Same for Ubuntu Focal:
```console
vagrant@ubuntu2004:~/Downloads$ wget -q
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+files/libnss3_3.98-0ubuntu0.20.04.2_amd64.deb
vagrant@ubuntu2004:~/Downloads$ wget -q
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa
Can confirm on Ubuntu Jammy, package fixes the issue:
```console
vagrant@ubuntu2204:~/Downloads$ wget
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+files/libnss3_3.98-0ubuntu0.22.04.2_amd64.deb
--2024-04-11 15:58:37--
https://launchpad.net/~ubuntu-security-proposed/+archi
This says fix commited though it seems to be neither available in
mantic-updates nor in noble? This is annoying as we have to resort to
installing 253.5-1ubuntu4 manually from the old repository archives and
prevent updates of it
--
You received this bug notification because you are a member of U
Public bug reported:
I have my system set up to rely on GPT auto generator together with
Discoverable Partitions Specification (DPS). After upgrading my system
the gpt generator is no longer included resulting in boot failure.
I have been able to workaround this by setting up the mounts in fstab
Package: alsa-base 1.0.25+dfsg-0ubuntu7
ProcVersionSignature: Ubuntu 6.5.0-13.13-generic 6.5.3
Uname: Linux 6.5.0-13-generic x86_64
ApportVersion: 2.27.0-0ubuntu5
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/controlC0: nils 1388 F wireplumber
/dev/snd
Hello, this is still working on the latest release of binutils for
Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1967082
Title:
SIGSEGV and out-of-bounds write d
** Attachment added: "Crashing input and script for reproduction."
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1967082/+attachment/5575093/+files/objdump_01.zip
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to b
** Description changed:
SIGSEGV and out-of-bounds write during processing file via objdump
# Description
During processing of the attached elf file via
```
objdump -S testcase
```
- an out-of-bounds write is triggered and causes a segmentation fault (SIGSEGV)
- This allows an attack
*** This bug is a security vulnerability ***
Public security bug reported:
SIGSEGV and out-of-bounds write during processing file via objdump
# Description
During processing of the attached elf file via
```
objdump -S testcase
```
an out-of-bounds write is triggered and causes a segmentation fau
** Package changed: unzip (Ubuntu) => poppler (Ubuntu)
** Description changed:
Out-of-bounds read during processing of a password-protected PDF file
# Description
During processsing of the attached pdf file via
```
pdftotext -upw USERPASS -opw OWNERPASS $PWD/testcase /tmp/out.txt
`
I have the same bug with a HP Spectre X360 15-eb0024ng
Already tried to change options in alsa-config:
/etc/modprobe.d/alsa-base.conf
options snd-hda-intel model=auto
and
options snd-hda-intel model=alc295-hp-x360
Still no sound at the speaker. Headset and internal micro working
I think it is
Oh, indeed!
> 1.0.2w moves the affected ciphersuites into the "weak-ssl-ciphers" list. [...]
> This is unlikely to cause interoperability problems in most cases since use
> of these ciphersuites is rare.
Fair enough. Thank you for clarifying.
(And apologies for this noise)
--
You received thi
Thank you very much for fixing swiftly!
Please forgive me for pointing this out though:
I note that rather than stopping the affected cipher suites from re-
using secrets across connections, you chose to declare the suites as
weak and disabled them altogether.
I appreciate that this is an elegan
> "Please upgrade to bionic or focal?"
Is this an official recommendation from Ubuntu, that users shall migrate
off Xenial now, because of a security issue in a core library?
And there I was, thinking we have until April 2021 ...
--
You received this bug notification because you are a member of
** Description changed:
Xenial's current OpenSSL (1.0.2g-1ubuntu4.16) seems to not have been
- patched yet against the Racoon Attack (CVE-2020-1968):
+ patched yet against the Raccoon Attack (CVE-2020-1968):
- https://www.openssl.org/news/secadv/20200909.txt
- https://cve.mitre.org/cgi-bi
Public bug reported:
Xenial's current OpenSSL (1.0.2g-1ubuntu4.16) seems to not have been
patched yet against the Racoon Attack (CVE-2020-1968):
- https://www.openssl.org/news/secadv/20200909.txt
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968
- https://raccoon-attack.com/
Ubuntu'
setup with a Scarlett 2i2 USB device works (with some
caveats, see the mentioned post)
Somehow the Rodecaster is ignored by Alsa. I am more than happy to help debug.
Alsa info is at
http://alsa-project.org/db/?f=94fd609fa23912ab0a39b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp
tp://alsa-project.org/db/?f=94fd609fa23912ab0a39b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp/soundtest$ aplay -l
List of PLAYBACK Hardware Devices
card 0: Generic_1 [HD-Audio Generic], device 0: ALC887-VD Analog [ALC887-VD
Analog]
Subdevices: 1/1
Subdevice #0
b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp/soundtest$ aplay -l
List of PLAYBACK Hardware Devices
card 0: Generic_1 [HD-Audio Generic], device 0: ALC887-VD Analog [ALC887-VD
Analog]
Subdevices: 1/1
Subdevice #0: subdevice #0
card 0: Generic_1 [HD-Audio Generi
=94fd609fa23912ab0a39b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp/soundtest$ aplay -l
List of PLAYBACK Hardware Devices
card 0: Generic_1 [HD-Audio Generic], device 0: ALC887-VD Analog [ALC887-VD
Analog]
- Subdevices: 1/1
- Subdevice #0: subdevice #0
+ Subdevices: 1
mentioned post)
Somehow the Rodecaster is ignored by Alsa. I am more than happy to help debug.
Alsa info is at
http://alsa-project.org/db/?f=94fd609fa23912ab0a39b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp/soundtest$ aplay -l
List of PLAYBACK Hardware Devices
card 0
-project.org/db/?f=94fd609fa23912ab0a39b67676a026fd163f3f3b and also
attached.
nils@blackbox:~/tmp/soundtest$ aplay -l
List of PLAYBACK Hardware Devices
card 0: Generic_1 [HD-Audio Generic], device 0: ALC887-VD Analog [ALC887-VD
Analog]
Subdevices: 1/1
Subdevice #0
FYI this is unattended-upgrades 0.90ubuntu0.10 on Ubuntu 16.04.4 LTS
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1820614
Title:
Mail notification's headline
Public bug reported:
We run unattended-upgrades happily with 'Unattended-Upgrade::Mail'
active and 'Unattended-Upgrade::Remove-Unused-Dependencies'
Sometimes a UU run would not install nor hold anything, but only
autoremove packages that have become obsolete, typically old kernels. In
such cases,
*** This bug is a duplicate of bug 1755250 ***
https://bugs.launchpad.net/bugs/1755250
** This bug has been marked a duplicate of bug 1792552
Qt doesn't cope with EPERM returned from statx(2)
** This bug is no longer a duplicate of bug 1792552
Qt doesn't cope with EPERM returned from st
*** This bug is a duplicate of bug 1755250 ***
https://bugs.launchpad.net/bugs/1755250
This bug is still preventing Qt apps from being run on Core18 snaps. I'm
assuming we're blocked on
https://bugs.launchpad.net/ubuntu/+source/docker.io/+bug/1755250 ?
** This bug has been marked a duplicate
It is still an issue for me. The wifi authentication works perfectly
with Eduroam (that requires a CA certificate) that is not the case with
the other Wifi network (without CA certificate but all the same for the
other settings).
--
You received this bug notification because you are a member of U
Same issue with Ubuntu 18.04 on a Dell XPS 15 9560.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1748839
Title:
Problem to connect to WPA2/PEAP WIFI - gnome-she
Observe #1267059 about 'Unattended-Upgrade::Remove-Unused-Dependencies'
not working as expected for old versions of unattended-upgrades, also
resulting e.g. in obsolete kernel packages not getting removed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packa
Sorry for only checking the latest LTS, didn't realize it had been fixed
in >= 17.04. Thx.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/1737585
Title:
ufw should not overrid
Requesting to revert and leaving this to procps:
https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/1737585
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/189565
Title:
ufw en
I filed a request for ufw not to override
https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/1737585
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to procps in Ubuntu.
https://bugs.launchpad.net/bugs/57091
Title:
proc/sys/ne
Public bug reported:
2008 ufw decided to *disable* TCP SYN cookies by default in
/etc/ufw/sysctl.conf, see
https://bugs.launchpad.net/ubuntu/+source/ufw/+bug/189565
After a more detailed discussion that had started in 2006, procps
*enabled* TCP SYN cookies by default in /etc/sysctl.d/10-network-
Is there a good reason not to simply change the path to the lock file
from /var/run to /run?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1654600
Title:
unat
Public bug reported:
When invoking `sudo apt-get install libhdf5-openmpi-dev` I get the
following text
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following additional packages will be installed:
libaec-dev libhdf5-openmpi-10 libhwloc-dev
I can confirm this bug. However /forcefsck seems not to be supported
because it isn't mentioned in the man page.
When I log in to one of the 16.04 systems, I get this info:
*** /dev/sda5 will be checked for errors at next reboot ***
But the command "dmesg|grep -i e2fsck" gives this output:
[ 1
Public bug reported:
Error at system startup
Description:Ubuntu 16.04 LTS
Release:16.04
account-plugin-facebook:
Installiert: (keine)
Installationskandidat: 0.12+16.04.20160126-0ubuntu1
Versionstabelle:
0.12+16.04.20160126-0ubuntu1 500
500 http://de.archi
Public bug reported:
The machine is in use since 2014 and has recently been upgraded to
16.04. I am using imac27_122 for the alsa module to get the speakers
working, which has worked fine so far. I used to set some hda pins
manually with hda_analyzer, but that does not seem necessary any more. I
a
** Bug watch added: GNOME Bug Tracker #761740
https://bugzilla.gnome.org/show_bug.cgi?id=761740
** Also affects: network-manager via
https://bugzilla.gnome.org/show_bug.cgi?id=761740
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a membe
Public bug reported:
On my office desktop machine I observe that it accumulates temporary
IPv6 addresses over time, even though all except one are marked as
deprecated already.
E.g. right now my IP list looks like this:
2: eno1: mtu 1500 qlen 1000
inet6 2620:101:80fc:224:ad8a:b15b:f83e:99e9/
Nice to see that a LTS-killing bug is taken seriously (after 2 years).
What about Precise? It is affected and has still 1.5y to live.
(Though one might argue that any affected Precise machine must be either
dead or manually patched by now)
--
You received this bug notification because you are a
Public bug reported:
When woken up from suspend (either manually or by opening the lid), xorg
will not display the screen properly: The frames will be shown, but text
and buttons won't until a mouse over or new text is written.
ProblemType: Bug
DistroRelease: Ubuntu 15.04
Package: xorg 1:7.7+7ubu
Each day this bug breaks more Ubuntu servers that do unattended-
upgrades, in particular cloud servers with <<100GB rootfs. I alone have
a few dozens affected machines.
And it's not totally trivial for Admin Average to diagnose the inode
shortage, realize it's flooded with linux-headers packages,
Note that situation #1089195 is another possible outcome of this bug.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1267059
Title:
"Unattended-Upgrade::Remove
The issue with thunderbolt might be fixed in the upcoming kernel release (3.18)
See:
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/?id=refs/tags/v3.18-rc4&qt=grep&q=thunderbolt
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, w
I was one of the affected (I thought back then). I am now running 14.04
on my X1 carbon, and the sound does not have any problems. I don't
recall when the problem was fixed, but it is fixed for me.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, whi
46 matches
Mail list logo