There's a chance this is caused by my file:///srv/mirror/ubuntu/ or
whatever I used in my apt sources. Replacing that with
http://archive.ubuntu.com/ubuntu/ let me upgrade my computer to 24.04
LTS.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is sub
This seems unlikely to be the kernel. If you're running something other
than gnome, maybe pick whatever your desktop environment is?
** Package changed: linux (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
Public bug reported:
Hello, twice recently my 20.04 LTS laptop in a docking station was very
unhappy after leaving it unattended overnight:
- the external monitor did not wake from dpms sleep when pressing keys on
either the external keyboard or the built-in keyboard
- the built-in monitor did n
Public bug reported:
Hello, I noticed a lot of these auto-import errors in my journalctl
output after an upgrade to Ubuntu 24.04 LTS:
[...]
Oct 03 08:36:08 wopr systemd-udevd[937]: Using default interface naming scheme
'v255'.
Oct 03 08:36:08 wopr systemd-journald[891]: Time spent on flushing to
Public bug reported:
Hello, after correcting the ubuntu-minimal problem and wrong release in
my sources caused by bug 2083575 I started over again, and got new
errors, but unfortunately without useful error messages. Further
unfortunately, what's left on the terminal is a partial view of the
total
Public bug reported:
Hello, I tried to upgrade a jammy machine to noble with do-release-
upgrade and got a failure very early in the process. After the failure,
my apt sources were left pointing to the new release, they weren't
rolled back to the currently running release.
These are the sources t
Public bug reported:
I received multiple errors while trying to run tcptop-bpfcc:
$ sudo tcptop-bpfcc
[sudo] password for sarnold:
In file included from :2:
In file included from /virtual/include/bcc/bpf.h:12:
In file included from include/linux/types.h:6:
In file included from include/uapi/linu
At today's MIR team meeting, we weren't entirely sure what the next
steps for this package should be, and we ran out of time to try to find
a resolution.
So I'll ask here -- what is the next step?
I see comment #5 had required and recommended todos. Comment #7 said
that some issues had been fixed
Marking this incomplete so that it'll show up in next week's MIR team
meeting. In the meantime, let's try to find out who would know more
about the OEM archive and OEM process to see if this an appropriate
outcome for this package.
Thanks
** Changed in: lenovo-wwan-unlock (Ubuntu)
Status:
This change makes me uneasy:
- I see no terminal-aware filtering applied in the notify_start() ->
xvasprintf() -> writemsg() -> write() path. The remote server may not be
entirely untrusted but it's also not exactly trusted, either, especially
on the first use. There's a long and glorious history
** Tags added: sec-4902
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072621
Title:
[MIR] rpds-py
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rpds-py/+b
** Tags added: sec-4903
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073783
Title:
[MIR] exfatprogs
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exfatpr
There's embedded copies of sha1, sha256, sha512 in the upstream package:
https://github.com/libimobiledevice/libimobiledevice-
glue/tree/master/src
I haven't yet looked at our version of the package.
The libimobiledevice library is licensed LGPL; the libtomcrypt code has
been placed in the public
Filesystems, especially new ones, are a frequent source of problems due
to poor parsing. Do you know if exfatprogs already has some fuzzing
integration with eg ossfuzz or run during the build or by the authors?
If not, could you suggest it to the authors?
Thanks
--
You received this bug notifica
** Tags added: sec-4836
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074086
Title:
MIR libimobiledevice-glue
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+sourc
** Tags added: sec-4835
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070882
Title:
[MIR] jpeg-xl
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jpeg-xl/+b
Manus, I believe you've got a different issue: libuv1 version 1.44.2
does not exist in a currently supported release of Ubuntu. Ubuntu 20.04
LTS is still on 1.34.2-ish versions:
$ rmadison libuv1 | grep 1.44.2
$ rmadison libuv1 | grep focal
libuv1 | 1.34.2-1ubuntu1 | focal | source,
Stephen, thanks for the excellent bug report.
I don't know Debian packaging well enough to point to the exact error in
the build rules, but this is the order of operations described in the
build log:
https://launchpadlibrarian.net/593502889/buildlog_ubuntu-jammy-
amd64.sunpy_3.1.5-1_BUILDING.txt.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075118
Title:
PNG images in .deb don't match md5sums file or local build
To manag
There's a typo in the package description:
> x86-64 architecture, corresponding to x86-65 psABI v1.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073895
Title:
[MIR] isa-support
To mana
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073974
Title:
package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to
install/upgrade: p
Hello Uwe, thanks for the bug report. On a first look this doesn't feel
like a security issue, it can probably be addressed by (a) removing
fonts (b) adding memory (c) limiting the memory available to the process
/ user and thus preventing the user from causing problems.
Does this allow crossing s
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073033
Title:
request to /storage/v2/edit_partition crashed with Exception | I
** Tags added: sec-4768
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070807
Title:
[MIR] highway
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/highway/+b
Thanks, Mani. You're right, the photo is hard to see what's going on,
but it does show that something is visible when probably nothing should
be visible.
Thanks
** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Secu
Hello, I think these lines in your logs mean that your system BIOS is
configured to prevent changing the boot environment. Look for
"antivirus" or "boot protection" in your BIOS.
Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: No se puede
establecer la variable de EFI Boot0003.
Jul 15
Hello Carlos. thanks for the report; if you've installed any gnome
extensions yourself, I'd suggest to remove them all as a first debugging
step. They are apparently very easy to screw up. If the problem goes
away, try bisecting your extensions to find out which one or combination
leads to the prob
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take include
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073000
Title:
many vulnerabilities on ubuntu20 package linux-image-aws -
5.15.0.
Thanks for the link to the upstream bug. I'll mirror their "wontfix"
here, as we're unlikely to invest the resources to invent new
functionality for the firewall that differs from upstream's choices.
** Changed in: linux (Ubuntu)
Status: New => Won't Fix
--
You received this bug notificat
*** This bug is a duplicate of bug 2071633 ***
https://bugs.launchpad.net/bugs/2071633
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/207
Of these three, I prefer the shell. (I know, I'm as surprised as you.)
Please use this version, unless there's a compelling reason to prefer
Python:
#!/bin/bash
data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z')
echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${da
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072406
Title:
subtile flaw in kernel packet filter nftables
To manage notificatio
These might be related and might help the underlying problem:
https://github.com/openssh/openssh-portable/commit/8785491123d4d722b310c20f383570be758f8263
https://github.com/openssh/openssh-portable/commit/c0cb3b8c837761816a60a3cdb54062668df09652
Thanks
--
You received this bug notification beca
.. It turns out that this was a bad experience all around:
https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2043101
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999345
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for the report; what's the consequences of that configuration
change? I'm guessing that it would remove the qbittorrent administrative
interface from the public IP address of the UPnP router, with no way to
re-enable it. Is that correct?
Thanks
--
You received this bug notification becaus
Hello Solaris, there's not much here to work with; please run apport-
collect 2070387 to attach some logs and package statuses to inspect.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070387
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Tags added: sec-4642
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069308
Title:
MIR xdg-terminal-exec
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xd
** Tags added: sec-4626
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070025
Title:
[MIR] wsdd
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsdd/+bug/207
Awesome, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1991859
Title:
pro attach does not cope well with squid-deb-proxy ACLs
To manage notifications about this bug go to:
https://bugs.laun
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069774
Title:
package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed
to ins
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069499
Title:
ubuntu install failed
To manage notifications about this bug go to:
https://
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069523
Title:
package click 0.5.2-2ubuntu4 failed to install/upgrade: installed
click pac
I'm curious if a config change in xdg-utils is all that's needed to get
something similar:
$ locate xdg-terminal x/xdg-utils
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/desc/xdg-termin
** Tags removed: verification-needed-focal verification-needed-jammy
verification-needed-mantic verification-needed-noble
** Tags added: verification-done-focal verification-done-jammy
verification-done-mantic verification-needed-done
--
You received this bug notification because you are a memb
Testing details:
Batch tested on Jammy, manually tested on all other OS. On Jammy batch tests,
achieved 99% hibernate/resume success rate, failures unrelated to the Hibernate
agent.
High level batch testing details:
1.) Run M6g Instance.
2.) Connect to the instance and install the kernel from ja
SELinux and AppArmor both do pretty significant configuration during
early boot, I can't imagine that live switching between the two at
runtime is going to be well supported by anything.
If you intend to replace AppArmor with SELinux, you should do that via
the kernel command line flags so that th
I suspect that you've got a local problem with this configuration file,
try reinstalling openssh-server but with some flags to force replacing
the missing and changed configuration files:
sudo apt-get --yes reinstall -o Dpkg::Options::="--force-confnew" -o
Dpkg::Options::="--force-confmiss openssh
Andrei, try to log in via multiple methods. Every service (ssh, login,
gdm, xdm, etc) has its own PAM configuration and some of them may
reference this module and some may not.
Once you've logged in, edit the files in /etc/pam.d/ that reference this
module. Remove or comment them out. Save, then t
These nvidia drivers look really unhappy, the first trace:
[ 11.997286] [ cut here ]
[ 11.997290] UBSAN: array-index-out-of-bounds in
build/nvidia/535.171.04/build/nvidia-uvm/uvm_pmm_gpu.c:2364:28
[ 11.997293] index 0 is out of range for type 'uvm_gpu_chunk_t *[*]'
[
There's at least two errors here:
- the title describes two packages that own the same file, these should
both be fixed
- the dpkg terminal log looks a bit like a full filesystem:
Setting up apache2-bin (2.4.41-4ubuntu3.14) ...
Setting up mysql-server (8.0.33-0ubuntu0.20.04.2) ...
Setting up lib
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068822
Title:
unable to detach live patch as I try to do it because I was unable to
see l
Hello Ariel, thanks for the report; does Google say what exactly is
wrong with this file?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
Real, Lena is trying to fix the bug you reported. It would be helpful if
you could test the fix.
I suggest reading the https://wiki.ubuntu.com/StableReleaseUpdates page
to better understand our process.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068787
Title:
ubuntu-release-upgrader
To manage notifications about this bug go to:
https:
Probably this should be multiple bug reports, one per problem, but just
in case this sounds familiar to someone else...
** Information type changed from Private Security to Public
** Package changed: ubuntu-meta (Ubuntu) => ubuntu
--
You received this bug notification because you are a member o
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068601
Title:
package amd64-microcode 3.20191218.1ubuntu2.1 failed to
install/upgrade: po
** Tags added: sec-4574
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066269
Title:
[MIR] sysprof
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sysprof/+b
Batch tested the proposed kernel for Jammy 6.5 and achieved 99+% success
rate on CLI/console initiated Hibernate/Resumes. Complete batch tests
across all ARM supported instance types ran previously, limited this
test to the M6g family as confirmation.
High level testing details:
1.) Spun up instan
Successfully tested with the agent on the M6g family. Received 599/600
successful hibernate resumes. The one failure was unrelated to the agent
and within reasonable margins.
High level testing steps:
1.) Run M6g Instance.
2.) Connect to the instance and install the PPA
(https://launchpad.net/~mi
** Tags added: sec-4374
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067373
Title:
[MIR] provd
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, your logs are full of very unhappy messages. I'm hoping that this
is the root of all your problems:
[ 1509.531045] usb usb3-port11: Cannot enable. Maybe the USB cable is
bad?
but it's possible that your hardware is broken enough that this is just
a bad guess.
I suggest finding someone to
Hello James, thanks for the report.
If I were designing this thing myself I certainly would have had
different packages for journal sending than journal receiving, but
whoever implemented it wanted to offer to both pull and push models and
allow on-demand journal collecting from hosts.
Given that
** Information type changed from Private Security to Public Security
** Changed in: systemd (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067910
Title:
gat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Adrien, thanks so much for digging into this again.
This is so very complicated, why does openssl need special handling in
the world of needrestart? My inclination is to remove all this
complexity and address any shortcomings of needrestart in the
needrestart package. Am I off base?
Thanks
--
Y
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, I believe this means that the mirror you are using does not yet
have the Ubuntu 24.04 LTS release.
2024-05-26 23:21:19,553 DEBUG s='http' n='mirrors.piconets.webwerks.in'
p='/ubuntu-mirror/ubuntu//dists/noble/Release' q='' f=''
2024-05-26 23:21:19,619 DEBUG error from httplib: 'HTTP Error
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I can't promise that this is your problem but it looks like trouble:
May 16 05:04:15 ubuntu ubiquity: /dev/sda5: Inodes that were part of a
corrupted orphan linked list found.
May 16 05:04:15 ubuntu ubiquity:
May 16 05:04:15 ubuntu ubiquity: /dev/sda5: UNEXPECTED INCONSISTENCY; RUN fsck
MANUALL
*** This bug is a duplicate of bug 2065678 ***
https://bugs.launchpad.net/bugs/2065678
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/206
I've poked around a little bit and think this might not justify much
time to fix:
- it's suggested to be used in the initramfs, presumably before untrusted users
are executing
- it's apparently not going to work with luks2 format, only luks1, and I
believe we've switched the default to luks2
In
Nice find, Hadmut, thanks.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065510
Title:
/lib/cryptsetup/scripts/decrypt_derived
Abraham, if you've got an easy test case for this, it might be useful to
test the various versions released into 22.04 LTS:
https://launchpad.net/ubuntu/jammy/+source/netatalk
eg:
pull-lp-debs netatalk jammy 3.1.12~ds-9ubuntu0.22.04.1
for all the versions listed, then try them in turn.
Thanks
Jake, some progress is underway for Launchpad to automatically sign PPAs
with RSA4096 keys https://discourse.ubuntu.com/t/new-requirements-for-
apt-repository-signing-in-24-04/42854
It's also possible to dual-sign non-ppa repositories, eg:
curl -s http://archive.ubuntu.com/ubuntu/dists/focal-upda
I think we fixed this in December 2022:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/+bug/1997087
https://git.launchpad.net/ubuntu-cve-
tracker/tree/active/CVE-2022-34673#n360
Thanks
** Information type changed from Private Security to Public Security
** CVE added: ht
Hello KolAflash, thanks for writing; the wiki page in question has this
suggestion:
# echo "UMASK=0077" >> /etc/initramfs-tools/initramfs.conf
Which should take care of the secrets in case the administrator chooses
to use this mechanism to automatically supply keys to LUKS, right?
Thanks
--
Yo
Batch tested the patched kernel and achieved 99+% success rate on
CLI/console initiated Hibernate/Resumes across all ARM supported AWS EC2
instance families, C6g(d)(n), C7g(d), M6g(d), M7g(d), R6g(d), R7g(d),
T4g. (4,175/4,200 test runs).
High level testing details:
1.) Spun up instance with patch
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2037897
Title:
FreeCAD unable to create new document under wayland
To manage notifications about thi
Apparently this exists now via the new -p flag, but doesn't currently
work in releases with deb822 formatted sources lists:
https://bugs.launchpad.net/ubuntu/+source/software-
properties/+bug/2061128
** Changed in: software-properties (Ubuntu)
Status: Confirmed => Fix Released
--
You rece
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064750
Title:
block probing crashed with ValueError
To manage notifications about this bug
Hello Robert, I believe this is intentional.
If you wish to restore the previous behavior, it should be sufficient to
change /usr/bin/write.ul to root:tty 02755.
Thanks
** Changed in: util-linux (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public
Two different services attempting to bind on a single (IP, port) tuple
is going to lead to a failure of one of the services. Prior to this
update it was a silent failure, which serves only to make debugging
problems more difficult.
I can empathize with the feeling that things shouldn't break in an
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064479
Title:
file error keeps repeating after any Terminal installation with APT
this is
Hello Spencer, thanks for the report. This is pretty common with
programs that provide a more "interactive" experience. There's two tools
that can help recover from this, reset(1) and stty(1). When this
happens, run:
reset
or
stty sane
Both should fix this specific case. But sometimes one or the
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064306
Title:
error
To manage notifications about this bug go to:
https://bugs.launchpad.n
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064141
Title:
default config in noble prevents start of fail2ban
To manage notifications a
Hello Christopher, thanks for the bug report. Note that due to ISC
stepping back from their DHCP packages, we've switched to dhcpcd as the
"default" dhcp client. Probably a patch to fix this would be accepted,
but it might not be anybody's priority to work on it.
Thanks
--
You received this bug
** Information type changed from Private Security to Public
** Changed in: apparmor (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063932
Title:
ULTS 24 AppAr
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063927
Title:
package libc6 2.35-0ubuntu3.6 failed to install/upgrade: yeni
libc6:amd64 p
** Package changed: ubuntu => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064192
Title:
Unable to resize windows
To manage notifications about this bug go to:
https://bugs.l
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
1 - 100 of 1601 matches
Mail list logo