Hello Sushil, your root filesystem is full, or very nearly full:
/dev/sda1 76765216 72155180687452 100% /
You'll have to deal with this before anything will work right.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
I thought I'd add the information from my favourite DNS debugging tool
while the data may still be close to useful:
dnsviz reports NXDOMAIN for securelogin.arubanetworks.com
http://dnsviz.net/d/securelogin.arubanetworks.com/dnssec/
dnsviz also currently reports three warnings:
- com to
*** This bug is a duplicate of bug 1733090 ***
https://bugs.launchpad.net/bugs/1733090
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/1733090
Title:
package libcurl3-gnutls:amd64 7.47.0-1ubuntu2.4
Gaétan, a read-only filesystem could happen either from a drastic IO
error or because the environment is configured to not provide one. I
suggest asking on IRC or http://askubuntu.com/ for help debugging your
read-only filesystem.
Thanks
--
You received this bug notification because you are a
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1732957
Title:
apport-gtk crashed with SIGSEGV in visit_decref()
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1732870
Title:
idk
Status in xorg package in Ubuntu:
New
Bug
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to hud in Ubuntu.
https://bugs.launchpad.net/bugs/1732820
Title:
hud-service crashed with SIGSEGV
Status in hud
Eric W. Biederman contributed this via email:
> The short answer is that if you want negative acls to work don't try and
> apply them to a user in /etc/subuid or /etc/subgid.
>
> To my knowledge there is not a good solution to this problem.
>
> As for setting setgroups to deny that is the
** Summary changed:
- TLS negation fails
+ TLS negotiation fails
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1612711
Title:
TLS negotiation fails
Status in openssl
$ dpkg -l systemd rsyslog | cat
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad)
||/ Name Version Architecture Description
Public bug reported:
Similar to bug 1484027, but that's marked 'Fix released', so something
must have regressed in the meantime.
$ journalctl | grep "Duplicate line" | wc -l
58
$ grep "/var/log " /usr/lib/tmpfiles.d/*
/usr/lib/tmpfiles.d/00rsyslog.conf:# Override systemd's default
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1727933
Title:
as
Status in xorg package in Ubuntu:
New
Bug
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Kevin, I don't want to step on Colin's toes here, but I couldn't
sort out anything from the logs or files so far. I've had success before
with perf to grab call graph information. The usual process is along the
lines of:
- enable the ddebs.ubuntu.com repository to get access to debug
Hello Aleksandr,
I believe this is expected behaviour: when a GUI program is suspended,
the GUI cannot respond to events. Running 'fg' or 'bg' in the shell will
cause it to resume, and respond to clicks.
Thanks
** Package changed: ecryptfs-utils (Ubuntu) => apport (Ubuntu)
** Changed in:
** Changed in: ufw (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/1726856
Title:
ufw does not start automatically at boot
Status in
Hi Matt, can you give the output of:
systemctl status ufw
and
journalctl -u ufw.service
Thanks
** Changed in: ufw (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
*** This bug is a duplicate of bug 1714792 ***
https://bugs.launchpad.net/bugs/1714792
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libunity in Ubuntu.
https://bugs.launchpad.net/bugs/1725933
Title:
package libunity9 7.1.4+17.10.20170605-0ubuntu1
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1725651
Title:
package passwd 1:4.2-3.2ubuntu1.17.04.2 failed to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1725385
Title:
one
Status in xorg package in Ubuntu:
New
Bug
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to telepathy-mission-
control-5 in Ubuntu.
https://bugs.launchpad.net/bugs/1725227
Title:
mission-control-5 crashed
Thanks Brian; should we retarget this bug to dpkg to get it to show
different output? or is it still apport that is collecting ellipsized
logs?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/1723753
Title:
packagekitd crashed with SIGSEGV in
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1723744
Title:
My ubuntu software not working
Status in xorg
I believe both promote_secondaries and default qdisc changes are good
changes for our distribution to make.
I'd like to abstain from the judgment of making the change for existing
releases via an SRU. (Be sure to make sure this change is obvious and
easy to search for in package changelog please.
Someone may have to actually describe what's going on...
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1719579
Title:
[Ubuntu 16.04.2] [libvirt] virsh restore fails
Hello Lewis, could you please run apport-collect 1717517 ? That should
gather some log files and attach them to this bug for inspection.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
*** This bug is a duplicate of bug 1717589 ***
https://bugs.launchpad.net/bugs/1717589
** This bug has been marked a duplicate of bug 1717589
package bluez 5.37-0ubuntu5.1 failed to install/upgrade: subprocess
installed post-installation script returned error exit status 1
** Information
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1717589
Title:
package bluez 5.37-0ubuntu5.1 failed to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1717256
Title:
ca-certificates post-install hook
Gábor, systemd is well-meaning in providing namespacing features so the
thousands of daemons that are in the world don't have to re-implement
something similar. But of course the kernel hook points used by AppArmor
don't provide sufficient information to know what pathname to
reconstruct when the
Hello, I recommend installing the mcelog package if you haven't done so
yet. Your processor is logging Machine Check Exceptions. That's probably
bad news. But maybe it's just dead fans or clogged heatsinks or
something.
Good luck.
--
You received this bug notification because you are a member
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I'm not able to reproduce with 1.18.3-0ubuntu1.1 on my 16.04 LTS laptop
with external screen (higher resolution than built-in) and Intel
graphics. Robert, any ideas?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you
I suspect nearly no progress has been made as there are higher-priority
tasks that need doing.
This is still a desired feature and is unlikely to be forgotten though
it may be ages before it becomes the top priority.
Thanks
--
You received this bug notification because you are a member of
Hi Thomas, where did you find a systemd package version
233-8ubuntu1~ubuntu16.04.1? I can't find it on
https://launchpad.net/ubuntu/+source/systemd or
https://launchpad.net/ubuntu/+source/systemd/+publishinghistory
Thanks
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You
Even Rouault has been checking in a huge number of fixes for upstream
openjpeg, and he's been remarkably responsive to Agostino Sarubbo's
fuzzing efforts. I suspect the next time I review the openjpeg codebase
I'll find something far more sustainable than the last time around.
Thanks
--
You
You could use tc(8) to add predictable latency for testing
http://bencane.com/2012/07/16/tc-adding-simulated-network-latency-to-
your-linux-server/
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
Please note
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1503762 -- it's
not obvious what the systemd unit file for apparmor ought to look like.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in
I believe that section of the kernel code has had three user->ring0
vulnerabilities so far. It might be worth waiting a bit longer before
enabling its use by default.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Use CVE-2017-12424.
** Information type changed from Public to Public Security
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12424
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
This may be a duplicate of bug 1692981. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1708511
Title:
package libssl1.0.0:i386 1.0.2g-1ubuntu4.8 failed to
I added apport because of the python2 -> python3 regression; is there a
better way to point out these python3 bugs?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1708331
Title:
pacotes quebrados
Status in xorg package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Please file a new bug with "ubuntu-bug apt" for the hash sum mismatches.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1708179
Title:
Has Sum incorreto e diversos
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1707649
Title:
[HDA-Intel - HDA Intel PCH, playback] volume
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1707632
Title:
Connecting HDMI freezes everythin
Status in xorg
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1707502
Title:
package sudo 1.8.16-0ubuntu1.5 failed to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1707334
Title:
Falied to start LBS - AppArmor ("inicialização")
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to fontconfig in Ubuntu.
https://bugs.launchpad.net/bugs/1707108
Title:
package fontconfig 2.11.94-0ubuntu1.1 failed
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1707247
Title:
package unattended-upgrades
Good idea Jeremy; https://bugzilla.gnome.org/show_bug.cgi?id=785547
(heh, launchpad called it 'exiv2' when I linked them together. Oh well.)
Thanks
** Bug watch added: GNOME Bug Tracker #785547
https://bugzilla.gnome.org/show_bug.cgi?id=785547
** Also affects: exiv2 via
I'm not saying it's not useful. The point is that the library that we're
using for Exif metadata is unsuited for use on a modern desktop operating
system or server connected to the Internet.
The maintainer doesn't want to put in the work to take it from a fun
hobby to a production-grade tool. I
I certainly hope that shotwell's dependency can be disabled at build
time.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to exiv2 in Ubuntu.
https://bugs.launchpad.net/bugs/1706471
Title:
please demote exiv2 to
** Description changed:
Hello,
Please consider demoting exiv2 to universe.
http://dev.exiv2.org/issues/1248
The upstream author appears overwhelmed with the task of hardening exiv2
for use against untrusted inputs and thus far (~nine months) no users
have provided the project
*** This bug is a security vulnerability ***
Public security bug reported:
Hello,
Please consider demoting exiv2 to universe.
http://dev.exiv2.org/issues/1248
The upstream author appears overwhelmed with the task of hardening exiv2
for use against untrusted inputs and thus far (~nine months)
** Changed in: dpkg (Ubuntu)
Status: Fix Released => Confirmed
** Changed in: openssl (Ubuntu)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
This may be a duplicate of bug 1692981. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1705035
Title:
package login 1:4.2-3.2ubuntu1 [modified: bin/login bin/su
This might be a duplicate of bug 1692981.
Can you please run:
dpkg -l | awk '/^iH/ { print $2 }'
and if there is any output, run:
sudo apt-get install --reinstall ALL PACKAGES FROM THE HALF-INSTALLED
LIST
Please let us know how this goes.
Thanks
--
You received this bug notification
Even, we've triaged this as a 'low' priority for our team:
https://people.canonical.com/~ubuntu-
security/cve/2017/CVE-2017-10989.html -- it might be a while before
fixes are released.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This looks like the relevant portion of the logs:
Configurando samba (2:4.5.8+dfsg-0ubuntu0.17.04.3) ...
Failed to preset unit: Unit file /etc/systemd/system/samba-ad-dc.service is
masked.
/usr/bin/deb-systemd-helper: error: systemctl preset failed on
samba-ad-dc.service: No such file or
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Jeremy, if you get the prompt back immediately after the dpkg -l | awk
'/^iH/ { print $2 }' command, that means dpkg thinks nothing is half-
installed. This is good news; if you still have problems with:
sudo apt-get update
sudo apt-get -u dist-upgrade
then please paste the results you're
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
Damien, interesting; did st provide terminfo pieces to install too?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to debconf in Ubuntu.
https://bugs.launchpad.net/bugs/1703866
Title:
package libssl1.0.0:amd64
Oh, I always forget that unix has _anonymous_ sockets too. Silly
complicated things. Thanks John.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1703821
Title:
Dovecot
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I'm curious how we can work around this bug. If you're affected please
report the results of:
dpkg -l | awk '/^iH/ { print $2 }'
This shows which specific packages are half-installed on your systems.
With the list of packages this returns, please also report success or
failure of:
sudo apt-get
** Also affects: debconf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1703866
Title:
package libssl1.0.0:amd64
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
I'm surprised about the "addr=none peer_addr=none" -- any idea what's
going on here?
Thanks
** Also affects: apparmor
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in
I also added apport because this has some python 2 -> python 3 bugs in
the hook errors.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1703194
Title:
package snapd
This may be a duplicate of https://bugs.launchpad.net/bugs/1673247
This looks like the important part:
Настраивается пакет snapd (2.25~14.04) …
Устанавливается новая версия файла настройки
/etc/apparmor.d/usr.lib.snapd.snap-confine …
Failed to execute operation: No such file or directory
dpkg:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Added apport because the hook errors shows some missing python 2 ->
python 3 changes.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1703625
Title:
package
Did you by chance change anything related to dnsmasq's startup? This
looks like dnsmasq is now starting in a private filesystem namespace
without access to the dbus sockets. It's possible to adapt the AppArmor
profile for this (by adding the attach_disconnected flag to the profile)
but the
** Package changed: dbus (Ubuntu) => radiotray (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1703348
Title:
radiotray crash on start
Status in radiotray package
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
You appear to be running a release of Ubuntu that is no longer supported.
Please see https://wiki.ubuntu.com/Releases for information on our
currently supported releases; consider using one of the LTS releases,
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
*** This bug is a duplicate of bug 1701085 ***
https://bugs.launchpad.net/bugs/1701085
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I also subscribed apport because there are python2 -> python3 transition
bugs in the HookError_ubuntu.txt file. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1702601
This one is caused by Guitar Pro. Thanks.
** Changed in: sudo (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1702484
Title:
package
*** This bug is a duplicate of bug 1692981 ***
https://bugs.launchpad.net/bugs/1692981
** This bug has been marked a duplicate of bug 1692981
package libssl-dev:amd64 1.0.2g-1ubuntu11.2 failed to install/upgrade:
package is in a very bad inconsistent state; you should reinstall it before
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
601 - 700 of 1527 matches
Mail list logo