Public bug reported:
Without the package libssl-dev, attempting to make a connection via SSL
gives the error: "Unable to load OpenSSL library files: libssl.so and
libcrypto.so"
The package doesn't require or suggest these packages, as they are
needed for this functionality they should be
** Changed in: oem-priority
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964091
Title:
long touch/press a directory won't trigger the context menu like file
Any updates on this ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951520
Title:
CFSSL Disable TLS 1.0 / 1.1
To manage notifications about this bug go to:
On Tue, 2022-05-03 at 10:48:21 -0400, Ken Mandelberg wrote:
> All the other packages for bacula (director, sd) are available but not
> bacula-fd. bacula cannot run without it.
It seems it was removed during the jammy development cycle as it failed
to build from source:
I uploaded
https://launchpad.net/ubuntu/+source/libseccomp/2.5.4-1ubuntu1 earlier
today.
** Changed in: libseccomp (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
==
Ubuntu Security Notice USN-5382-2
May 02, 2022
libinput vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
Here is the upstream bug:
https://github.com/OpenSMTPD/OpenSMTPD/issues/1171
** Bug watch added: github.com/OpenSMTPD/OpenSMTPD/issues #1171
https://github.com/OpenSMTPD/OpenSMTPD/issues/1171
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
** Changed in: oem-priority
Importance: High => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955383
Title:
Support Intel IPU6 MIPI camera on Alder Lake platforms
To manage
I'm happy to say that the approach outlined in #22 worked for me. I used
the CipherString option in #36, too, but didn't try without. Glad I
found this thread.
The network in question is UC Berkeley's eduroam.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Public bug reported:
In Ubuntu 22.04 generic kernel like 5.15.0-23, efivars file system is
mounted and is visible in the output of mount command, however in Ubuntu
22.04 real-time kernel like 5.15.0-1005-realtime or
5.15.0-1007-realtime, efivars file system is missing. Intel SGX feature
relies on
I got the same bug.
If hciuart.service was started before /dev/serial1 is created, it fails.
Fixed by adding systemd override with "Requires" directive:
# systemctl cat hciuart
# /lib/systemd/system/hciuart.service
[Unit]
Description=Configure Bluetooth Modems connected by UART
Public bug reported:
So, I upgraded to Ubuntu 22.04 earlier today, and just noticed all mail
is dismissed with this cryptic error:
smtp disconnected reason="io-error: error:0A080006:SSL routines::EVP
lib"
Running smtpd -dv -Tall gives these errors:
debug: SSL library error:
I managed to sort it out ... After a scare. I lock the desktop and I was unable
to log back in. Upon rebooting I would only get a text prompt and no network
connection after login.
Somehow I managed to get the ethernet up and running. Then with apt upgrade
and apt install ubuntu-desktop... I
I managed to sort it out ... After a scare. I lock the desktop and I was unable
to log back in. Upon rebooting I would only get a text prompt and no network
connection after login.
Somehow I managed to get the ethernet up and running. Then with apt upgrade
and apt install ubuntu-desktop... I
Shall I run
do-release-upgrade -d --mode=desktop ?
shall I use the "--proposed" option?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969786
Title:
Upgrade from 20.04 to 22.04 failed
To manage
Are you referring to this line?
DEBUG need_server_mode(): can not find a desktop meta package or key
deps, running in server mode
I don't understand this ... It is a laptop that only has a SSH server active
on (to be able to do SCP secure copy from the other CentOS box). Why it doesn'
t have
apport information
** Attachment added: "VarLogDistupgradeMainlog.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582151/+files/VarLogDistupgradeMainlog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "VarLogDistupgradeLspcitxt.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582150/+files/VarLogDistupgradeLspcitxt.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "VarLogDistupgradeAptlog.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582148/+files/VarLogDistupgradeAptlog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "ProcEnviron.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582146/+files/ProcEnviron.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969786
apport information
** Attachment added: "VarLogDistupgradeApttermlog.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582149/+files/VarLogDistupgradeApttermlog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "JournalErrors.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582144/+files/JournalErrors.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "VarLogDistupgradeAptHistorylog.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582147/+files/VarLogDistupgradeAptHistorylog.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Tags added: apport-collected focal wayland-session
** Description changed:
On focal 20.04 I executed the following commands:
sudo apt-get update
sudo apt-get upgrade -y
sudo apt-get install update-manager-core -y
sudo apt-get dist-upgrade -y
sudo apt-get
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1969786/+attachment/5582145/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
On focal 20.04 I executed the following commands:
sudo apt-get update
sudo apt-get upgrade -y
sudo apt-get install update-manager-core -y
sudo apt-get dist-upgrade -y
sudo apt-get autoremove
also I disabled 3rd party repositories (Google, FreeCad and some other)
in
Public bug reported:
Phpmyadmin is open
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: phpmyadmin 4:4.9.5+dfsg1-2
ProcVersionSignature: Ubuntu 5.13.0-39.44~20.04.1-generic 5.13.19
Uname: Linux 5.13.0-39-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.21
Architecture: amd64
==
Ubuntu Security Notice USN-5382-1
April 20, 2022
libinput vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
DPDK 20.11 or DPDK 21.11, the same result
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969454
Title:
dpdk-testpmd test shows "init vf failed" with in-tree driver on
ubuntu22.04
To manage
/root/dpdk-21.11/build/app/dpdk-testpmd -c 0xff -n 6 -a 00:06.0
--file-prefix=vf -- -i --rxq=16 --txq=16
testpmd> set fwd rxonly
testpmd> set verbose 1
testpmd> start
the flow director rule examples are like below:
flow create 0 ingress pattern eth / ipv4 src is 192.168.100.1 dst is
Public bug reported:
run ./dpdk-testpmd -c 0x0f -n 4 -- -i --portmask=0x3 with vf port ,the
detail log
root@sp:/opt/APP/utility/dpdk-stable-20.11.3/build/app# ./dpdk-testpmd
-c 0x0f -n 4 -- -i --portmask=0x3
EAL: Detected 128 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Detected static linkage
Public bug reported:
the expected result is packets are distributed to the specified queue
and marked with specified FDIR matched ID, but the actual result is NOT.
-DPDK 21.11 or DPDK 20.11, the same result.
-we have tried at least out-of-tree driver 1.8.3, it works as expected.
So basically
ok, thanks for moving this around. Feel free to let me know if you need
further info to debug this issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969342
Title:
running dpdk-testpmd shows
** Changed in: charm-openstack-dashboard
Milestone: None => 22.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934129
Title:
disable neutron-fwaas for >= victoria
To manage notifications
** Changed in: charm-nova-compute
Milestone: None => 22.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1939390
Title:
Missing dependency: lsscsi
To manage notifications about this bug go to:
** Changed in: charm-keystone
Milestone: None => 22.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951076
Title:
Bootstrap failed on ussuri
To manage notifications about this bug go to:
** Changed in: charm-manila-ganesha
Milestone: None => 22.04
** Changed in: charm-manila
Milestone: None => 22.04
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952763
Title:
[SRU]
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Unfortunately we can't fix it, because your description
didn't include enough information. You may find it helpful to read 'How
to report bugs effectively'
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
I've been messing around with the daily builds of ubuntu22 recently and
I've been running puppet. For the most part puppet works, but when
trying to set a symbolic link as such:
file { "/tmp/foo":
ensure => link,
target => "/tmp/bar",
}
I get the following error:
Yep with this patch applied I can no longer reproduce the crash and the
valgrind output is clean - have just uploaded this as 2.9.4-1ubuntu1 to
jammy-proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Ok so this looks to be the same as https://github.com/storaged-
project/udisks/pull/926 which was fixed upstream - and according to the
comment there causes exactly the type of issue we are seeing:
"leading to memory corruption causing random failures of further atexit
handlers such as cryptsetup
Sadly running it under valgrind doesn't detect this memory corruption -
we see an invalid memory read on shutdown but that is all:
$ sudo valgrind /usr/libexec/udisks2/udisksd
==567833== Memcheck, a memory error detector
==567833== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al.
I can reproduce this by just running `sudo systemctl restart
udisks2.service` - will see if I can perhaps run it under valgrind and
see where the memory corruption is happening.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968043
Title:
Open CVE-2021-4048 with critical severity
To manage notifications
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for the heads up @jdstrand - I am seeing this too - I also have
one more - fsetid:
$ journalctl -b0 -t audit --grep DENIED.*snap-confine
Apr 06 08:48:06 graphene audit[3733]: AVC apparmor="DENIED" operation="capable"
profile="/usr/lib/snapd/snap-confine" pid=3733 comm="snap-confine"
Nice - thanks @sdeziel
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452115
Title:
Python interpreter binary is not compiled as PIE
To manage notifications about this bug go to:
Public bug reported:
#
# A fatal error has been detected by the Java Runtime Environment:
#
# SIGSEGV (0xb) at pc=0x7efb00b2b30b, pid=110001, tid=110002
#
# JRE version: OpenJDK Runtime Environment (11.0.14.1+1) (build
11.0.14.1+1-Ubuntu-0ubuntu1)
# Java VM: OpenJDK 64-Bit Server VM
I reviewed python-xmlschema 1.4.2-1 as checked into jammy. This shouldn't
be considered a full audit but rather a quick gauge of maintainability.
python-xmlschema is a python package which provides XML schema support to
allow XML schemas to be parsed/loaded and queried etc. It also allow XML
Any movement on this ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951520
Title:
CFSSL Disable TLS 1.0 / 1.1
To manage notifications about this bug go to:
*** This bug is a duplicate of bug 1964442 ***
https://bugs.launchpad.net/bugs/1964442
** This bug has been marked a duplicate of bug 1964442
[jammy][regression] gnome-shell PolicyKit password prompt sends
keys to the terminal
--
You received this bug notification because you are a
Before 22.04 I was able to just uninstall snapd to remove ~/snap, and
that was fine.
But now that Firefox is being delivered as only a Snap in 22.04, I'm
essentially being strong-armed into using snaps, because Firefox is
probably the most critical piece of software on my system and I cannot
work
Public bug reported:
As per LP: #1452115 enabling the python interpreter to be compiled as a
position independent executable (PIE) has been a long standing request
for Ubuntu. Various testing[1] has shown this to have a minimal
performance impact for amd64. However, due to ongoing concerns around
Thanks @doko :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452115
Title:
Python interpreter binary is not compiled as PIE
To manage notifications about this bug go to:
I reviewed nftables 1.0.2-1ubuntu1 as checked into jammy. This shouldn't
be considered a full audit but rather a quick gauge of maintainability.
nftables is a replacement for iptables etc - it provides userspace tooling
to control the Netfilter packet classification system within the Linux
Attaching the updated debdiff in case we do decide we want this (even in
the broken state)
** Patch added: "nftables_1.0.2-1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nftables/+bug/1966017/+attachment/5572129/+files/nftables_1.0.2-1ubuntu2.debdiff
--
You received this bug
Turns out I wasn't looking closely enough at the autopkgtest logs from
my local testing - I was trying to run the tests with the pre-built
binary packages and whilst it would indicate the internaltest-py.sh
tests were passing, they were actually completely failing without any
error indication:
** Patch added: "nftables_1.0.2-1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nftables/+bug/1966017/+attachment/5572061/+files/nftables_1.0.2-1ubuntu2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Currently the upstream python-based testsuite for nftables is disabled
in the autopkgtests in debian/tests/control as follows:
# Disable test until we decide what to do with the nftables python module
#Tests: internaltest-py.sh
#Depends: @, python
#Restrictions: needs-root,
I can confirm that fail2ban now works as expected.
service fail2ban status
● fail2ban.service - Fail2Ban Service
Loaded: loaded (/lib/systemd/system/fail2ban.service; enabled; vendor
preset: enabled)
Active: active (running) since Tue 2022-03-22 16:07:45 GMT; 6s ago
Docs:
Upstream bug filed https://gitlab.gnome.org/GNOME/gnome-
shell/-/issues/5242
** Bug watch added: gitlab.gnome.org/GNOME/gnome-shell/-/issues #5242
https://gitlab.gnome.org/GNOME/gnome-shell/-/issues/5242
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I personally don't think this should be low priority - this affects any
application which ends up causing the gnome shell prompt dialog to
appear - so in my case when reading my email and opening a GPG encrypted
email I get prompted for my GPG passphrase - whilst this is happening my
email client
Public bug reported:
Recently I have noticed that when I am being prompted for the passphrase
for to unlock a GPG/SSH key via the gnome-shell prompter, whilst the
prompt is visible the requesting window seems to get spammed by input -
this can be reproduced via running the following (but replace
If it is not clear from the video - watch the terminal window in the
background when the prompt for the passphrase appears - it keeps
scrolling as though getting input by newlines all the time - and this
then persists even after the prompt is dismissed until I manually
provide some input myself.
This looks to be the same as LP: #1955758
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964532
Title:
/usr/libexec/udisks2/udisksd:malloc_consolidate(): unaligned fastbin
chunk detected
To
See attached - it looks like the crash happens during shutdown - see
line 11443
** Attachment added: "journalctl-udisks-crash.log.gz"
https://bugs.launchpad.net/ubuntu/+source/udisks2/+bug/1964532/+attachment/5571201/+files/journalctl-udisks-crash.log.gz
** Changed in: udisks2 (Ubuntu)
*** This bug is a duplicate of bug 1964923 ***
https://bugs.launchpad.net/bugs/1964923
** This bug has been marked a duplicate of bug 1964923
list-oem-metapackages crashed with AttributeError in
packages_for_modalias(): 'Cache' object has no attribute 'packages'
--
You received this bug
Public bug reported:
tar source package fails to build with nodoc build profile
(DEB_BUILD_PROFILES="nodoc")
$ lsb_release -rd
Description:Ubuntu 18.04.6 LTS
Release:18.04
$ apt-get source tar
$ cd tar-1.29b
$ DEB_BUILD_PROFILES="nodoc nocheck" debuild -us -uc
...
dh_testdir
** Changed in: oem-priority
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1902464
Title:
The rear panel of Lenovo P620 doesn't support more than one audio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
Description:Ubuntu Jammy Jellyfish (development branch)
Release:22.04
fail2ban:
Installed: 0.11.2-5
Candidate: 0.11.2-5
Version table:
*** 0.11.2-5 500
500 http://gb.archive.ubuntu.com/ubuntu jammy/universe amd64 Packages
500
Public bug reported:
Traceback (most recent call last):
File "/usr/lib/ubiquity/bin/ubiquity", line 668, in
main(oem_config)
File "/usr/lib/ubiquity/bin/ubiquity", line 652, in main
install(args[0], query=options.query)
File "/usr/lib/ubiquity/bin/ubiquity", line 268, in install
: amd64 arm64 armhf
Additionally, all these Ubuntu versions contain bugs and issues that impact
Ubuntu users from actually using the client on Ubuntu.
Please can you update the Ubuntu package to v2.4.16 for all platforms.
Best regards,
Alex
--
Ubuntu-devel-discuss mailing list
Ubuntu-devel
** Also affects: oem-priority
Importance: Undecided
Status: New
** Changed in: oem-priority
Importance: Undecided => Critical
** Changed in: oem-priority
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
The priority of this bug is Low but since Wayland is now the default
session this means chromium runs via XWayland and then when doing
window/screen sharing on say Google Meet I can only share windows which
are also using XWayland, not native ones - which is the majority of the
rest of the
I have proposed a fix for this upstream -
https://gitlab.com/apparmor/apparmor/-/merge_requests/861 - once that is
reviewed then we can include the fix in jammy.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
FYI - updates to remediate this for Ubuntu 20.04 LTS and Ubuntu 21.10
were published earlier via USN-5316-1
https://ubuntu.com/security/notices/USN-5316-1
Thanks,
Alex
On Mon, 2022-03-07 at 13:14:12 +1030, Alex Murray wrote:
> Hi Reginaldo,
>
> I am taking a look at this now for Ubu
==
Ubuntu Security Notice USN-5316-1
March 08, 2022
redis vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
Public bug reported:
do-release-upgrade -d aborting with no obvious path to resolution
2022-03-07 23:49:02,329 INFO Using config files '['./DistUpgrade.cfg.focal',
'/etc/update-manager/release-upgrades.d/ubuntu-advantage-upgrades.cfg']'
2022-03-07 23:49:02,329 INFO uname information: 'Linux
Hi Reginaldo,
I am taking a look at this now for Ubuntu (note as redis is in universe
it is community maintained but since this is a relatively trivial fix
and you are planning to release a PoC exploit I have taken this on
myself).
Thanks,
Alex
On Thu, 2022-03-03 at 16:21:19 -0300, Reginaldo
** Tags added: nvidia
** Changed in: oem-priority
Importance: High => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1963701
Title:
[NVIDIA][Wayland] graphic target not able to reach
I guess the only way would be to work with custom extra specs inside
flavors/images which can be quite a hassel and can be prone to
(human)errors. Especially when forgetting to set this for new flavors.
Otherwise I don't think of any way on how to control the scheduling for
mixed memory-backend
** Summary changed:
- Jammy Jellyfish LightDM is frozen after long period of inactivity
+ Jammy Jellyfish XFCE Lock Screen not displaying correctly
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Simply entering my password and pressing return also resolves the issue
Seems that the lock screen is present, but is not visible for some reason.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962818
Switching the display compositor over to Compton also resolves the issue
while xfce4-screensaver is still installed.
Problem may exist in xfwm4?
xfwm4:
Installed: 4.16.1-1
Candidate: 4.16.1-1
Version table:
*** 4.16.1-1 500
500 http://au.archive.ubuntu.com/ubuntu jammy/universe
apport information
** Attachment added: "Dependencies.txt"
https://bugs.launchpad.net/bugs/1962818/+attachment/5565597/+files/Dependencies.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1962818/+attachment/5565598/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Changing package to xfce-screensaver after additional troubleshooting:
-apt remove xfce4-screensaver resolves the issue
Appears that the frozen screen is a result of xfce4-screensaver not
operating as expected and is not a LightDM issue
** Package changed: lightdm (Ubuntu) => xfce4-screensaver
xfce4-screensaver:
Installed: 4.16.0-1
Candidate: 4.16.0-1
Version table:
*** 4.16.0-1 500
500 http://au.archive.ubuntu.com/ubuntu jammy/universe amd64 Packages
100 /var/lib/dpkg/status
** Description changed:
Jammy Jellyfish LightDM is frozen after long period of
** Patch added: "squid-deb-proxy_0.8.15+nmu1ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/squid-deb-proxy/+bug/1963590/+attachment/5565432/+files/squid-deb-proxy_0.8.15+nmu1ubuntu2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
squid-deb-proxy comes with the existing ppa.launchpad.net entry
commented out in mirror-dstdomain.acl.d/10-default but does not include
the new ppa.launchpadcontent.net that also supports https -
https://blog.launchpad.net/ppa/new-domain-names-for-ppas
ProblemType: Bug
apport information
** Attachment added: "ProcCpuinfoMinimal.txt"
https://bugs.launchpad.net/bugs/1962818/+attachment/5565348/+files/ProcCpuinfoMinimal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Attachment added: "LightdmUsersConfig.txt"
https://bugs.launchpad.net/bugs/1962818/+attachment/5565347/+files/LightdmUsersConfig.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
apport information
** Tags added: apport-collected jammy
** Description changed:
Jammy Jellyfish LightDM is frozen after long period of inactivity
Latest updates installed, has been happening since first install 2 weeks ago.
Upon using the laptop after over night or coming back from
201 - 300 of 24224 matches
Mail list logo