** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
verification-done-groovy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
** Tags removed: verification-done-eoan
** Tags added: verification-done-focal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906684
Title:
[SRU] libreoffice 6.4.7 for Focal
To manage notifications
I have finally proceeded with a partial upgrade. It seems to have
worked. I have not investigated all packages and PPAs yet. However I am
much relieved.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
End user assembly was spot checked on a number of kernels.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1919315
Title:
binary assembly failures with CONFIG_MODVERSIONS present
To manage notificati
*** This bug is a duplicate of bug 1069133 ***
https://bugs.launchpad.net/bugs/1069133
Awesome! Thanks Brian!
Your instructions are clear. I'll have a go as soon as I have time and
will advise.
With gratitude, Steve
On 10/04/2021 7:00 AM, Brian Murray wrote:
> *** This bug is a duplicate
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: arctica-greeter (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923253
Tit
https://github.com/spin83/multi-monitors-add-on/issues/151
** Bug watch added: github.com/spin83/multi-monitors-add-on/issues #151
https://github.com/spin83/multi-monitors-add-on/issues/151
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
[Expired for virtuoso-opensource (Ubuntu) because there has been no
activity for 60 days.]
** Changed in: virtuoso-opensource (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
[Expired for ubuntu-drivers-common (Ubuntu) because there has been no
activity for 60 days.]
** Changed in: ubuntu-drivers-common (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bu
[Expired for samba (Ubuntu) because there has been no activity for 60
days.]
** Changed in: samba (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/19
[Expired for xorg-server (Ubuntu) because there has been no activity for
60 days.]
** Changed in: xorg-server (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
This bug was fixed in the package gtk+3.0 - 3.24.25-1ubuntu4
---
gtk+3.0 (3.24.25-1ubuntu4) hirsute; urgency=medium
* debian/patches/git_wayland_fonts.patch:
- cherry pick a fix for GTK applications hitting errors under wayland
on GNOME40, it isn't in Ubuntu yet but it sho
Impossible ...
25+ times that I'm trying to build and always "FAIL squashfs_test (exit status:
1)"
You can see in the attached shquashfs_test.log
I don't see errors and when I try open the generated
/tmp/tmp.kOJOtwDgFh/squash4_gzip_512_4096_1_0.img ... I can open it.
So I don't understand, I don
** Tags added: bionic hwe-5.4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909428
Title:
eeh-basic.sh from powerpc in ubuntu_kernel_selftests failed with
unexpected operator on F-5.8
To manage
also found on bionic/hwe-5.4 5.4.0-71.79~18.04.1
** Tags added: 5.4 bionic hwe-5.4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828026
Title:
gicv2-mmio-up in ubuntu_kvm_unit_tests failed on X-hw
** Tags added: hwe hwe-5.4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867570
Title:
reuseport_bpf_numa in net from ubuntu_kernel_selftests fails on
ppc64le
To manage notifications about this
** Tags added: bionic hwe hwe-5.4 sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1891003
Title:
mem-on-off-test.sh from memory-hotplug in ubuntu_kernel_selftests
failed with script is
** Tags added: hwe-5.4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892860
Title:
af_alg07 in crypto / cve-2019-8912 in cve from ubuntu_ltp failed on
B-arm64
To manage notifications about this
** Tags added: 5.4 hwe hwe-5.4 sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1830585
Title:
cpuset_memory_spread from controllers test suite in LTP failed (hog
the memory on the unexp
** Tags added: hwe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837005
Title:
cve-2015-3290 in cve from ubuntu_ltp failed with B/D-i386
To manage notifications about this bug go to:
https://bugs.
** Tags added: hwe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876687
Title:
function traceon/off triggers in ftace from ubuntu_kernel_selftests
failed on Focal
To manage notifications about t
** Tags added: hwe sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827866
Title:
vmx_apicv_test in ubuntu_kvm_unit_tests failed on X/B-KVM X-azure /
X-aws
To manage notifications abou
** Tags added: hwe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892855
Title:
[Potential Regression] hyperv_connections / hyperv_stimer /
hyperv_synic failed on B-i386 / B-5.4 i386
To manage no
found on bionic/hwe 5.4.0-71.79~18.04.1
** Tags added: 5.4 hwe sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1831451
Title:
access in ubuntu_kvm_unit_tests failed on Oracle X/B-4.15
T
** Tags added: hwe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887661
Title:
pmtu.sh from net in ubuntu_kernel_selftests failed with no error
message
To manage notifications about this bug go
** Tags added: hwe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892213
Title:
psock_snd.sh in net from ubuntu_kernel_selftests ADT failure with
focal/linux
To manage notifications about this bu
** Changed in: systemd
Status: Unknown => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921636
Title:
resolved CNAME redirect issues
To manage notifications about this bug go t
found on bionic s390x 4.15.0-141.145 host s2lp3
03/25 19:08:57 DEBUG| utils:0153| [stdout] memcg_failcnt 1 TINFO: timeout
per run is 0h 5m 0s
03/25 19:08:57 DEBUG| utils:0153| [stdout] memcg_failcnt 1 TINFO: set
/dev/memcg/memory.use_hierarchy to 0 failed
03/25 19:08:57 DEBUG| utils
** Description changed:
This is to keep track of the sos41 issue to fix at convenience.
[Impact]
UA customer can no longer instruct sos to upload the sos archive in our
Canonical FTP automatically. One would need to manually sftp the file as
a separate task.
[Test Case]
R
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1845919
Title:
memcg_failcnt in mm from ubuntu_ltp failed on B 4.15
To manage notifications about this bug go to:
https://b
** Package changed: ubuntu => grub2-signed (Ubuntu)
** Tags removed: need-duplicate-check
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923277
Title:
package grub-efi-amd64-signed 1.155.4+2.04-1ub
Still found on bionic 4.15.0-141.145 host baltar
** Tags added: 4.15 sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1813140
Title:
subpage_prot in powerpc/mm from ubuntu_kernel_selftest
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923273
Title:
libcaca buffer-overflow
To manage notifications about this bug go t
Public bug reported:
Error came up after doing a fresh install of ubuntu 20.10 from disk.
ProblemType: Package
DistroRelease: Ubuntu 20.10
Package: grub-efi-amd64-signed 1.155.4+2.04-1ubuntu35.4
ProcVersionSignature: Ubuntu 5.8.0-48.54-generic 5.8.18
Uname: Linux 5.8.0-48-generic x86_64
ApportVer
After installing the xfce4 packages in Ubuntu 20.04 and starting a xfce4
session from the default bootup login screen, I immediately get a
similar crash notification. If I launch light-locker from a terminal, I
get the following output:
$ light-locker
** (light-locker:26216): ERROR **: 19:33:17.5
Failing on bionic 4.15.0-141.145 ppc64el host baltar with:
1176. 03/25 20:36:48 ERROR| utils:0153| [stderr] Reprograming, testing mod
5...
1177. 03/25 20:36:48 ERROR| utils:0153| [stderr] Socket 0: 0
1178. 03/25 20:36:48 ERROR| utils:0153| [stderr] Socket 1: 1
1179. 03/25 20:36:48 DEBUG|
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Seth Arnold (seth-arnold):
Hello Ubuntu Security Team
I use libfuzzer to test libcaca api .I found two crash
- https://github.com/cacalabs/libcaca/issues/53
- https://github.com/cacalabs/libcaca/is
found on bionic 4.15.0-141.145 generic i386 host pepe
** Tags added: 4.15 bionic sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876687
Title:
function traceon/off triggers in ftace fr
** Changed in: request-tracker4 (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923264
Title:
request-tracker4 is incompatible with mysql-server-8.0
To manage
gicv3-active LP: https://bugs.launchpad.net/ubuntu-kernel-
tests/+bug/1923276
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828026
Title:
gicv2-mmio-up in ubuntu_kvm_unit_tests failed on X-hwe ARM6
found on bionic 4.15.0-141.145 generic arm64 also on host
mcdivitt34-kernel
Failing the same as the focal I reported previously with failures on
gicv2-mmio-3p and gicv2-mmio-up
Different for bionic is gicv3-active is failing as well. May be related, though
will file a bug for that (not finding
Found on Bionic 4.15.0-141.145 arm64 this cycle (sru-20210315)
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892816
Title:
memory-hotplug test from ubuntu_kernel_selfte
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837005
Title:
cve-2015-3290 in cve from ubuntu_ltp failed with B/D-i386
To manage notifications about this bug go to:
http
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892855
Title:
[Potential Regression] hyperv_connections / hyperv_stimer /
hyperv_synic failed on B-i386 / B-5.4 i386
To
** Tags added: 4.15
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878389
Title:
tpci from kernel_misc in ubuntu_ltp failed with Test-case '13'
To manage notifications about this bug go to:
https:/
Update (the following day)
This install (existing partition) was attempted & failed TWICE on the
same sda1 partition using Lubuntu daily.
It was then used to attempt to install UBUNTU hirsute (daily; ubiquity)
which failed with a different grub-install related issue (no efi
partition from memory)
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829849
Title:
proc01 in fs from ubuntu_ltp failed
To manage notifications about this bug go to:
https://bugs.launchpad.net
** Tags added: sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1837040
Title:
function traceon/off triggers in ftace from ubuntu_kernel_selftests
failed on Disco ARM64 / B-hwe P9
To ma
Those aren't the bug reports that "upstream" is referring to here.
Please report this bug to Debian using the instructions previously
provided (https://wiki.ubuntu.com/Debian/Bugs). The package originates
from Debian, from which Ubuntu derives.
--
You received this bug notification because you ar
The cisecurity guide is wrong. While there is info that could be
leveraged, but on a modern system the really sensitive information is
split out into /etc/shadow (which very much should be only readable by
root). The reality is that on a modern system /etc/passwd needs to be
world readable (it is t
To verify:
- I installed groovy on 'durin' (in the maas pod), which installed with kernel
-48.
- Enabled -proposed, installed the new -49 kernel. (this automatically runs
update-grub)
- rebooted, confirmed that -49 is running.
- ran update-grub manually.
No NULL dereferences were observed.
M
** Tags added: kvm
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892213
Title:
psock_snd.sh in net from ubuntu_kernel_selftests ADT failure with
focal/linux
To manage notifications about this bu
** Tags added: 5.4 focal kvm sru-20210315
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1812194
Title:
rtnetlink.sh in net from ubuntu_kernel_selftests failed on KVM kernels
(config not enabled)
** Package changed: ubuntu => ubiquity (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923254
Title:
Ubuntu 21.04 grub error
To manage notifications about this bug go to:
https://bugs.launc
On Mon, Apr 05, 2021 at 03:22:24PM -, James Hennig wrote:
>Since this is the main thread on the Internet about this issue, I
>suppose it is appropriate to post here even though I am using Manjaro.
>
>- This issue is non-present on a Thinkpad 3 14ADA05 with touchpad
>MSFT0001:00 06CB:CE2D on ker
On Sat, Mar 06, 2021 at 03:24:35PM -, Shatadru Banerjee wrote:
>I want to politely point out that this thread is not helping anymore; it
>has become mere chit-chat. Things were confusing to begin with and
>unfortunately it is becoming more confusing. What is the fix? Does is
>work with a partic
I suspect the rationale is that there is no need for everyone to be able
to access the backup file, and it does contain information that might be
useful to an attacker. `/etc/passwd`, on the other hand, needs to be
world-readable or else many existing tools would break.
The real-world usefulness
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Can't turn on the bluetooth on 20.04 Budgie
This should be resolved by the following change to ubuntu-release-
upgrader.
ubuntu-release-upgrader (1:20.04.31) focal; urgency=medium
* DistUpgrade/DistUpgradeQuirks.py: use apt's problem resolver to better
calculate upgrades where python is replaced by python-is-python2 thereby
reso
*** This bug is a duplicate of bug 1069133 ***
https://bugs.launchpad.net/bugs/1069133
Reviewing the files from your upgrade attempt you seem to have enabled a
PPA that provides Xorg packages. This will prevent the upgrade as that
PPA contains package version numbers greater than the release t
apport information
** Attachment added: "acpidump.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486286/+files/acpidump.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
apport information
** Attachment added: "WifiSyslog.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486285/+files/WifiSyslog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Ti
apport information
** Attachment added: "UdevDb.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486284/+files/UdevDb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Ca
apport information
** Attachment added: "RfKill.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486283/+files/RfKill.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Ca
apport information
** Attachment added: "PulseList.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486282/+files/PulseList.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Titl
apport information
** Attachment added: "ProcModules.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486281/+files/ProcModules.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
apport information
** Attachment added: "ProcInterrupts.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486280/+files/ProcInterrupts.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192
apport information
** Attachment added: "ProcCpuinfo.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486277/+files/ProcCpuinfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486279/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486278/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
apport information
** Attachment added: "Lsusb-v.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486276/+files/Lsusb-v.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
apport information
** Attachment added: "Lsusb.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486274/+files/Lsusb.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Can'
apport information
** Attachment added: "Lsusb-t.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486275/+files/Lsusb-t.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
apport information
** Attachment added: "Lspci.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486272/+files/Lspci.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Can'
apport information
** Attachment added: "Lspci-vt.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486273/+files/Lspci-vt.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
apport information
** Attachment added: "IwConfig.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486271/+files/IwConfig.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
apport information
** Attachment added: "CurrentDmesg.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486270/+files/CurrentDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
apport information
** Attachment added: "CRDA.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486269/+files/CRDA.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Can't
apport information
** Attachment added: "AlsaInfo.txt"
https://bugs.launchpad.net/bugs/1923271/+attachment/5486268/+files/AlsaInfo.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923271
Title:
Public bug reported:
I updated Ubuntu Budgie 18.04 to 20.04 a few weeks ago.
My Bluetooth worked correctly until the update.
Now it just shutdowns itself and the toggle button in the settings does not
bring it alive.
---
ProblemType: Bug
ApportVersion: 2.20.11-0ubuntu27.16
Architecture: amd64
Au
Public bug reported:
The patch file 0006-Disable-DT_TEXTREL-warnings-on-Linux-i386.patch is
inadequate because it updates configure.ac without updating configure. It
should instead read something like
```
diff --git a/configure b/configure
index 74657d2..c1215b4 100755
--- a/configure
+++ b/con
See also
https://github.com/ocaml/ocaml/issues/9800#issuecomment-786868875
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923272
Title:
package is unbackportable to old i386 systems
To manage notif
Thank you for taking the time to report this issue and helping to make
Ubuntu better. Examining the information you have given us, this does
not appear to be a bug report so we are closing it and converting it to
a question in the support tracker. We understand the difficulties you
are facing, but
I agree, it was surprising to me as well. The rationale given is just
this:
```
It is critical to ensure that the /etc/passwd- file is protected from
unauthorized access. Although it is protected by default, the file permissions
could be changed either inadvertently or through malicious actions.
Thanks for taking the time to report this upgrade failure. There is
currently a new version of the release upgrader availalbe in -proposed
which may resolve the error you've encountered. Please run the following
command to test the new version of the upgrader:
do-release-upgrade -p
Please lets
Public bug reported:
NVIDIA 340.108 with all patches (up to the 5.11 patch) is randomly
crashing (Core Dump) with Xorg 1.20.10 on Linux Kernel 5.12.0-rc5. It
works fine on the previous Kernel 5.11.
The Core Dumps (crashes) are not frequent, but randomly occur, and are
always triggered while using
Thanks for taking the time to report this upgrade failure. There is
currently a new version of the release upgrader availalbe in -proposed
which may resolve the error you've encountered. Please run the following
command to test the new version of the upgrader:
do-release-upgrade -p
Please lets
Hello, this sounds like surprising advice to me -- afterall the
/etc/passwd file is 644. I don't know what would be the point of hiding
this 'backup' file. Does the benchmark give a rationale for this?
Thanks
** Information type changed from Private Security to Public Security
** Changed in: sha
Public bug reported:
Having picked to replace the previous ubuntu mate install on a duel boot
with Solus, a fatal error warning appeared because grub couldn't
install.
ProblemType: Bug
DistroRelease: Ubuntu 21.04
Package: ubiquity 21.04.14
ProcVersionSignature: Ubuntu 5.11.0-13.14-generic 5.11.7
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verificati
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: htslib (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892652
Title:
lib
Thanks for taking the time to report this upgrade failure. There is
currently a new version of the release upgrader availalbe in -proposed
which may resolve the error you've encountered. Please run the following
command to test the new version of the upgrader:
do-release-upgrade -p
Please lets
*** This bug is a duplicate of bug 996916 ***
https://bugs.launchpad.net/bugs/996916
** This bug has been marked a duplicate of bug 996916
postgresql packages in the removal blacklist making it hard to upgrade
--
You received this bug notification because you are a member of Ubuntu
Bugs,
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verificati
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verificati
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verificati
Public bug reported:
Problem tested in two different environments:
- Ubuntu 21.04 Beta amd64
- Ubuntu 21.04 Beta arm64 (Raspberry Pi 4B 8GB)
After upgrading these packages:
libglib2.0-02.67.5-2 to 2.68.0-1
libglib2.0-bin 2.67.5-2 to 2.68.0-1
libglib2.0-data 2.67.5-2 to 2.68.0-1
The app in
Public bug reported:
MAAS uses the signed network GRUB bootloader when a machine network
boots on AMD64 and ARM64. The configuration MAAS produces depends on the
machine which are identified by MAC address. The default grub.cfg in the
boot loader downloads /grub/grub.cfg from the remote host. As t
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Seth Arnold (seth-arnold):
CIS hardening benchmarks (6.1.6) suggest that the /etc/passwd- file
should be mode 0600 (or more restrictive).
However, this file is 0644 after it is created when the /etc
Thanks for taking the time to report this upgrade failure. There is
currently a new version of the release upgrader availalbe in -proposed
which may resolve the error you've encountered. Please run the following
command to test the new version of the upgrader:
do-release-upgrade -p
Please lets
1 - 100 of 444 matches
Mail list logo