Thanks for the strace, these looked like the 'important' parts:
sendto(3, {{len=56, type=AUDIT_SET, flags=NLM_F_REQUEST|NLM_F_ACK, seq=3,
pid=0},
"\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa2\xb8\x29\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"...},
56, 0,
On Fri, May 07, 2021 at 03:21:26PM -, Dan Streetman wrote:
> Lucas, thanks! The naming sounds good to me, using -core and -extra does
> seem better than supported/unsupported. No more concerns from me, so
I know it's cliche to bikeshed on names, but:
- "core" is already an overloaded word
Matthew, thanks so much! sounds good to me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254
Title:
x509 Certificate verification fails when
basicConstraints=CA:FALSE,pathlen:0 on
Hello Dan and Matthew, thanks for working on this. I gave the debdiffs a
look, skimmed through openssl changes, and don't see any reason to not
do this. There *are* larger changes to that function in
https://github.com/openssl/openssl/commit/1e41dadfa7b9f792ed0f4714a3d3d36f070cf30e
-- but it's a
Thanks Marco, I'll take pam-pkcs11 off our todo list. (This can be
reversed, of course. If it turns out to be necessary for something,
someone shout. :)
Thanks
** Changed in: pam-pkcs11 (Ubuntu)
Status: New => Invalid
** Changed in: pam-pkcs11 (Ubuntu)
Assignee: Ubuntu Security Team
I couldn't install the debug symbols:
bash-dbgsym : Depends: bash (= 5.0-6ubuntu1) but 5.0-6ubuntu1.1 is to
be installed
And I had to add a Package: bash line to my crash file..
Here's the frames that look most likely related:
#13 0x7f29177a85fa in _dl_find_dso_for_object () from
Possibly a duplicate of bug LP: #1926355
https://bugs.launchpad.net/bugs/1926355
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926379
Title:
stack smashing attack detected in bash host tab
Public bug reported:
Hello, this is a speculative bug report at best.
In some long-lived bash terminals, tab completion of hostnames on ping
or ssh commands is printing the glibc stack smashing attempt error
message:
$ ping goog*** stack smashing detected ***: terminated
^C
$ ssh local*** stack
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923273
Title:
libcaca buffer-overflow
To manage notifications about this bug go
Hello, this sounds like surprising advice to me -- afterall the
/etc/passwd file is 644. I don't know what would be the point of hiding
this 'backup' file. Does the benchmark give a rationale for this?
Thanks
** Information type changed from Private Security to Public Security
** Changed in:
Hello Hadmut, thanks for the report; I've been unwilling to try Docker
myself for this reason. I read the source code everything I run that
doesn't come from the Ubuntu archive, and don't see how that's remotely
possible with Docker images.
It's probably best to discuss options with Docker
CVE-2021-28300 has been assigned to this issue.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-28300
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1919305
Title:
gpac
I reviewed marisa 0.2.6-3~exp2ubuntu2 as checked into hirsute. This shouldn't
be
considered a full audit but rather a quick gauge of maintainability.
marisa is a trie-based datastructure. There's both a library package and
command line interfaces as well as bindings for ruby, python, and
I've filed a CVE request. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1919305
Title:
gpac application crashes on read
To manage notifications about this bug go to:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1919305
Title:
gpac application crashes on read
To manage notifications about
Hello, the error messages here give me the impression your computer is
not allowing the operating system to change the bootup mechanism. There
may be a setting in the BIOS about this, or it might be a hardware
problem of some sort.
Thanks
** Information type changed from Private Security to
Hello Malte, no, it sounds like you found a real bug that probably
deserves to be fixed; I'm just not familiar enough with haproxy to know
if this is crossing security boundaries.
Server team, any thoughts?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Attachment added: "coverity.txt"
https://bugs.launchpad.net/ubuntu/+source/marisa/+bug/1914808/+attachment/5484982/+files/coverity.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914808
Hello Malte, on a first read I don't think this is a security issue: if
a client is responsible for adding a "connection: close" header to the
messages, a malicious client could just as easily issue requests without
this header, no?
Thanks
--
You received this bug notification because you are a
Thanks for investigating, Miguel.
** Changed in: restricted-ssh-commands (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922459
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922654
Title:
Apache Maven Multiple Security Bypass Vulnerabilities
To manage
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922534
Title:
touch pad of my laptop is not working
To manage notifications about this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Miguel, can you give a concrete example to demonstrate the issue?
The bash(1) manpage and the wolledge bash wiki give me the strong
impression that the variable containing the regex should *not* be
quoted:
** Changed in: restricted-ssh-commands (Ubuntu)
Status: New => Incomplete
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922426
Title:
Not able to upgrade the os to letest version
To manage notifications about
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take
Hello Jeffrey, this reminds me a little of
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1876320 -- but
it's also something that should have been addressed last year.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This is a short and sweet package, so I'll skip the full boilerplate:
No cves, no setuid executables, no use of complex frameworks, no sudo
fragments, no initscripts or systemd units, it's really just a few
shellscripts that look like they were well-written.
I wish it were a quilt package rather
** Changed in: u-boot-menu (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907284
Title:
[MIR] u-boot-menu
To manage
I reviewed opensbi 0.9-1ubuntu3 as checked into hirsute. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
opensbi is a firmware for riscv-based systems. It executes outside of
operating systems, in order to provide services necessary for bootloaders,
Hello Alex, I would guess that the reason why the permissions are
incorrect is probably whatever tool added four copies of this to your
sudoers:
ALL ALL=(ALL) NOPASSWD:/usr/share/dtsremoter/remoterserver
ALL ALL=(ALL) NOPASSWD:/usr/share/dtsremoter/remoterdelegate
Any tool that would do that is
AppArmor just enforces the policies that were given to it; please report
this issue to whoever packaged the snap you're using.
Thanks
** Changed in: apparmor (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Information type changed from Private Security to Public
** Tags added: regression-update
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1919563
Title:
updated sssd with smart cards now brick
I have serious reservations about this package.
The build logs are very messy and report a LOT of problems. How does one
tell "these problems are completely normal" from "these problems
indicate a regression in the package"?
There's many cases of building strings to execute, either via simple
I'm sorry I lost track of this bug.
fatrace is still acting strangely for me:
$ uname -a
Linux millbarge 5.4.0-65-generic #73-Ubuntu SMP Mon Jan 18 17:25:17 UTC 2021
x86_64 x86_64 x86_64 GNU/Linux
$ apt policy fatrace
fatrace:
Installed: 0.13-2
Candidate: 0.13-2
Version table:
*** 0.13-2
Argh, perhaps I've made things worse, I added an ubuntu source neutron
task for this, unclicked the 'duplicate' bug, but that sets the wrong
state for the upstream neutron, which was handled in
https://bugs.launchpad.net/neutron/+bug/1883089 -- I'm not sure how to
undo the mess I've made. Anyway,
I'm starting in on this MIR and I'm surprised how many errors there are
in the buildlogs. Both a version I built locally and some buildd build
logs are noisy:
https://launchpad.net/ubuntu/+source/octavia/1:7.0.0+git2021012713.fbbc5f90-0ubuntu1/+build/20944559/+files
/buildlog_ubuntu-hirsute-
teward, I'm a bit confused on the status of
https://bugs.launchpad.net/ubuntu/+source/libmaxminddb/+bug/1861101 and
this MIR -- can you let us know if there's a new module nginx module
that still needs review because it's desired to move it into main?
Thanks
--
You received this bug
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899193
Title:
local denial of service due to parsing bugs in arfile.cc
To manage
Done, thanks Mal.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1916081
Title:
Insecure Chaining of Flags T and TT
To manage
** Changed in: google-osconfig-agent (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1891934
Title:
[MIR]
I took another very quick look at the previous issues I reported and
most have been addressed; the extractZip, extractTar functions still
look quite likely to have all the usual problems associated with
handling archive files ("zip slip" and other very catchy names), so
please don't forget about
For completeness, here's the Coverity output that we generated while
looking at this. The handful of FORWARD_NULL checks looks like Coverity
not understanding golang, but the handful of cases of: "Passing null
pointer "res" to "CheckResponse", which dereferences it." that I
inspected all looked
The decision to modify the default ImageMagick policy to prevent calling
Ghostscript was not made on behalf of any single flaw. There are 50
Ghostscript CVEs allocated after this bug report was opened.
PostScript was not designed to handle malicious inputs. Ghostscript was
not designed to execute
What's the output of:
lsattr -l /etc/sudoers
Please note that the sudoers file should only ever be edited with
visudo, which will perform safety checks on the file when you try to
save it.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1916003
Title:
Screen Lock locks all but one screen
To manage notifications about
It appears that the Focal package has three separate patches for three
different issues:
- vala compilation
- showing an 'e' submenu
- undoing xf86 workaround, necessary after an xorg update
and it appears that the Groovy package has these three same fixes but
all squashed into one patch. Is
Hello, I noticed the following line in your logs:
Feb 19 19:09:07 ubuntu grub-installer: grub-install: error: cannot copy
`/usr/lib/grub/x86_64-efi-signed/grubx64.efi.signed' to
`/boot/efi/EFI/ubuntu/grubx64.efi': No space left on device.
Is your EFI partition too small?
Thanks
** Information
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1916256
Title:
NVIDIA Driver not working
To manage notifications about this bug go to:
Probably the change from Subversion 1.13 to 1.14 is larger than the
stable-release-update team would be willing to work with. However, I
can't speak for them; here's the wiki page describing the process for
performing updates on packages after release:
https://wiki.ubuntu.com/StableReleaseUpdates
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915977
Title:
new upstream version with fixes for INTEL-SA-00381
To manage
Hello,
chown: alterando o dono de '/etc/sudoers': Operação não permitida
Is there any chance you've set attrs on this file to prevent it from
being modified?
THanks
** Changed in: sudo (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of
*** This bug is a duplicate of bug 1871794 ***
https://bugs.launchpad.net/bugs/1871794
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Hello, there are untested packages in https://launchpad.net/~ubuntu-
security-proposed/+archive/ubuntu/ppa/+packages in case you wish to test
them in your environment.
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Hello, note this line from the automatically added contents:
SSHDConfig: Error: command ['/usr/sbin/sshd', '-T'] failed with exit
code 255: /etc/ssh/sshd_config line 1: garbage at end of line; "to".
It looks like your /etc/ssh/sshd_config file may be incorrect.
Thanks
** Changed in: openssh
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915626
Title:
crashes when i want to install ubuntu on my disk 2 i mean second ssd
To
** Information type changed from Private Security to Public Security
** Changed in: subversion (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915698
Title:
Hopefully helpful:
error processing archive
/tmp/apt-dpkg-install-XWrfh6/258-sagemath-jupyter_9.0-1ubuntu4_all.deb
(--unpack):
trying to overwrite '/usr/share/applications/sagemath.desktop', which is also
in package sagemath-upstream-binary 7.5.1~aimsppa6
The ppa-purge tool from the
I reviewed libinih 50-1 as checked into hirsute. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
libinih is a simple ini file parser for C and C++.
- CVE History:
- there's no cves in our database
- Build-Depends: debhelper-compat, meson
- pre/post
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914839
Title:
package upgrade should replace /etc/ssl/certs/ca-certificates.crt
Public bug reported:
Hello, the execsnoop-bpfcc field PCOMM is supposed to report the parent
process's COMM field, but I haven't seen it do that on Ubuntu systems.
Here's some outputs of running 'sleep 10' in a shell with a very fancy
PS1 prompt:
20.04 LTS:
$ sudo execsnoop-bpfcc
PCOMM
Security team ACK for promoting strictly the debugedit + librpmio9
binary packages from the rpm source package to main. We'll be
considering only issues that affect the way we're using debugedit in our
tooling when we're triaging hypothetical future issues.
Thanks
** Changed in: rpm (Ubuntu)
Re test rebuilds, that's certainly the intention, but there are
occasional problems:
https://launchpad.net/bugs/1910555
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1910709
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1910503 (virtualbox,
probably not in
The Firefox AppArmor profile isn't enabled by default because it forces
the user to change how they interact with their browser.
Consider that the profile really allows downloads only into ~/Downloads/
directories. (There's other places that are writable, but even less
suitable for downloads.)
Can you double-check that your pam configuration for pam_winbind is
configured to use required or requisite rather than sufficient?
It's possible that the required or requisite defaults aren't sufficient
but may still be possible to configure using the more complicated pam
syntax. Search for
I was asked to give this a quick look; do you have a reproducer that
demonstrates the problem?
It looks to me like the bounded Queue implementation tries hard to push
back against unconstrained resource growth:
def put(
[ ... ]
future = Future() # type: Future[None]
** Changed in: discount (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1899213
Title:
[MIR] new dependencies of lintian
I reviewed google-osconfig-agent 20200625.00-0ubuntu2 as checked into groovy.
This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
There's far too much code here to provide detailed feedback.
google-osconfig-agent is a cloud-specific operating system management
Maybe try git clone -v https://github.com/git/git ? Perhaps that'll
report something additional. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1913201
Title:
Stuck at HTTPS git cloning into
Can you describe more about how to reproduce the problem? A test in an
lxd environment didn't show any trouble:
root@u2010:~# dpkg -l git libcurl3-gnutls libgnutls30 | cat
Desired=Unknown/Install/Remove/Purge/Hold
| Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend
|/
I added the linux source package to this bug because I've heard this
commit addresses the issue:
https://github.com/gregkh/linux/commit/099340d3e758cca06a82bf5dcff8b9a8acbdcb0a
Thanks
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug
On Fri, Jan 22, 2021 at 01:09:13PM -, lo-na-aleim wrote:
> Sorry for reaching out in the wrong place. I guess the right place for this
> would have been the mailing list?
> I started from: https://wiki.ubuntu.com/DocumentationTeam/SystemDocumentation
>
Actually, thanks for this, I'll
I'm inclined to say an admin should ask to mount this explicitly,
however stgraber pointed out on irc that lxd premounts /sys/kernel/debug
in part to placate upstart in guests. This may have implications for
disabling /lib/systemd/system/sys-kernel-debug.mount by default.
Thanks
--
You received
*** This bug is a security vulnerability ***
Public security bug reported:
Hello, it looks like CONFIG_RANDOMIZE_BASE is not set in our ppc64el
kernel configurations, based on running this in an rsync clone of
kernel.ubuntu.com::kernel-ppa-config/ :
grep CONFIG_RANDOMIZE_BASE $(find . -iname
Thanks for the corrections, lo-na-aleim. We've updated the wiki page to
reflect the KASLR features as they stand currently.
This wiki page is programmatically constructed: hand edits wouldn't
survive in the long run.
Note that the /proc/sys/kernel/randomize_va_space controls whether or
not the
Hello Erick, note that the release notes say:
"Ubuntu Desktop flavour now always tracks HWE kernel (hardware
enablement). It means that from 20.04.2 release Ubuntu Desktop will gain
new major kernel versions every 6 months through to summer of 2022."
Thanks Christian, I think you're right, this probably doesn't need a
security review and being centralized in one place will probably be
easier to maintain.
Thanks
** Changed in: libbpf (Ubuntu)
Status: New => Fix Committed
** Changed in: libbpf (Ubuntu)
Assignee: Seth Arnold (s
Hello, I think the core of your problem is this:
Error 24 : Write error : cannot write compressed block
Caused by a full /boot:
/dev/sda2 483946424596 34365 93% /boot
Truncate a few older files in /boot (start a shell via sudo -s, then find files
with ls -l,
Thanks seb128, this is my first launchpad git merge request, and first
time working with the seeds, so please let me know if I got anything
incorrect.
Thanks
** Merge proposal linked:
https://code.launchpad.net/~seth-arnold/ubuntu-seeds/+git/ubuntu-seeds/+merge/396361
--
You received
Public bug reported:
Hello, anope is in main in several releases:
Ubuntu packages:
xenial: 2.0.3-1build2, Pocket: release, Component: universe
bionic: 2.0.4-2, Pocket: release, Component: universe
focal: 2.0.6-1build3, Pocket: release, Component: main
groovy: 2.0.7-1, Pocket: release,
Great, thanks Richard!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1910611
Title:
sssd startup fails when apparmor in enforcing mode
To manage notifications about this bug go to:
Hello Richard, it looks like the profile may not have kept up with
changes in the packaging.
The profile has probably been broken ever since:
sssd (2.2.0-1) unstable; urgency=medium
* New upstream release.
* control: Bump policy to 4.4.0.
* control, compat, rules: Bump debhelper to 12.
Hello, can you please elaborate on what happened? Thanks
** Information type changed from Private Security to Public Security
** Changed in: checkinstall (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908868
Title:
a hot room in my father's home
To manage notifications about this bug go
Hello mohsen, probably this can get you moving again:
sudo apt update
sudo apt install -f
sudo apt upgrade
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908768
Title:
TouchPad don't response
To manage notifications about this bug go to:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908795
Title:
xrdp needs to be in ssl-cert group to read server private key
To manage
Hello, was this perhaps within a container that might have just had the
host filesystem passed in without write access?
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hello, I'm not sure of the cause of your installation problem, but I did
see firmware errors in the logs, as well as the windows filesystem
wasn't cleanly unmounted. It might be worth installing BIOS updates from
Acer, if any are available, and perhaps also using a 'restart' with
windows, and not
Hello, you've replaced the Ubuntu OpenSSL packages with Ondrej's OpenSSL
packages. You can ask him if he has performed the corresponding update
yet: https://github.com/oerdnj/deb.sury.org
Thanks
** Information type changed from Private Security to Public Security
** Changed in: openssl (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908631
Title:
Ubuntu 20.04 não consegue terminar a instalação
To manage notifications
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908346
Title:
grub boot-load crashed during ubuntu 18.04 installtion
To manage
Hopefully helpful, hopefully this isn't a red herring, but it sure seems
suspicious timing:
[ 113.249890] rfkill: input handler disabled
[ 242.742392] INFO: task kworker/u16:3:110 blocked for more than 120 seconds.
[ 242.742399] Not tainted 5.4.0-58-generic #64-Ubuntu
[ 242.742401]
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908325
Title:
error de instalacion de grub
To manage notifications about this bug go to:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1908184
Title:
package mysql-server-8.0 8.0.22-0ubuntu0.20.04.3 failed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with Debian and posting a debdiff for this issue. When a
debdiff is
401 - 500 of 6656 matches
Mail list logo