Public bug reported:
Linux said to me it have a error
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: xrdp 0.9.12-1ubuntu0.1
ProcVersionSignature: Ubuntu 5.4.0-187.207-generic 5.4.271
Uname: Linux 5.4.0-187-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.27
Architecture: amd64
Tested proposed package 2:20.3.1-0ubuntu1.2~cloud0 on focal/yoga. Tested
setting a property with a long value as indicated on the test plan and
worked as expected with no errors.
** Tags removed: verification-yoga-needed
** Tags added: verification-yoga-done
--
You received this bug
** Description changed:
[Impact]
The links for the following are broken in the Service Information or the Host
Information menus for the following links:
View Trends For This Service
View Alert Histogram For This Service
View Trends For This Host
View Alert Histogram For This Host
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953572
Title:
Broken links in the View Trends and the View Histogram menu
To manage notifications about this bug go to:
patch for Oracular
** Patch added: "lp1953572_oracular.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5783281/+files/lp1953572_oracular.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
==
Ubuntu Security Notice USN-6673-3
May 27, 2024
python-cryptography vulnerability
==
A security issue affects these releases of Ubuntu and its
** Also affects: nagios4 (Ubuntu Oracular)
Importance: Medium
Assignee: Jorge Merlino (jorge-merlino)
Status: In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953572
Title
==
Ubuntu Security Notice USN-6780-1
May 21, 2024
python-idna vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
Thanks for the detailed reply @jjohansen,
Do you think it would be feasible to spawn a pop-up that says something
like "This application uses namespaces which is considered vulnerable to
exploits, are you sure you want to continue?" and ask for the password
to allow the application to run. This
Thanks for the reply!
My use case is this one 'shipped as a .tar.gz that people unpack into
their home dir and then use'. To me it seems counter-intuitive to force
applications to run un-sanboxed for added security; both the solutions
proposed (with the application profile and to turn off the
Hello,
Pardon my ignorance, but I ship applications with my own build of
bubblewrap to run in a sandboxed manner. bwrap's pivot_root allows my
application to work across several distros without worrying about issues
with missing or incompatible libraries; it also makes possible to run
the same
Disregard my last message, it was an error on my part during testing.
Tested version 2:23.0.0-0ubuntu1.2 on Mantic. I ran the commands on the
test plan and no error was shown and the long property was set
correctly.
I still do not see the updated packages on mantic-proposed on my test
machine
** Tags removed: verification-failed-mantic
** Tags added: verification-done-mantic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1988942
Title:
Failed to set image property. Invalid input for
I tested on mantic but had several problems. The first one is that I do
not see the new versions in mantic-proposed. After adding the proposed
pocket these are the upgradable packages I see:
distro-info-data/mantic-updates,mantic-proposed 0.58ubuntu0.3 all [upgradable
from: 0.58ubuntu0.2]
Tested proposed package 2:20.3.1-0ubuntu1.2 on jammy. Tested setting a
property with a long value as indicated on the test plan and worked as
expected with no errors.
** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy
--
You received this bug notification because
** Description changed:
[Impact]
The links for the following are broken in the Service Information or the Host
Information menus for the following links:
View Trends For This Service
View Alert Histogram For This Service
View Trends For This Host
View Alert Histogram For This Host
New patch for jammy
** Patch added: "lp1953572_jammy.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5771715/+files/lp1953572_jammy.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
New patch for focal
** Patch added: "lp1953572_focal_v2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5771714/+files/lp1953572_focal_v2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
New patch for noble
** Patch added: "lp1953572_noble.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5771717/+files/lp1953572_noble.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
New patch for mantic
** Patch added: "lp1953572_mantic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5771716/+files/lp1953572_mantic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
//bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5769841/+files/lp1953572_jammy_noble.debdiff
** Changed in: nagios4 (Ubuntu Focal)
Assignee: (unassigned) => Jorge Merlino (jorge-merlino)
--
You received this bug notification because you are a member of Ubuntu
Bu
Patch for focal
** Patch added: "lp1953572_focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1953572/+attachment/5769861/+files/lp1953572_focal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
: nagios4 (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: nagios4 (Ubuntu Noble)
Assignee: (unassigned) => Jorge Merlino (jorge-merlino)
** Changed in: nagios4 (Ubuntu Mantic)
Assignee: (unassigned) => Jorge Merlino (jorge-merlino)
** Changed in: n
Hi Łukasz,
Sorry but I'm missing something here, the patches I submitted are
versions 2:23.0.0-0ubuntu1.2 for mantic and 2:20.3.1-0ubuntu1.2 for
jammy.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
==
Ubuntu Security Notice USN-6673-2
March 14, 2024
python-cryptography vulnerability
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6673-1
March 04, 2024
python-cryptography vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6614-1
January 30, 2024
amanda vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6489-1
November 20, 2023
tang vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6473-2
November 15, 2023
python-pip vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6473-1
November 07, 2023
python-urllib3 vulnerabilities
==
A security issue affects these releases of Ubuntu and its
provides
the corresponding update for Ubuntu 22.04 LTS.
Original advisory details:
Jorge Sancho Larraz discovered that iperf3 did not properly manage certain
inputs, which could cause the server process to stop responding, waiting
for input on the control connection. A remote attacker could possibly
==
Ubuntu Security Notice USN-6431-2
October 16, 2023
iperf3 vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
:
It was discovered that iperf3 did not properly manage certain inputs,
which could lead to a crash. A remote attacker could possibly use this
issue to cause a denial of service. (CVE-2023-38403)
Jorge Sancho Larraz discovered that iperf3 did not properly manage certain
inputs, which could cause the server process
==
Ubuntu Security Notice USN-6401-1
October 04, 2023
freerdp2 vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6375-1
September 15, 2023
atftp vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6353-1
September 07, 2023
plib vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6334-1
September 04, 2023
atftp vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
Backported debs in:
https://launchpad.net/~jrodrigu/+archive/ubuntu/bpo/+packages
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1992163
Title:
[BPO] man-db/2.10.2-1 from jammy
To
** Description changed:
[Impact]
- * Users of man-db/2.9.1-1 in focal are sometimes facing
+ * Users of man-db/2.9.1-1 in focal are sometimes facing
unresponsiveness when man-db is called from an `apt upgrade` or `apt
install` command (the man-db command freezes).
[Scope]
- *
Hi Daniel!
#20 works for me! Thanks!
Do you have any explanation for this? How come this was not a problem
back when I was running Fedora? Is Ubuntu 22.04 using an older, unfixed
version of some package? Was this bug introduced downstream in the
Ubuntu release? Are there any plans of fixing this
Trying to print from gedit or evince causes the same crash.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970483
Title:
extension-manager crashes when browsing behind a proxy
To manage
I'm facing the same issue (duplicated in reported bug 1971674) with my
Mi Notebook Pro 2018 running Ubuntu 22.04, an Intel® Core™ i7-8550U with
an NVIDIA GeForce MX150 using Wayland. I thought the issue was with
Nvidia, but I can tell that's not the case.
** Attachment added: "journal.txt"
Thank you Daniel, I just did (bug #1971674)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971149
Title:
Wayland session: Internal display is black after sleep
To manage notifications about this
Public bug reported:
I thought this was similar to bug #1971149, but that's not the case at
all. Apparently my problem comes from the screen being black but not
suspended (while playing some audio). Suspending the laptop (by closing
the lid or pressing the POWER buttom) and then waking it up
Here you have
** Attachment added: "journal.txt"
https://bugs.launchpad.net/ubuntu/+source/mutter/+bug/1971149/+attachment/5586890/+files/journal.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I'm facing a similar issue. I'm also using Wayland and a Nvidia MX150
card. Let me attach the log once I have the issue again. It seems to
happen after long periods of sleep.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I have an AC-88U.
I updated the Certificate and after that I exported a new OVPN file that I then
used on the Ubuntu 22.04 machine. It worked immediately.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I had the same problem of losing connection after upgrading to Ubuntu 22.04.
After reading on several pages all over the Internet for solutions, I found
someone saying that Ubuntu 22.04 uses a new and more secure version of OpenSSL
(if I remember correctly). This would force some people to use
Tested version 2.0.874-5ubuntu2.11 from proposed and worked fine.
https://pastebin.ubuntu.com/p/n4F5rvtMrs/
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Public bug reported:
Ubuntu 22.04 freshly installed.
Proxy configured in Settings GUI, /etc/profile and /etc/apt/apt.conf .
Browsing the web, installing software and stuff like that all works.
When I run extension manager it loads, but as soon as I hit the browse
button it crashes immediately
** Description changed:
+ [Impact]
+
+ When creating a bare metal instance on Oracle Cloud (which are backed by an
iscsi disk), the IP address is configured on an interface (enp45s0f0) on boot,
but cloud-init is generating a /etc/netplan/50-cloud-init.yaml with an entry to
configure enp12s0f0
I tested the patch myself on an Oracle Cloud machine that presented this
issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872813
Title:
cloud-init fails to detect iSCSI root on focal Oracle
SRU for Bionic
** Tags added: sts
** Patch added: "lp1872813_bionic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/open-iscsi/+bug/1872813/+attachment/5577913/+files/lp1872813_bionic.debdiff
** Changed in: open-iscsi (Ubuntu Bionic)
Status: New => In Progress
--
You received
** Also affects: open-iscsi (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: open-iscsi (Ubuntu Bionic)
Assignee: (unassigned) => Jorge Merlino (jorge-merlino)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
Public bug reported:
computer model:notebook 9 pen 15" nvidia
GPU: Nvidia geforce mx150
Sound: AKG stereo speakers High definition audio
no sound whats so ever, not even in bluetooth. removed and reinstalled
alsa and pulse audio, then restarted, just to have no sound still.
checked settings in
** Also affects: maas (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: maas (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912727
Title:
KVM Page Fails to load
Tested version 1.0.15ubuntu0.21.10.1 in Impish.
Performed the tests on comment #14. All worked fine.
** Tags removed: verification-needed-bionic verification-needed-focal
verification-needed-hirsute verification-needed-impish
** Tags added: verification-done-bionic verification-done-focal
Tested version 1.0.15ubuntu0.21.04.1 in Hirsute.
Performed the tests on comment #14. All worked fine.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949643
Title:
iptables-persistent
Tested version 1.0.14ubuntu1 in Focal.
Performed the tests on comment #14. All worked fine.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949643
Title:
iptables-persistent unconditionally drops
Tested version 1.0.4+nmu2ubuntu1.1 in Bionic.
Performed the tests on comment #14. All worked fine.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949643
Title:
iptables-persistent unconditionally
The SRU patches where built and tested by me in each Ubuntu version.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949643
Title:
iptables-persistent unconditionally drops existing iptables rules
SRU for Impish. Fixed changelog.
** Patch added: "lp1949643-impishv2.debdiff"
https://bugs.launchpad.net/ubuntu/hirsute/+source/iptables-persistent/+bug/1949643/+attachment/5547368/+files/lp1949643-impishv2.debdiff
--
You received this bug notification because you are a member of Ubuntu
SRU for Hirsute. Fixed changelog.
** Patch added: "lp1949643-hirsutev2.debdiff"
https://bugs.launchpad.net/ubuntu/hirsute/+source/iptables-persistent/+bug/1949643/+attachment/5547367/+files/lp1949643-hirsutev2.debdiff
--
You received this bug notification because you are a member of Ubuntu
SRU for Focal. Fixed changelog.
** Patch added: "lp1949643-focalv2.debdiff"
https://bugs.launchpad.net/ubuntu/hirsute/+source/iptables-persistent/+bug/1949643/+attachment/5547366/+files/lp1949643-focalv2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs,
SRU for Bionic. Fixed changelog and indentantion
** Patch added: "lp1949643-bionicv2.debdiff"
https://bugs.launchpad.net/ubuntu/hirsute/+source/iptables-persistent/+bug/1949643/+attachment/5547365/+files/lp1949643-bionicv2.debdiff
--
You received this bug notification because you are a
** Tags added: sts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949643
Title:
iptables-persistent unconditionally drops existing iptables rules
To manage notifications about this bug go to:
SRU for impish
** Patch added: "lp1949643-impish.debdiff"
https://bugs.launchpad.net/ubuntu/+source/iptables-persistent/+bug/1949643/+attachment/5546887/+files/lp1949643-impish.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
SRU for focal
** Patch added: "lp1949643-focal.debdiff"
https://bugs.launchpad.net/ubuntu/+source/iptables-persistent/+bug/1949643/+attachment/5546889/+files/lp1949643-focal.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
SRU for hirsute
** Patch added: "lp1949643-hirsute.debdiff"
https://bugs.launchpad.net/ubuntu/+source/iptables-persistent/+bug/1949643/+attachment/5546888/+files/lp1949643-hirsute.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
SRU for bionic
** Patch added: "lp1949643-bionic.debdiff"
https://bugs.launchpad.net/ubuntu/+source/iptables-persistent/+bug/1949643/+attachment/5546890/+files/lp1949643-bionic.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hello,
I've verified that this problem doesn't reproduces with the package
contained in proposed.
1) Deployed this bundle of bionic-queens
Upgraded to the following version:
root@juju-51d6ad-1751923-6:/home/ubuntu# dpkg -l | grep nova
ii nova-api-os-compute 2:17.0.13-0ubuntu3
I see the change in prior releases S/T/U
https://github.com/openstack/designate/commit/b967e9f706373f1aad6db882c2295fbbe1fadfc9
https://github.com/openstack/designate/commit/953492904772933f5f8e265d1ae6cc1e6385fcc6
Public bug reported:
/usr/games/fretsonfire: 5: ./FretsOnFire.py: not found
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: fretsonfire 1.3.110.dfsg2-5ubuntu1
ProcVersionSignature: Ubuntu 5.11.0-25.27~20.04.1-generic 5.11.22
Uname: Linux 5.11.0-25-generic x86_64
ApportVersion:
Public bug reported:
when installing and exiting at synaptic it can't config mysql - mariadb gets in
the way - I suspect. I tried before this one but no go. I need mysql to test
an app. so I tried again. no luck
Must say I am loving the ubuntu 21.04 hirsuit (or close). Good luck 2 all.
Jorge
I am in the process to verify bionic/rocky/queens releases.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1751923
Title:
[SRU]_heal_instance_info_cache periodic task bases on port list from
nova
Hello,
I reviewed the code path and upgrade in my reproducer, following the approach
of upgrading neutron-gateway and subsequently neutron-api doesn't works because
of a mismatch
in the migrations/rpc versions that causes the ha port to fail to be
created/updated,
then the keepalived process
Master/Train/Ussuri/Stein fixed upstream
https://review.opendev.org/q/topic:%22bug%252F1879798%22+(status:open%20OR%20status:merged)
Needs backports for UCA
** Also affects: cloud-archive
Importance: Undecided
Status: New
** Also affects: cloud-archive/ussuri
Importance: Undecided
I have Ubuntu MATE 20.10 running on my Raspberry Pi 4 and I can't
upgrade because of this bug as well.
I went to the file "DistUpgradeQuirks.py" (as mentioned above) and I
can't see any "apple" string there to change and force the upgrade. I'm
just stuck.
--
You received this bug notification
@corey anything in specific you need at my end to get this SRU reviewed?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1751923
Title:
[SRU]_heal_instance_info_cache periodic task bases on port list
I was able to install 5.12.4 using @tuxinvader ppa on 20.04 with current
libc6 2.31. Great work @tuxinvader!
I have used:
sudo add-apt-repository ppa:tuxinvader/lts-mainline
sudo apt install linux-image-unsigned-5.12.4-051204-generic
linux-modules-5.12.4-051204-generic
** Description changed:
[Impact]
* During periodic task _heal_instance_info_cache the instance_info_caches are
not updated using instance port_ids taken from neutron, but from nova db.
* This causes that existing VMs to loose their network interfaces after
reboot.
[Test Plan]
** Patch added: "lp1751923_bionic.debdiff"
https://bugs.launchpad.net/nova/+bug/1751923/+attachment/5498309/+files/lp1751923_bionic.debdiff
** Description changed:
[Impact]
* During periodic task _heal_instance_info_cache the instance_info_caches are
not updated using instance
Hello,
I've prepared a PPA for testing the proposed patch on B/Queens
https://launchpad.net/~niedbalski/+archive/ubuntu/lp1751923/+packages
Attached is the debdiff for bionic.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: cloud-archive/rocky
Status: In Progress => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1751923
Title:
[SRU]_heal_instance_info_cache periodic task bases on port
** Description changed:
- Description
- ===
+ [Impact]
- During periodic task _heal_instance_info_cache the instance_info_caches
- are not updated using instance port_ids taken from neutron, but from
- nova db.
+ * During periodic task _heal_instance_info_cache the instance_info_caches
** Changed in: nova (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: cloud-archive/queens
Status: New => In Progress
** Changed in: cloud-archive/queens
Assignee: (unassigned) => Jorge Niedbalski (niedbalski)
** Changed in: nova (Ubuntu Bionic)
*** This bug is a duplicate of bug 1853094 ***
https://bugs.launchpad.net/bugs/1853094
I have de same problem, I change to star ubuntu wayland, but in
different moments, ubuntu again present the same problem, this occurs
when update the ubuntu because never see this problem the last year in
Verified victoria / focal - groovy
* (focal/victoria) => https://pastebin.ubuntu.com/p/XPVQbwKY7v/
* (groovy-proposed) ==> (https://pastebin.ubuntu.com/p/ZHsvzXR7QH/)
** Tags removed: verification-needed verification-needed-focal
verification-needed-groovy verification-victoria-needed
** Tags
Verified train, stein, ussuri.
* train, results: (https://pastebin.ubuntu.com/p/Y7sD9w3rWz/)
* stein, results: (https://pastebin.ubuntu.com/p/ZHsvzXR7QH/)
* ussuri, results: (https://pastebin.ubuntu.com/p/jymSscH3TS/)
** Tags removed: verification-train-needed verification-ussuri-needed
**
Hello Lucas,
I'll reformat the patch accordingly and re-submit. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1890491
Title:
A pacemaker node fails monitor (probe) and stop /start
Public bug reported:
during installation it reports a crash
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity 20.04.15.2
ProcVersionSignature: Ubuntu 5.4.0-42.46-generic 5.4.44
Uname: Linux 5.4.0-42-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
Public bug reported:
Não foi possível calcular a atualização
Ocorreu um problema sem solução, enquanto estava calculando a
atualização.
Se nada disto servir, então por favor comunique a falha usando o
comando 'ubuntu-bug ubuntu-release-upgrader-core' no terminal. Se você
quiser investigar isto
I think this is related to
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1883905.
I have tried the solutions posted on that bug and at
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1899258
I tried modifying GRUB_CMDLINE_LINUX_DEFAULT for adding several options such as
---> Installed version
root@juju-bf8c6a-lm-ceilometer-7:/home/ubuntu# dpkg -l |grep -i ceilometer
ii ceilometer-agent-compute 1:12.1.1-0ubuntu1~cloud1
all ceilometer compute agent
ii ceilometer-common1:12.1.1-0ubuntu1~cloud1
With the proposed patch on stein:
--- nova-compute disabled / no requires --- machine rebooted
root@juju-bf8c6a-lm-ceilometer-7:/home/ubuntu# systemctl status nova-compute
● nova-compute.service - OpenStack Compute
Loaded: loaded (/lib/systemd/system/nova-compute.service; disabled; vendor
Note: the only way that works reliable in both cases (restart, bootup)
is by adding requires=nova-compute.service to the systemd service file
/lib/systemd/system/ceilometer-agent-compute.service
I've tried modifying the sysvinit file , rebooted with only the
required-start in the sysvinit file,
Public bug reported:
When a job is invoked from cron and the pam_group.so is configured to
add supplementary groups it DOES NOT work as expected.
pam_group should provide membership based /etc/security/group.conf and
it is working fine if you test with login or sudo.
After some tests I've
I was hoping this fixes would come with Ubuntu Mate 20.04.2, but
unfortunately it seems it didn't happen. Is there any plans to release
this fixes to Ubuntu Mate 20.04? Or is there at least a ppa or any other
alternative to fix the missing icons?
--
You received this bug notification because you
Public bug reported:
[Environment]
Bionic
python3-httplib2 | 0.9.2+dfsg-1ubuntu0.2
[Description]
maas cli fails to work with apis over https with self-signed certificates due
to the lack
of disable_ssl_certificate_validation option with python 3.5.
[Distribution/Release, Package versions,
Backport fix https://github.com/httplib2/httplib2/pull/15 into bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906720
Title:
Fix the disable_ssl_certificate_validation option
To manage
1 - 100 of 4941 matches
Mail list logo