (Ubuntu)
** Changed in: apport
** Changed in: ufw (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/1726856
Title:
ufw does not start automatically at boot
Status in
Hi Matt, can you give the output of:
systemctl status ufw
and
journalctl -u ufw.service
Thanks
** Changed in: ufw (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
ht
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
*** This bug is a duplicate of bug 1714792 ***
https://bugs.launchpad.net/bugs/1714792
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libunity in Ubuntu.
https://bugs.launchpad.net/bugs/1725933
Title:
package libunity9 7.1.4+17.10.20170605-0ubuntu1
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1725651
Title:
package passwd 1:4.2-3.2ubuntu1.17.04.2 failed to
Added xenial nomination for initramfs-tools to add vmd.ko to initrd for
16.04.4.
** Also affects: initramfs-tools (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1725385
Title:
one
Status in xorg package in Ubuntu:
New
Bug de
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to telepathy-mission-
control-5 in Ubuntu.
https://bugs.launchpad.net/bugs/1725227
Title:
mission-control-5 crashed wi
Thanks Brian; should we retarget this bug to dpkg to get it to show
different output? or is it still apport that is collecting ellipsized
logs?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.lau
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/1723753
Title:
packagekitd crashed with SIGSEGV in std::vecto
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1723744
Title:
My ubuntu software not working
Status in xorg packa
** Also affects: initramfs-tools (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1703339
Title:
Unable to insta
I believe both promote_secondaries and default qdisc changes are good
changes for our distribution to make.
I'd like to abstain from the judgment of making the change for existing
releases via an SRU. (Be sure to make sure this change is obvious and
easy to search for in package changelog please.
Someone may have to actually describe what's going on...
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1719579
Title:
[Ubuntu 16.04.2] [libvirt] virsh restore fails from
Hello Lewis, could you please run apport-collect 1717517 ? That should
gather some log files and attach them to this bug for inspection.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.
*** This bug is a duplicate of bug 1717589 ***
https://bugs.launchpad.net/bugs/1717589
** This bug has been marked a duplicate of bug 1717589
package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subprocess
installed post-installation script returned error exit status 1
** Information
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1717589
Title:
package bluez 5.37-0ubuntu5.1 failed to install/upg
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1717256
Title:
ca-certificates post-install hook crashes
Gábor, systemd is well-meaning in providing namespacing features so the
thousands of daemons that are in the world don't have to re-implement
something similar. But of course the kernel hook points used by AppArmor
don't provide sufficient information to know what pathname to
reconstruct when the n
Hello, I recommend installing the mcelog package if you haven't done so
yet. Your processor is logging Machine Check Exceptions. That's probably
bad news. But maybe it's just dead fans or clogged heatsinks or
something.
Good luck.
--
You received this bug notification because you are a member of
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take include
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm not able to reproduce with 1.18.3-0ubuntu1.1 on my 16.04 LTS laptop
with external screen (higher resolution than built-in) and Intel
graphics. Robert, any ideas?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are
I suspect nearly no progress has been made as there are higher-priority
tasks that need doing.
This is still a desired feature and is unlikely to be forgotten though
it may be ages before it becomes the top priority.
Thanks
--
You received this bug notification because you are a member of Ubunt
Hi Thomas, where did you find a systemd package version
233-8ubuntu1~ubuntu16.04.1? I can't find it on
https://launchpad.net/ubuntu/+source/systemd or
https://launchpad.net/ubuntu/+source/systemd/+publishinghistory
Thanks
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You
Even Rouault has been checking in a huge number of fixes for upstream
openjpeg, and he's been remarkably responsive to Agostino Sarubbo's
fuzzing efforts. I suspect the next time I review the openjpeg codebase
I'll find something far more sustainable than the last time around.
Thanks
--
You rece
I see adt failures with 4.12 as well, looks like a regression in
ppc64-diag. Changing affected package.
** Package changed: systemd (Ubuntu) => ppc64-diag (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ub
ep 06 12:23:41 6963eeea-263f-4ad0-8fdf-549bd646f5dc-adt-prepare systemd[1]:
Starting ppc64-diag rtas_errd (platform error handling) Service...
Sep 06 12:23:41 6963eeea-263f-4ad0-8fdf-549bd646f5dc-adt-prepare systemd[1]:
Started ppc64-diag rtas_errd (platform error handling) Service.
Sep 06 12:23:
With the latest upload tests still fail, but it seems to get slightly
farther. Is this a different issue?
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac
/autopkgtest-artful-canonical-kernel-team-
unstable/artful/amd64/l/lxc/20170906_003748_d668f@/log.gz
Public bug reported:
Testing failed on:
ppc64el:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful-canonical-kernel-team-unstable/artful/ppc64el/s/systemd/20170906_131209_2a96a@/log.gz
** Affects: systemd (Ubuntu)
Importance: Un
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful-canonical-kernel-team-unstable/artful/amd64/l/lxc/20170829_024349_c4b5f@/log.gz
i386:
https://objectstorage.prodstack4-5.canonical.c
You could use tc(8) to add predictable latency for testing
http://bencane.com/2012/07/16/tc-adding-simulated-network-latency-to-
your-linux-server/
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
htt
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful-canonical-kernel-team-unstable/artful/amd64/l/lxc/20170825_140357_85137@/log.gz
i386:
https://objectstorage.prodstack4-5.canonical.c
armhf passed after re-running, so I guess we can ignore it. Since the
s390x failure is fixed in -proposed I'll close the bug as invalid, I can
hint away the kernel test failure since it's clearly not a kernel issue.
** Changed in: systemd (Ubuntu)
Status: New => Invalid
--
You received th
s390x failure:
autopkgtest: WARNING: Test dependencies are unsatisfiable with using apt
pinning. Retrying with using all packages from proposed
Reading package lists...
Building dependency tree...
Reading state information...
Correcting dependencies...Starting pkgProblemResolver with broken count
armhf failure:
==
FAIL: test_search_domains_too_long (__main__.NetworkdClientTest)
--
Traceback (most recent call last):
File "/tmp/autopkgtest.WNuNXs/build.mwP
Public bug reported:
Testing failed on:
armhf:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/armhf/s/systemd/20170823_191459_e2f1d@/log.gz
s390x:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a8492
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
There are quite a few messages like these that lead me to believe where
running out of inotify watches.
Failed to acquire watch file descriptor: Too many open files
path-exists.path: Failed to enter waiting state: Too many open files
--
You received this bug notification because you are a member
networkd-test.py FAIL non-zero exit status 1
root-unittests FAIL non-zero exit status 1
networkd-test:
==
FAIL: test_catchall_config (__main__.UnmanagedClientTest)
Verify link states with a catch-all config, hot-plug.
Public bug reported:
Testing failed on:
armhf:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful/artful/armhf/s/systemd/20170814_062054_7f9b9@/log.gz
** Affects: systemd (Ubuntu)
Importance: Undecided
Status: New
** T
Please note
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1503762 -- it's
not obvious what the systemd unit file for apparmor ought to look like.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ub
I believe that section of the kernel code has had three user->ring0
vulnerabilities so far. It might be worth waiting a bit longer before
enabling its use by default.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ipu
Use CVE-2017-12424.
** Information type changed from Public to Public Security
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12424
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https:
This may be a duplicate of bug 1692981. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1708511
Title:
package libssl1.0.0:i386 1.0.2g-1ubuntu4.8 failed to install/
I added apport because of the python2 -> python3 regression; is there a
better way to point out these python3 bugs?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1708
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1708331
Title:
pacotes quebrados
Status in xorg package in Ubuntu:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Please file a new bug with "ubuntu-bug apt" for the hash sum mismatches.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1708179
Title:
Has Sum incorreto e diversos er
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1707649
Title:
[HDA-Intel - HDA Intel PCH, playback] volume
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1707632
Title:
Connecting HDMI freezes everythin
Status in xorg pa
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1707502
Title:
package sudo 1.8.16-0ubuntu1.5 failed to install/upg
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1707334
Title:
Falied to start LBS - AppArmor ("inicialização")
St
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to fontconfig in Ubuntu.
https://bugs.launchpad.net/bugs/1707108
Title:
package fontconfig 2.11.94-0ubuntu1.1 failed t
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1707247
Title:
package unattended-upgrades 0.90ubunt
Good idea Jeremy; https://bugzilla.gnome.org/show_bug.cgi?id=785547
(heh, launchpad called it 'exiv2' when I linked them together. Oh well.)
Thanks
** Bug watch added: GNOME Bug Tracker #785547
https://bugzilla.gnome.org/show_bug.cgi?id=785547
** Also affects: exiv2 via
https://bugzilla.gn
I'm not saying it's not useful. The point is that the library that we're
using for Exif metadata is unsuited for use on a modern desktop operating
system or server connected to the Internet.
The maintainer doesn't want to put in the work to take it from a fun
hobby to a production-grade tool. I ca
I certainly hope that shotwell's dependency can be disabled at build
time.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to exiv2 in Ubuntu.
https://bugs.launchpad.net/bugs/1706471
Title:
please demote exiv2 to unive
autopkgtest [11:09:53]: test boot-smoke: [---
...
checking that there are no running jobs
running jobs after remaining timeout -1:
61 apt-daily-upgrade.timerstart waiting
209 systemd-hostnamed.service start running
64 NetworkManager-wait-online.service sta
Public bug reported:
Testing failed on:
s390x:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-artful-canonical-kernel-team-unstable/artful/s390x/s/systemd/20170728_111056_ccb5f@/log.gz
** Affects: systemd (Ubuntu)
Importance: Undeci
** Description changed:
Hello,
Please consider demoting exiv2 to universe.
http://dev.exiv2.org/issues/1248
The upstream author appears overwhelmed with the task of hardening exiv2
for use against untrusted inputs and thus far (~nine months) no users
have provided the project
*** This bug is a security vulnerability ***
Public security bug reported:
Hello,
Please consider demoting exiv2 to universe.
http://dev.exiv2.org/issues/1248
The upstream author appears overwhelmed with the task of hardening exiv2
for use against untrusted inputs and thus far (~nine months) n
** Changed in: dpkg (Ubuntu)
Status: Fix Released => Confirmed
** Changed in: openssl (Ubuntu)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.la
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
This may be a duplicate of bug 1692981. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1705035
Title:
package login 1:4.2-3.2ubuntu1 [modified: bin/login bin/su
u
This might be a duplicate of bug 1692981.
Can you please run:
dpkg -l | awk '/^iH/ { print $2 }'
and if there is any output, run:
sudo apt-get install --reinstall ALL PACKAGES FROM THE HALF-INSTALLED
LIST
Please let us know how this goes.
Thanks
--
You received this bug notification because
Even, we've triaged this as a 'low' priority for our team:
https://people.canonical.com/~ubuntu-
security/cve/2017/CVE-2017-10989.html -- it might be a while before
fixes are released.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This looks like the relevant portion of the logs:
Configurando samba (2:4.5.8+dfsg-0ubuntu0.17.04.3) ...
Failed to preset unit: Unit file /etc/systemd/system/samba-ad-dc.service is
masked.
/usr/bin/deb-systemd-helper: error: systemctl preset failed on
samba-ad-dc.service: No such file or direct
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Jeremy, if you get the prompt back immediately after the dpkg -l | awk
'/^iH/ { print $2 }' command, that means dpkg thinks nothing is half-
installed. This is good news; if you still have problems with:
sudo apt-get update
sudo apt-get -u dist-upgrade
then please paste the results you're getting
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Damien, interesting; did st provide terminfo pieces to install too?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to debconf in Ubuntu.
https://bugs.launchpad.net/bugs/1703866
Title:
package libssl1.0.0:amd64 1.0.2g-
Oh, I always forget that unix has _anonymous_ sockets too. Silly
complicated things. Thanks John.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1703821
Title:
Dovecot an
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm curious how we can work around this bug. If you're affected please
report the results of:
dpkg -l | awk '/^iH/ { print $2 }'
This shows which specific packages are half-installed on your systems.
With the list of packages this returns, please also report success or
failure of:
sudo apt-get
** Also affects: debconf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1703866
Title:
package libssl1.0.0:amd64 1.0.2
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
I'm surprised about the "addr=none peer_addr=none" -- any idea what's
going on here?
Thanks
** Also affects: apparmor
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ub
I also added apport because this has some python 2 -> python 3 bugs in
the hook errors.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1703194
Title:
package snapd
This may be a duplicate of https://bugs.launchpad.net/bugs/1673247
This looks like the important part:
Настраивается пакет snapd (2.25~14.04) …
Устанавливается новая версия файла настройки
/etc/apparmor.d/usr.lib.snapd.snap-confine …
Failed to execute operation: No such file or directory
dpkg: о
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Added apport because the hook errors shows some missing python 2 ->
python 3 changes.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1703625
Title:
package vlc-plug
701 - 800 of 1795 matches
Mail list logo