** Also affects: linux-hwe-5.13 (Ubuntu)
Importance: Undecided
Status: New
** Description changed:
- When booting 5.11.0-38-generic, dmesg shows this:
+ When booting 5.13.0-30-generic, dmesg shows:
+
+ ieee80211 phy0: Selected rate control algorithm 'iwl-mvm-rs'
+ BUG: kernel NULL
Removing packages from jammy:
ruby-gitlab-labkit 0.12.2-1 in jammy
ruby-gitlab-labkit 0.12.2-1 in jammy amd64
ruby-gitlab-labkit 0.12.2-1 in jammy arm64
ruby-gitlab-labkit 0.12.2-1 in jammy armhf
ruby-gitlab-labkit 0.12.2-1 in
** Changed in: amavisd-new (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946841
Title:
Merge amavisd-new from Debian unstable for 22.04
To manage
@arighi: mctp is already supported in the 3.0.4 release that @alexmurray
is working on merging
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961196
Title:
apparmor autotest failure on jammy with
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961429
Title:
ACPI BIOS Error: problem loading UEFI
The attachment "Fix for groovy" seems to be a debdiff. The ubuntu-
sponsors team has been subscribed to the bug report so that they can
review and hopefully sponsor the debdiff. If the attachment isn't a
patch, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if
** Also affects: ubuntu-power-systems
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961425
Title:
22.04: FTBFS due to test failure
To manage
Public bug reported:
While upgrading from 21.10 (Impish) to 22.04 (Jammy) an error message
pops up:
Cannot upgrade core18
When upgrade is complete the "snap list" command produces the output
which includes the following old packages:
core18
gnome-3-28-1804
gnome-3-34-1804
I had to manually
** Package changed: linux (Ubuntu) => zlib (Ubuntu)
** Also affects: ubuntu-z-systems
Importance: Undecided
Status: New
** Changed in: ubuntu-z-systems
Assignee: (unassigned) => Skipper Bug Screeners (skipper-screen-team)
--
You received this bug notification because you are a
Public bug reported:
When attempting to install Ubuntu 18.04 server (or Ubuntu 20.04 server)
only UEFI configuration is available even if the drives are smaller (240
GB) than what UEFI is required for.
In the installer (either the default or updated one):
If I select "Use as Boot Device" for a
Public bug reported:
Upon upgrading from 21.10 (Impish) to 22.04 (Jammy) I am getting the
following error messages at every boot using 5.15.0-18-generic kernel:
[0.150101] ACPI BIOS Error (bug): Could not resolve symbol [\_SB.PCI0],
AE_NOT_FOUND (20210730/dswload2-162)
[0.150114] ACPI
Public bug reported:
Description: zlib: compressBound() returns an incorrect result on z15
Symptom: Passing the result of compressBound() to compress()
results in an error code.
Problem: compressBound() is not adjusted for DFLTCC.
Solution: Adjust compressBound()
Public bug reported:
Hi,
capnproto 0.8.0-2ubuntu1 fails on ppc64el :
https://launchpad.net/ubuntu/+source/capnproto/0.8.0-2ubuntu1/+build/23090234/+files/buildlog_ubuntu-jammy-ppc64el.capnproto_0.8.0-2ubuntu1_BUILDING.txt.gz
Lowering optimization (O3->O2) level makes the failing test pass, for
Another suggestion was to limit the 'max_unit' value for hypervisors
with this memory configuration to the total memory - the hugepage
configured memory - this means that the maximum footprint for a single
VM is limited.
--
You received this bug notification because you are a member of Ubuntu
Please have a look which apps are using audio devices: 'lsof /dev/snd/*
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953052
Title:
In Jammy sound level reset after reboot
To manage notifications
Discussed with the Nova team and this is a know issue at the moment -
mixing instance types with and with NUMA configuration features such as
hugepages will create this type of issue.
The placement API (which is used for scheduling) does not track
different pagesizes so can't deal with this
Hi Nick.
output for 1.
https://pastebin.ubuntu.com/p/mKtMTzhSpn/
and for 2.
$ apt-config dump | grep APT::Architecture
APT::Architecture "ppc64el";
APT::Architectures "";
APT::Architectures:: "ppc64el";
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
@alexmurray thanks for the update! BTW I found another issue with test-
network.py: this test is failing because utils/apparmor/rule/network.py
is missing the mctp protocol (in network_domain_keywords[]).
I checked upstream, but I couldn't find any fix for this, do you want me
to open another
** Also affects: swtpm (Ubuntu)
Importance: Undecided
Status: New
** Changed in: swtpm (Ubuntu)
Status: New => In Progress
** Changed in: libvirt (Ubuntu)
Status: Triaged => In Progress
** Changed in: swtpm (Ubuntu)
Assignee: (unassigned) => Lena Voytek (lvoytek)
This can be reproduced on Focal/ussuri:
Computes:
$ os resource provider list
+--+-++--+--+
| uuid
Hi Frank,
Could you please provide the following info from your P8 system?
1. The contents of /proc/cpuinfo
2. Output of `apt-config dump | grep APT::Architecture`
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
@xnox Ah, that makes sense, thanks. I'll propose some seed updates in a
bit.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1947311
Title:
Unexpected partition growth on first boot on impish for
Launchpad has imported 2 comments from the remote bug at
https://bugzilla.mozilla.org/show_bug.cgi?id=1756170.
If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
Hello Alberto, or anyone else affected,
Accepted nvidia-graphics-drivers-510 into bionic-proposed. The package
will build now and be available at
https://launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/510.54-0ubuntu0.18.04.1 in a few hours, and then in the
-proposed repository.
Please
Public bug reported:
I don't know what's happened, but ubuntu said that smth went wrong, and
I should report it
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: nvidia-kernel-source-460 460.73.01-0ubuntu0.20.04.1
ProcVersionSignature: Ubuntu 5.13.0-28.31~20.04.1-generic 5.13.19
Uname:
Public bug reported:
12720 18:19:09 DEBUG| [stdout] # selftests: net: gro.sh
12721 18:19:09 DEBUG| [stdout] # running test ipv4 data
12722 18:19:10 DEBUG| [stdout] # Expected {200 }, Total 1 packets
12723 18:19:10 DEBUG| [stdout] # Received {200 }, Total 1
the today's update seems to fix the problem for me, too.
Install: linux-modules-extra-5.13.0-30-generic:amd64 (5.13.0-30.33~20.04.1,
automatic), linux-modules-5.13.0-30-generic:amd64 (5.13.0-30.33~20.04.1,
automatic), linux-headers-5.13.0-30-generic:amd64 (5.13.0-30.33~20.04.1,
automatic),
** Tags added: server-todo
** Tags removed: server-todo
** Tags added: needs-merge
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961027
Title:
[FFE] merge virt-manger >3.2 for Jammy once released
*** This bug is a duplicate of bug 1956613 ***
https://bugs.launchpad.net/bugs/1956613
This is a dup. After upgrading the maas server to 3.1, the issue is
resolved.
** This bug has been marked a duplicate of bug 1956613
Traceback deploying Jammy with MAAS 3.1
--
You received this bug
You have been subscribed to a public bug:
Description
===
When hugepages are enabled on the host it's possible to schedule VMs
using more RAM than available.
On the node with memory usage presented below it was possible to
schedule 6 instances using a total of 140G of memory and a non-
Thanks Kai!
** Changed in: firefox (Ubuntu)
Status: Incomplete => New
** Also affects: firefox via
https://bugzilla.mozilla.org/show_bug.cgi?id=1756170
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
This bug was fixed in the package netplan.io - 0.104-0ubuntu1
---
netplan.io (0.104-0ubuntu1) jammy; urgency=medium
* New upstream release: 0.104
- Enable 'embedded-switch-mode' setting on SmartNICs
- Permit multiple patterns for the driver globs in match (LP: #1918421)
** Changed in: caml-crush (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940640
Title:
caml-crush: FTBFS: ocamlopt: OCaml has been configured with
This bug was fixed in the package netplan.io - 0.104-0ubuntu1
---
netplan.io (0.104-0ubuntu1) jammy; urgency=medium
* New upstream release: 0.104
- Enable 'embedded-switch-mode' setting on SmartNICs
- Permit multiple patterns for the driver globs in match (LP: #1918421)
** Changed in: caml-crush (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940639
Title:
FTBFS: "rpc/rpc.h" not found (removed from glibc 2.32)
To
Hello Alberto, or anyone else affected,
Accepted nvidia-graphics-drivers-510 into focal-proposed. The package
will build now and be available at
https://launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/510.54-0ubuntu0.20.04.1 in a few hours, and then in the
-proposed repository.
Please
** Changed in: linux-firmware (Ubuntu Focal)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958467
Title:
focal linux-firmware package omits amdgpu/navi12
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: php-gnupg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928571
Title:
https://bugzilla.mozilla.org/show_bug.cgi?id=1756170
** Bug watch added: Mozilla Bugzilla #1756170
https://bugzilla.mozilla.org/show_bug.cgi?id=1756170
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
I tried to enable livepatch without any success. ([Bug 1960689] )
support suggested me report a bug for snapd.
root@plis231v:~# sudo ua enable livepatch
One moment, checking your subscription first
Unexpected error(s) occurred.
For more details, see the log:
Hello Alberto, or anyone else affected,
Accepted nvidia-graphics-drivers-510 into impish-proposed. The package
will build now and be available at
https://launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/510.54-0ubuntu0.21.10.1 in a few hours, and then in the
-proposed repository.
Please
I reviewed this issue again and I don't think we're ready to drop the
"Disable LTO on s390x" delta for now. There are newer NSS upstream
versions worth testing but in Ubuntu we're still at 3.68 for now.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: software-properties (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1460611
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: software-properties (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1840045
** Changed in: kdump-tools (Ubuntu)
Status: Invalid => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877533
Title:
[20.10 FEAT] Increase the crashkernel setting if the root
Hi Norbert,
I had a look at the differences between those two versions but I found
no clue. In any case I prepared a PPA with Bionc's open-iscsi compiled
for Focal:
https://launchpad.net/~paride/+archive/ubuntu/lp1959581
you can use this to verify that the issue isn't a regression that
happened
On Friday, February 18 2022, Christian Ehrhardt wrote:
> Thanks - That is good as a sniff test, but as I've mentioned the real
> test is when the hundreds of autopkgtest-enabled dependencies of
> postgres run in autopkgtest. Since currently the queues are rather full
> we agreed to do this
Public bug reported:
Ubuntu 20.04.3
Kernel: 5.4.0-1028-bluefield
ii isc-dhcp-client4.4.1-2.1ubuntu5.20.04.2
arm64DHCP client for
automatically obtaining an IP address
ii isc-dhcp-common
systemd stuff did either partition or fs but not both.
we used the cloud initramfs implementation on the desktop, because yes,
it doesn't do cloud-init.
probably moving that out of the common seed will help.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: cacti (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1958298
Title:
Confirmed the driver to be updated on impish/linux and focal/linux-
hwe-5.13:
* Impish
$ uname -a
Linux autopkgtest 5.13.0-30-generic #33-Ubuntu SMP Fri Feb 4 17:03:31 UTC 2022
x86_64 x86_64 x86_64 GNU/Linux
$ modinfo smartpqi | grep "^version:"
version:2.1.12-055
* Focal
$ uname -a
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960953
Title:
lockscreen is bypassed after screensaver segfault
To manage
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
I've found other bug reports on segfault of mate-screensaver. However,
those don't mention that if the screensaver crashes, then the computer
goes into auto-sleep, upon
This wifi adapter is not supported by the kernel. The driver is not even
in upstream linux.
You can try the driver from https://github.com/kelebek333/rtl8188fu.
There is a DKMS package available but it fails to compile:
$ sudo add-apt-repository ppa:kelebek333/kablosuz
$ sudo apt install
Issues not detected on impish/linux 5.13.0-30.33.
** Tags removed: verification-needed-impish
** Tags added: verification-done-impish
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1941829
Title:
The relevant stuff being here
https://github.com/DataBiosphere/toil/pull/3967.
I pinged doko so that he can remove the package.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961097
Title:
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955619
Title:
touchpad problem
To manage notifications
This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:
apport-collect 1956098
and then change the status of the bug to 'Confirmed'.
If, due to the
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954559
Title:
Touch Pad not working on my Ubuntu laptop
Hi arnoldthebat,
Just to double check, were you attached to an UA subscription before performing
apt upgrade ?
Also, does the problem persist if you run:
apt-get install ubuntu-advantage-tools
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949186
Title:
Missing Linux Kernel mitigations for 'SSB - Speculative Store
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hi Gene Sun,
This is a really odd issue and I have never experienced it before. I think the
best path forward is to contact the snapd team and ask for help there, as this
could be a bug on the package:
https://bugs.launchpad.net/ubuntu/+source/snapd
Since this is issue is snapd related, I am
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
The Greenbone Security Assistant reporting me the following:
Summary
The remote host is missing one or more known mitigation(s) on Linux Kernel
side for the
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
Issue has CVE 2020-14929
https://bugs.launchpad.net/bugs/cve/2020-14929
A newer upstream package version has fixed this issue in more recent Ubuntu
releases, but this
This change was made by a bot.
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961406
Title:
Known bug in IGC causes shutdown bug in
** Changed in: poppler (Ubuntu)
Status: New => Confirmed
** Changed in: poppler (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959591
Title:
Public bug reported:
I own a Asus z690 Apex board, and shutdown hangs because of a bug in IGC
driver. I cannot provide any logs because this happens after filesystem
driver has been shut down and display/graphics have been turned of. The
PC simply never turns off.
I can disable the network
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960469
Title:
package mysql-server-8.0 8.0.28-0ubuntu0.20.04.3 failed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960736
Title:
Libnss3 doesn't log SEC_ERROR_UNKNOWN_PKCS11_ERROR properly ( NSS
error
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
I was reading the changelog, and couldn't see changes after February
2021. However there was a security vulnerability reported in December:
101 - 200 of 254 matches
Mail list logo