[Bug 1926672] Re: ubiquity-gtk installer crashes in focal 20.04.02 after partitioning due to existing EFI partition

2021-04-29 Thread Sebastien Bacher
The log attached is a 18.10 one and has this error

ubuntu /plugininstall.py: subprocess.CalledProcessError: Command '['apt-
clone', 'restore-new-distro', '/target/ubiquity-apt-clone/apt-clone-
state-ubuntu.tar.gz', 'cosmic', '--destination', '/target']' returned
non-zero exit status 1.

did you report the issue from the system which had the problem or from
another one?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926672

Title:
  ubiquity-gtk installer crashes in focal 20.04.02 after partitioning
  due to existing EFI partition

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1926672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926652] Re: gedit on launch shows only an image of the desktop

2021-04-29 Thread Sebastien Bacher
the canberra one is noise and shouldn't create any visible issue, could
you confirm things work correctly now?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926652

Title:
  gedit on launch shows only an image of the desktop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gedit/+bug/1926652/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1909970] Re: Fonts is not responding

2021-04-29 Thread Sebastien Bacher
Thanks for your interest in helping to resolve this issue. In order to
get to the bottom of this we need to figure out where the program is
hanging. If you can follow the steps on
https://wiki.ubuntu.com/Backtrace#Already_running_programs and attach
the generated text file to this bug it would be of great help.

** Changed in: gnome-font-viewer (Ubuntu)
   Importance: Undecided => Low

** Changed in: gnome-font-viewer (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909970

Title:
  Fonts is not responding

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-font-viewer/+bug/1909970/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 306017] Re: Firefox search box should be tab specific

2021-04-29 Thread Bug Watch Updater
** Changed in: firefox
   Importance: Medium => Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/306017

Title:
  Firefox search box should be tab specific

To manage notifications about this bug go to:
https://bugs.launchpad.net/firefox/+bug/306017/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926584] Re: [21.10 FEAT] Upgrade openssl-ibmca to latest version (crypto) (version 2.1.2)

2021-04-29 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926584

Title:
  [21.10 FEAT] Upgrade openssl-ibmca to latest version (crypto) (version
  2.1.2)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1926584/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926083] Re: Autocorrect is broken even on default English locale

2021-04-29 Thread mikechege
*** This bug is a duplicate of bug 1925379 ***
https://bugs.launchpad.net/bugs/1925379

Libreoffice won't capitalise the first letter of a sentence and the
LanguageTool grammar checker is very sluggish, if it works at all.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926083

Title:
  Autocorrect is broken even on default English locale

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1926083/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926688] [NEW] Xorg freeze

2021-04-29 Thread Uriel Balduino Ribeiro
Public bug reported:

the screem freezes and when i open a couple programs many bugs start to
show up

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: xorg 1:7.7+19ubuntu14
ProcVersionSignature: Ubuntu 5.8.0-50.56~20.04.1-generic 5.8.18
Uname: Linux 5.8.0-50-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.16
Architecture: amd64
BootLog: Error: [Errno 13] Permissão negada: '/var/log/boot.log'
CasperMD5CheckResult: skip
CompositorRunning: None
CurrentDesktop: ubuntu:GNOME
Date: Fri Apr 30 01:09:02 2021
DistUpgraded: Fresh install
DistroCodename: focal
DistroVariant: ubuntu
DkmsStatus:
 v4l2loopback, 0.12.3, 5.8.0-48-generic, x86_64: installed
 v4l2loopback, 0.12.3, 5.8.0-50-generic, x86_64: installed
GraphicsCard:
 Intel Corporation Haswell-ULT Integrated Graphics Controller [8086:0a16] (rev 
0b) (prog-if 00 [VGA controller])
   Subsystem: ASUSTeK Computer Inc. Haswell-ULT Integrated Graphics Controller 
[1043:1b7d]
InstallationDate: Installed on 2020-12-11 (139 days ago)
InstallationMedia: Ubuntu 20.04.1 LTS "Focal Fossa" - Release amd64 (20200731)
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 004: ID 0bda:b725 Realtek Semiconductor Corp. Bluetooth Radio 
 Bus 001 Device 003: ID 0bda:57b5 Realtek Semiconductor Corp. USB Camera
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
MachineType: ASUSTeK COMPUTER INC. Z450LA
ProcEnviron:
 LANGUAGE=pt_BR:pt:en
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=pt_BR.UTF-8
 SHELL=/bin/bash
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-5.8.0-50-generic 
root=UUID=5f3995ba-8da9-4c41-9bf9-e59240f2ca6c ro quiet splash vt.handoff=7
SourcePackage: xorg
Symptom: display
Title: Xorg freeze
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 08/12/2015
dmi.bios.release: 5.6
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: Z450LA.204
dmi.board.asset.tag: ATN12345678901234567
dmi.board.name: Z450LA
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: 1.0
dmi.chassis.asset.tag: ATN12345678901234567
dmi.chassis.type: 10
dmi.chassis.vendor: ASUSTeK COMPUTER INC.
dmi.chassis.version: 1.0
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvrZ450LA.204:bd08/12/2015:br5.6:svnASUSTeKCOMPUTERINC.:pnZ450LA:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnZ450LA:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0:
dmi.product.family: Z
dmi.product.name: Z450LA
dmi.product.sku: ASUS-NotebookSKU
dmi.product.version: 1.0
dmi.sys.vendor: ASUSTeK COMPUTER INC.
version.compiz: compiz N/A
version.libdrm2: libdrm2 2.4.102-1ubuntu1~20.04.1
version.libgl1-mesa-dri: libgl1-mesa-dri 20.2.6-0ubuntu0.20.04.1
version.libgl1-mesa-glx: libgl1-mesa-glx N/A
version.xserver-xorg-core: xserver-xorg-core 2:1.20.9-2ubuntu1.2~20.04.2
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev N/A
version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:19.1.0-1
version.xserver-xorg-video-intel: xserver-xorg-video-intel 
2:2.99.917+git20200226-1
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.16-1

** Affects: ubuntu
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug false-gpu-hang focal freeze third-party-packages 
ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926688

Title:
  Xorg freeze

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1926688/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1878321] Re: TP-Link UE300 [2357:0601]: Kernel workqueue rtl_work_func_t [r8152] gets stuck, preventing network connectivity: Bad RIP value

2021-04-29 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878321

Title:
  TP-Link UE300 [2357:0601]: Kernel workqueue rtl_work_func_t [r8152]
  gets stuck, preventing network connectivity: Bad RIP value

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1878321/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1214218] Re: Package shown inside wrong group in tree view

2021-04-29 Thread Karl
I foirgot to write: I use focal, LXDE, update-manager version is
1:20.04.10.6

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214218

Title:
  Package shown inside wrong group in tree view

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1214218/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1214218] Re: Package shown inside wrong group in tree view

2021-04-29 Thread Karl
Screenshot shows: 
Security: GStreamer and Samba patched grouped in Archive Manager,
Other: OpenLDAP grouped in Oracle VM VirtualBox (PPA)

** Attachment added: "one more wrongly grouped screenshot"
   
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1214218/+attachment/5493467/+files/Screenshot%20from%202021-04-30%2005-50-59.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214218

Title:
  Package shown inside wrong group in tree view

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1214218/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926686] [NEW] lightdm segfaults

2021-04-29 Thread Robert Dinse
Public bug reported:

[510606.379044] lightdm[4046529]: segfault at 55007d2a3f8b ip
7f7260003f0b sp 7fffbb5a0600 error 4 in
libc-2.31.so[7f725ff8e000+178000]

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: lightdm 1.30.0-0ubuntu4~20.04.1
Uname: Linux 5.10.32 x86_64
ApportVersion: 2.20.11-0ubuntu27.17
Architecture: amd64
CasperMD5CheckResult: skip
CurrentDesktop: MATE
Date: Thu Apr 29 20:55:18 2021
SourcePackage: lightdm
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: lightdm (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal package-from-proposed third-party-packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926686

Title:
  lightdm segfaults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1926686/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926517] Re: [SRU] mpt3sas: only one vSES is handy even IOC has multi vSES

2021-04-29 Thread Michael Reed
5.8 test kernel
https://people.canonical.com/~mreed/lp_1926517_mpt3sas_groovy/


5.11 test kernel
https://people.canonical.com/~mreed/lp_1926517_mpt3sas_hirsute/

The focal 5.4 kernel is liked in comment #2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926517

Title:
  [SRU] mpt3sas: only one vSES is handy even IOC has multi vSES

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1926517/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922336] Re: ACPI errors and USB reset loop when hot-plugging a Titan Ridge laptop into a dock (9500, TB16)

2021-04-29 Thread koba
@Georgi,
would you please dump 
#boltctl 
#fwupdmgr get-device

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922336

Title:
  ACPI errors and USB reset loop when hot-plugging a Titan Ridge laptop
  into a dock (9500, TB16)

To manage notifications about this bug go to:
https://bugs.launchpad.net/dell-sputnik/+bug/1922336/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1909970] Re: Fonts is not responding

2021-04-29 Thread Hein Htet Aung
I also Found that bug! While "Font is not Responding!" i can't do
anything,just to force stop it.hope to fix that soon.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909970

Title:
  Fonts is not responding

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-font-viewer/+bug/1909970/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926680] [NEW] apache2 won't restart after installing nagios4

2021-04-29 Thread gregrwm
Public bug reported:

the issue is described here:  https://wiki.debian.org/Nagios4

in summary, after installing nagios4, apache2 won't restart, until:

a2enmod auth_digest
a2enmod authz_groupfile

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: nagios4 (not installed)
ProcVersionSignature: Ubuntu 5.4.0-42.46-generic 5.4.44
Uname: Linux 5.4.0-42-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.4
Architecture: amd64
CasperMD5CheckResult: pass
Date: Thu Apr 29 21:33:16 2021
InstallationDate: Installed on 2020-11-30 (150 days ago)
InstallationMedia: Ubuntu-Server 20.04.1 LTS "Focal Fossa" - Release amd64 
(20200731)
ProcEnviron:
 TERM=screen
 PATH=(custom, no user)
 LANG=C.UTF-8
 SHELL=/bin/bash
SourcePackage: nagios4
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: nagios4 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal uec-images

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926680

Title:
  apache2 won't restart after installing nagios4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nagios4/+bug/1926680/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1736222] Re: speech-dispatcher distorts all sound

2021-04-29 Thread Coeur Noir
So it's not fixed in Ubuntu 20.04 LTS,
where speech-dispatcher is 0.9.1-4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1736222

Title:
  speech-dispatcher distorts all sound

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/speech-dispatcher/+bug/1736222/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926678] Re: Selecting text within Geany then middle clicking into another application (or vice-versa) has stopped working.

2021-04-29 Thread Leon Matthews
I forgot to add that everything works as expected under a Xorg session.

** Description changed:

+ Problem started after upgrade to Ubuntu 21.04 and only occurs when
+ running a Wayland session.
+ 
  I use Geany all day, every day. It's a wonderfully light-weight editor
  with enough IDE functionality to keep me productive without getting in
  my way. I generally work with a Geany window on one side of my monitor,
  a Gnome Terminal window on the other.
  
  Something I do all the time is to select some text in Geany (a variable
  name, say) then middle click into the terminal. For example I might type
  'grep' (or the superb 'ag') into the terminal, then middle-click to
  append the variable name to search for. Since upgrading to Ubuntu 21.04,
  this has stopped working [1]. Trying to copy in the opposite direction,
  from the terminal into Geany, has also stopped working [2].
  
  Oddly, I still the expected behaviour as long as I stay *within* a Geany
  window: I can double-click on a word to select it, then middle-click to
  paste what was just selected.
  
  The normal ctrl+c, ctrl+v clipboard works just fine.
  
  [1] Something does get pasted, but not what I selected in Geany.
  Instead, it is whatever I last selected from within another application,
  eg. Firefox.
  
  [2] What does get pasted in this case is more complicated. If I haven't
  selected anything in a while I will actually get the expected behaviour:
  the terminal selection will pasted into Geany. Usually though, I'll just
  get whatever I last highlighted in the Geany window instead.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926678

Title:
  Selecting text within Geany then middle clicking into another
  application (or vice-versa) has stopped working.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/geany/+bug/1926678/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926678] [NEW] Selecting text within Geany then middle clicking into another application (or vice-versa) has stopped working.

2021-04-29 Thread Leon Matthews
Public bug reported:

I use Geany all day, every day. It's a wonderfully light-weight editor
with enough IDE functionality to keep me productive without getting in
my way. I generally work with a Geany window on one side of my monitor,
a Gnome Terminal window on the other.

Something I do all the time is to select some text in Geany (a variable
name, say) then middle click into the terminal. For example I might type
'grep' (or the superb 'ag') into the terminal, then middle-click to
append the variable name to search for. Since upgrading to Ubuntu 21.04,
this has stopped working [1]. Trying to copy in the opposite direction,
from the terminal into Geany, has also stopped working [2].

Oddly, I still the expected behaviour as long as I stay *within* a Geany
window: I can double-click on a word to select it, then middle-click to
paste what was just selected.

The normal ctrl+c, ctrl+v clipboard works just fine.

[1] Something does get pasted, but not what I selected in Geany.
Instead, it is whatever I last selected from within another application,
eg. Firefox.

[2] What does get pasted in this case is more complicated. If I haven't
selected anything in a while I will actually get the expected behaviour:
the terminal selection will pasted into Geany. Usually though, I'll just
get whatever I last highlighted in the Geany window instead.

** Affects: geany (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926678

Title:
  Selecting text within Geany then middle clicking into another
  application (or vice-versa) has stopped working.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/geany/+bug/1926678/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926676] [NEW] global-buffer-overflow of fig2dev of gensvg.c in function arrow_path

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability ***

Public security bug reported:

Hi
I found an overflow error.

issues: https://sourceforge.net/p/mcj/tickets/115/
commit: 
https://sourceforge.net/p/mcj/fig2dev/ci/8c0917994e49110004a6632d0a66ea19501ad39d/

System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
fig2dev Version 3.2.8a

Verification steps:
1.Get the source code of fig2dev
2.Compile the fig2dev

$ cd fig2dev-3.2.8a
$ ./configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address" 
CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address"
$ make 

3.run fig2dev
$ ./fig2dev -L svg fig2dev_crash_arrow_path

asan info




http://www.w3.org/2000/svg;
xmlns:xlink="http://www.w3.org/1999/xlink;
width="205pt" height="117pt"
viewBox="-1795 -376 3416 1946">


























































=
==3290613==ERROR: AddressSanitizer: global-buffer-overflow on address 
0x00f71218 at pc 0x00589130 bp 0x7ffe395b8990 sp 0x7ffe395b8988
READ of size 4 at 0x00f71218 thread T0
#0 0x58912f in arrow_path 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1082:40
#1 0x5856af in svg_arrows 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1174:2
#2 0x586e30 in gensvg_arc 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c
#3 0x4d0847 in gendev_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:1008:6
#4 0x4d0847 in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:485:11
#5 0x7f25970a30b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#6 0x41c71d in _start 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x41c71d)

0x00f71218 is located 8 bytes to the left of global variable 'fpoints' 
defined in 'gensvg.c:1130:18' (0xf71220) of size 400
0x00f71218 is located 52 bytes to the right of global variable 
'bnclippoints' defined in 'gensvg.c:1129:41' (0xf711e0) of size 4
SUMMARY: AddressSanitizer: global-buffer-overflow 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1082:40 in arrow_path
Shadow bytes around the buggy address:
  0x801e61f0: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 00 f9 f9 f9
  0x801e6200: f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
  0x801e6210: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
  0x801e6220: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
  0x801e6230: f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9
=>0x801e6240: f9 f9 f9[f9]00 00 00 00 00 00 00 00 00 00 00 00
  0x801e6250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x801e6260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x801e6270: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
  0x801e6280: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
  0x801e6290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
  Shadow gap:  cc
==3290613==ABORTING

** Affects: xfig (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: security

** Attachment added: "fig2dev_crash_arrow_path"
   
https://bugs.launchpad.net/bugs/1926676/+attachment/5493453/+files/fig2dev_crash_arrow_path

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926676

Title:
  global-buffer-overflow of  fig2dev of gensvg.c in function arrow_path

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfig/+bug/1926676/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926677] [NEW] global-buffer-overflow of fix2dev of fig2dev/read.c in function read_objects

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability ***

Public security bug reported:

Hi
I found an crash error.

issues: https://sourceforge.net/p/mcj/tickets/116/
commit:https://sourceforge.net/p/mcj/fig2dev/ci/6827c09d2d6491cb2ae3ac7196439ff3aa791fd9/

System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
fig2dev Version 3.2.8a

Verification steps:
1.Get the source code of fig2dev
2.Compile the fig2dev
$ cd fig2dev-3.2.8a
$ ./configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address" 
CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address"
$ make 

3.run fig2dev
$ ./fig2dev -L box fig2dev_box_crash

asan info
Invalid color definition at line 11:0#U75 0 6750 #1 -1 4 -1 -1 0.000 0  0 1 
0  -1 0 0,5, setting to black (#0).
Invalid color definition at line 12: 0 i, setting to black (#0).
=
==2147685==ERROR: AddressSanitizer: global-buffer-overflow on address 
0x5583735f1b08 at pc 0x7f195e0bc715 bp 0x7ffd510f0020 sp 0x7ffd510ef7b0
WRITE of size 14 at 0x5583735f1b08 thread T0
#0 0x7f195e0bc714 in vsprintf (/lib/x86_64-linux-gnu/libasan.so.5+0x9e714)
#1 0x7f195e0bcbce in sprintf (/lib/x86_64-linux-gnu/libasan.so.5+0x9ebce)
#2 0x558373381445 in read_objects 
/home/hh/target/fuzzer/xfig/fig2dev-3.2.8a/fig2dev/read.c:505
#3 0x558373381445 in readfp_fig 
/home/hh/target/fuzzer/xfig/fig2dev-3.2.8a/fig2dev/read.c:152
#4 0x5583733824c3 in read_fig 
/home/hh/target/fuzzer/xfig/fig2dev-3.2.8a/fig2dev/read.c:124
#5 0x55837334b320 in main 
/home/hh/target/fuzzer/xfig/fig2dev-3.2.8a/fig2dev/fig2dev.c:424
#6 0x7f195dce80b2 in __libc_start_main 
(/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#7 0x55837334d26d in _start 
(/home/hh/target/fuzzer/xfig/fig2dev-3.2.8a/fig2dev/fig2dev+0x7026d)

0x5583735f1b08 is located 56 bytes to the left of global variable 
'support_i18n' defined in 'fig2dev.c:83:6' (0x5583735f1b40) of size 1
  'support_i18n' is ascii string ''
0x5583735f1b08 is located 0 bytes to the right of global variable 
'gif_transparent' defined in 'fig2dev.c:85:6' (0x5583735f1b00) of size 8
SUMMARY: AddressSanitizer: global-buffer-overflow 
(/lib/x86_64-linux-gnu/libasan.so.5+0x9e714) in vsprintf
Shadow bytes around the buggy address:
  0x0ab0ee6b6310: 00 00 00 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6320: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6330: 00 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6340: 04 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6350: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
=>0x0ab0ee6b6360: 00[f9]f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6370: 01 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6380: 01 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b6390: 01 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b63a0: 01 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
  0x0ab0ee6b63b0: 01 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 f9 f9 f9 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
  Shadow gap:  cc
==2147685==ABORTING

** Affects: xfig (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: security

** Attachment added: "fig2dev_box_crash"
   
https://bugs.launchpad.net/bugs/1926677/+attachment/5493454/+files/fig2dev_box_crash

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926677

Title:
  global-buffer-overflow of fix2dev of fig2dev/read.c in function
  read_objects

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfig/+bug/1926677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926673] [NEW] Null pointer of fig2dev of gensvg.c in function svg_arrows

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability ***

Public security bug reported:

Hi
I found an crash error.

issues: https://sourceforge.net/p/mcj/tickets/114/
commit:https://sourceforge.net/p/mcj/fig2dev/ci/43cfa693284b076e5d2cc100758a34b76db65e58/

System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
fig2dev Version 3.2.8a

Verification steps:
1.Get the source code of fig2dev
2.Compile the fig2dev

```bash
$ cd fig2dev-3.2.8a
$ ./configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address" 
CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address"
$ make
```

3.run fig2dev
```bash
$ ./fig2dev -L svg fig2dev_crash
```

asan info:





http://www.w3.org/2000/svg;
xmlns:xlink="http://www.w3.org/1999/xlink;
width="73pt" height="113pt"
viewBox="-76 -376 1202 1877">





























AddressSanitizer:DEADLYSIGNAL
=
==3255219==ERROR: AddressSanitizer: SEGV on unknown address 0x (pc 
0x00583a3d bp 0x7ffec0773610 sp 0x7ffec0773590 T0)
==3255219==The signal is caused by a READ memory access.
==3255219==Hint: address points to the zero page.
#0 0x583a3d in svg_arrows 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24
#1 0x583a3d in gensvg_line 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:743:17
#2 0x4d0847 in gendev_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:1008:6
#3 0x4d0847 in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:485:11
#4 0x7f5e0e4f50b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#5 0x41c71d in _start 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x41c71d)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24 in svg_arrows
==3255219==ABORTING

** Affects: xfig (Ubuntu)
 Importance: Undecided
 Assignee: xiao huang (shanzhuli)
 Status: New


** Tags: security

** Information type changed from Private Security to Public Security

** Summary changed:

-  fig2dev
+ Null pointer of fig2dev of gensvg.c in function svg_arrows

** Description changed:

  Hi
  I found an crash error.
  
  issues: https://sourceforge.net/p/mcj/tickets/114/
- 
+ 
commit:https://sourceforge.net/p/mcj/fig2dev/ci/43cfa693284b076e5d2cc100758a34b76db65e58/
  
  System info:
  Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
  fig2dev Version 3.2.8a
  
  Verification steps:
  1.Get the source code of fig2dev
  2.Compile the fig2dev
  
  ```bash
  $ cd fig2dev-3.2.8a
  $ ./configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address" 
CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address"
- $ make 
+ $ make
  ```
  
  3.run fig2dev
  ```bash
  $ ./fig2dev -L svg fig2dev_crash
  ```
  
  asan info:
  
  
  
  
  
  http://www.w3.org/2000/svg;
- xmlns:xlink="http://www.w3.org/1999/xlink;
- width="73pt" height="113pt"
- viewBox="-76 -376 1202 1877">
+ xmlns:xlink="http://www.w3.org/1999/xlink;
+ width="73pt" height="113pt"
+ viewBox="-76 -376 1202 1877">
  
  
  
  
  
  
+ stroke="#00" stroke-width="8px"/>
  
  
  
+ stroke="#ff" stroke-width="8px"/>
  
  
  
+ stroke="#ff" stroke-width="8px"/>
  
  
  
  
  
+ x="0" y="0" width="134" height="134">
  
  
  
  
  
  
  
+ stroke="#00" stroke-width="8px"/>
  
  
  
+ stroke="#00" stroke-width="8px"/>
  
  
  AddressSanitizer:DEADLYSIGNAL
  =
  ==3255219==ERROR: AddressSanitizer: SEGV on unknown address 0x 
(pc 0x00583a3d bp 0x7ffec0773610 sp 0x7ffec0773590 T0)
  ==3255219==The signal is caused by a READ memory access.
  ==3255219==Hint: address points to the zero page.
- #0 0x583a3d in svg_arrows 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24
- #1 0x583a3d in gensvg_line 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:743:17
- #2 0x4d0847 in gendev_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:1008:6
- #3 0x4d0847 in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:485:11
- #4 0x7f5e0e4f50b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
- #5 0x41c71d in _start 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x41c71d)
+ #0 0x583a3d in svg_arrows 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1141:24
+ #1 0x583a3d in gensvg_line 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:743:17
+ #2 0x4d0847 in gendev_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:1008:6
+ #3 0x4d0847 in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:485:11
+ #4 0x7f5e0e4f50b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
+ #5 0x41c71d in _start 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x41c71d)
  
  

[Bug 1926674] [NEW] heap-buffer-overflow of fig2dev of gensvg.c in function gensvg_text

2021-04-29 Thread xiao huang
*** This bug is a security vulnerability ***

Public security bug reported:

Hi
I found an overflow error.

issues: https://sourceforge.net/p/mcj/tickets/113/
commit:https://sourceforge.net/p/mcj/fig2dev/ci/f8ce1ff8837056b12c046f56e3b5248b2c8eeaa1/

System info:
Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0
fig2dev Version 3.2.8a

Verification steps:
1.Get the source code of fig2dev
2.Compile the fig2dev

$ cd fig2dev-3.2.8a
$ ./configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address" 
CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address"
$ make 

3.run fig2dev
$ ./fig2dev -L svg overflow_fig2dev_crash

asan info:




http://www.w3.org/2000/svg;
xmlns:xlink="http://www.w3.org/1999/xlink;
width="900pt" height="3600pt"
viewBox="163 0 25 100">


=
==3221214==ERROR: AddressSanitizer: heap-buffer-overflow on address 
0x60200072 at pc 0x005888ef bp 0x7ffcc0226110 sp 0x7ffcc0226108
READ of size 1 at 0x60200072 thread T0
#0 0x5888ee in gensvg_text 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1006:42
#1 0x4d0847 in gendev_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:1008:6
#2 0x4d0847 in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:485:11
#3 0x7f03fc8940b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16
#4 0x41c71d in _start 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x41c71d)

0x60200072 is located 0 bytes to the right of 2-byte region 
[0x60200070,0x60200072)
allocated by thread T0 here:
#0 0x494fd2 in calloc 
(/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev+0x494fd2)
#1 0x4d5951 in read_textobject 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/read1_3.c:505:24
#2 0x4d2b8b in read_1_3_objects 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/read1_3.c:126:16
#3 0x4d666f in readfp_fig 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/read.c:154:12
#4 0x4d6312 in read_fig 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/read.c:124:10
#5 0x4d04cb in main 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/fig2dev.c:424:12
#6 0x7f03fc8940b2 in __libc_start_main 
/build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16

SUMMARY: AddressSanitizer: heap-buffer-overflow 
/home/hh/Downloads/fig2dev-3.2.8a/fig2dev/dev/gensvg.c:1006:42 in gensvg_text
Shadow bytes around the buggy address:
  0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c047fff8000: fa fa fd fa fa fa 00 04 fa fa 00 04 fa fa[02]fa
  0x0c047fff8010: fa fa 00 07 fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
  0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:   00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:   fa
  Freed heap region:   fd
  Stack left redzone:  f1
  Stack mid redzone:   f2
  Stack right redzone: f3
  Stack after return:  f5
  Stack use after scope:   f8
  Global redzone:  f9
  Global init order:   f6
  Poisoned by user:f7
  Container overflow:  fc
  Array cookie:ac
  Intra object redzone:bb
  ASan internal:   fe
  Left alloca redzone: ca
  Right alloca redzone:cb
  Shadow gap:  cc
==3221214==ABORTING

** Affects: xfig (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: security

** Attachment added: "overflow_fig2dev_crash"
   
https://bugs.launchpad.net/bugs/1926674/+attachment/5493452/+files/overflow_fig2dev_crash

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926674

Title:
  heap-buffer-overflow of  fig2dev of  gensvg.c in function gensvg_text

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfig/+bug/1926674/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1767817] Re: Full text search does not work

2021-04-29 Thread Jörn Guy Süß
I am on bionic and as the fix is out, this should work. It does not, so
please reopen.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1767817

Title:
  Full text search does not work

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1767817/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925010] Re: shim-signed 15.4 does not boot on EFI 1.10 systems

2021-04-29 Thread Richard J Uschold
This bug seems quite similar to the one I reported:
Ubuntu 20.04 LTS Fails to boot on Lenovo Flex 3-1480 laptop: Bug #1925710

As my bug explains, my 2015 Flex 3-1480 has a similar boot issue
problem, though my 2019 Acer E15 Aspire E5-576 boots just fine.

Anyone think these are the same bug?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925010

Title:
  shim-signed 15.4 does not boot on EFI 1.10 systems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1925010/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1767817] Re: Full text search does not work

2021-04-29 Thread Jörn Guy Süß
I also have this issue in 20.04. Please flag the regression.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1767817

Title:
  Full text search does not work

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1767817/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914239] Re: ubuntu-20.04 pip3 ignores /etc/pip.conf

2021-04-29 Thread Bug Watch Updater
** Changed in: pip
   Status: Unknown => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914239

Title:
  ubuntu-20.04 pip3 ignores /etc/pip.conf

To manage notifications about this bug go to:
https://bugs.launchpad.net/pip/+bug/1914239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Re: x509 Certificate verification fails when basicConstraints=CA:FALSE, pathlen:0 on self-signed leaf certs

2021-04-29 Thread Matthew Ruffell
** Tags added: sts-sponsor

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Autopkgtest regression report (ubuntu-advantage-tools/27.0~20.04.1)

2021-04-29 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~20.04.1) 
for focal have finished running.
The following regressions have been reported in tests triggered by the package:

ubuntu-advantage-tools/27.0~20.04.1 (i386)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/focal/update_excuses.html#ubuntu-advantage-tools

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Autopkgtest regression report (ubuntu-advantage-tools/27.0~20.04.1)

2021-04-29 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~20.04.1) 
for focal have finished running.
The following regressions have been reported in tests triggered by the package:

ubuntu-advantage-tools/27.0~20.04.1 (i386)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/focal/update_excuses.html#ubuntu-advantage-tools

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926672] [NEW] ubiquity-gtk installer crashes in focal 20.04.02 after partitioning due to existing EFI partition

2021-04-29 Thread Pablo Hörtner
Public bug reported:

In focal 20.04.02 the ubiquity-gtk installer (20.04.15.11/focal-updates)
always crashes after the partition step.

Although this seems to be an old bug, I could not find a relevant bug
report so far.

I am having this issue when installing Ubuntu 20.04 to removable media
from an existing Ubuntu 20.04 system. I could reproduce the issue on a
PC in UEFI mode and on another one in BIOS mode. Before reporting this
bug, I tested the installer on both Live USB media and internal disks.

How to reproduce?

1. The install medium needs to be writable (i.e. no CD/DVD) and contain a 
mounted EFI partition (e.g. /dev/sda1), while the target presumably needs to be 
a removable medium or a secondary disk.
2. sudo --preserve-env=DBUS_SESSION_BUS_ADDRESS,XDG_RUNTIME_DIR sh -c 'ubiquity 
gtk_ui'
3. In the ubiquity installer create a GPT partition on the target medium (e.g. 
/dev/sdb) containing an EFI partition (e.g. /dev/sdb1) and a root partition 
(e.g. /dev/sdb2), and set the Grub target ("boot disk") accordingly.
4. The installer will ask for confirmation, stating that the partition table of 
both disks will change and that the two newly created partitions will be 
formatted. In case of an existing swap partition on the primary disk, this 
partition will also be formatted (which I consider another bug).
5. After the crash, you can notice that
   a. the new system has been partially installed, as /target (e.g. /dev/sdb2) 
is mounted and contains 329 MB
   b. the EFI partition of the install medium or primary disk (e.g. /dev/sda1) 
has been unmounted from /boot/efi and remounted to /target/boot/efi
   c. the target EFI partition (e.g. /dev/sdb1) has been created and formatted, 
but is unmounted and empty.

$ cat /target/etc/fstab
# /etc/fstab: static file system information.
#
# Use 'blkid' to print the universally unique identifier for a
# device; this may be used with UUID= as a more robust way to name devices
# that works even if disks are added and removed. See fstab(5).
#
#
# / was on /dev/sdb2 during installation
UUID=76ecfd0f-dae5-4801-9db0-7d8bc8d20b8f /   ext4
errors=remount-ro 0   1
# /boot/efi was on /dev/sda1 during installation
UUID=A815-6B37  /boot/efi   vfatumask=0077  0   1
# swap was on /dev/sda6 during installation
UUID=c2e0cb67-23de-4ab3-be19-4123e6229ade noneswapsw
  0   0

$ sudo du -shx /target/* | sort -h
4,0K/target/home
4,0K/target/lib64
4,0K/target/media
4,0K/target/mnt
4,0K/target/opt
4,0K/target/proc
4,0K/target/srv
4,0K/target/sys
4,0K/target/tmp
4,0K/target/writable
12K /target/dev
12K /target/root
16K /target/lost+found
16K /target/meta
84K /target/snap
96K /target/run
3,8M/target/etc
4,1M/target/boot
9,7M/target/sbin
9,8M/target/var
14M /target/bin
48M /target/lib
240M/target/usr

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity 20.04.15.11
ProcVersionSignature: Ubuntu 5.8.0-51.57~20.04.1-generic 5.8.18
Uname: Linux 5.8.0-51-generic x86_64
ApportVersion: 2.20.11-0ubuntu27.17
Architecture: amd64
CasperMD5CheckResult: skip
Date: Fri Apr 30 00:34:13 2021
InstallCmdLine: BOOT_IMAGE=(loop)/casper/vmlinuz root=UUID=E6BD-0CD8 
file=/cdrom/preseed/ubuntu.seed maybe-ubiquity debian-installer/language=de 
keyboard-configuration/layoutcode=de 
iso-scan/filename=/ubuntu-18.10-desktop-amd64.iso boot=casper persistent 
noprompt quiet splash --
InstallationDate: Installed on 2018-12-11 (870 days ago)
InstallationMedia: Ubuntu 18.10 "Cosmic Cuttlefish" - Release amd64 (20181017.3)
SourcePackage: ubiquity
UpgradeStatus: Upgraded to focal on 2020-10-26 (185 days ago)

** Affects: ubiquity (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal ubiquity-18.10.12

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926672

Title:
  ubiquity-gtk installer crashes in focal 20.04.02 after partitioning
  due to existing EFI partition

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1926672/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926584] Re: [21.10 FEAT] Upgrade openssl-ibmca to latest version (crypto) (version 2.1.2)

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package openssl-ibmca - 2.1.2-0ubuntu1

---
openssl-ibmca (2.1.2-0ubuntu1) impish; urgency=medium

  * New upstream release.  LP: #1926584.

 -- Steve Langasek   Thu, 29 Apr 2021
08:41:11 -0700

** Changed in: openssl-ibmca (Ubuntu)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926584

Title:
  [21.10 FEAT] Upgrade openssl-ibmca to latest version (crypto) (version
  2.1.2)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1926584/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914239] Re: ubuntu-20.04 pip3 ignores /etc/pip.conf

2021-04-29 Thread Stefano Rivera
** Patch added: "python-pip_20.0.2-5ubuntu1.4.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/python-pip/+bug/1914239/+attachment/5493444/+files/python-pip_20.0.2-5ubuntu1.4.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914239

Title:
  ubuntu-20.04 pip3 ignores /etc/pip.conf

To manage notifications about this bug go to:
https://bugs.launchpad.net/pip/+bug/1914239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1906939] Re: kde frontend, ModuleNotFoundError: No module named 'sip'

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package usb-creator - 0.3.10

---
usb-creator (0.3.10) hirsute; urgency=medium

  * bin/usb-creator-kde: Import sip from the right location thereby avoiding a
ModuleNotFoundError. Thanks to Sai Vinoba for the fix. (LP: #1906939)

 -- Brian Murray   Mon, 19 Apr 2021 09:13:26 -0700

** Changed in: usb-creator (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906939

Title:
  kde frontend, ModuleNotFoundError: No module named 'sip'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usb-creator/+bug/1906939/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Autopkgtest regression report (ubuntu-advantage-tools/27.0~21.04.1)

2021-04-29 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~21.04.1) 
for hirsute have finished running.
The following regressions have been reported in tests triggered by the package:

ubuntu-advantage-tools/27.0~21.04.1 (i386)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/hirsute/update_excuses.html#ubuntu-advantage-tools

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Autopkgtest regression report (ubuntu-advantage-tools/27.0~21.04.1)

2021-04-29 Thread Ubuntu SRU Bot
All autopkgtests for the newly accepted ubuntu-advantage-tools (27.0~21.04.1) 
for hirsute have finished running.
The following regressions have been reported in tests triggered by the package:

ubuntu-advantage-tools/27.0~21.04.1 (i386)


Please visit the excuses page listed below and investigate the failures, 
proceeding afterwards as per the StableReleaseUpdates policy regarding 
autopkgtest regressions [1].

https://people.canonical.com/~ubuntu-archive/proposed-
migration/hirsute/update_excuses.html#ubuntu-advantage-tools

[1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions

Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Re: x509 Certificate verification fails when basicConstraints=CA:FALSE, pathlen:0 on self-signed leaf certs

2021-04-29 Thread Matthew Ruffell
Attached is a debdiff for openssl on Groovy which fixes this bug.

** Patch added: "Debdiff for openssl on Groovy"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+attachment/5493443/+files/lp1926254_groovy.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926254] Re: x509 Certificate verification fails when basicConstraints=CA:FALSE, pathlen:0 on self-signed leaf certs

2021-04-29 Thread Matthew Ruffell
Attached is a debdiff for openssl on Focal which fixes this bug.

** Patch added: "Debdiff for openssl on focal"
   
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+attachment/5493442/+files/lp1926254_focal.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926254

Title:
  x509 Certificate verification fails when
  basicConstraints=CA:FALSE,pathlen:0 on self-signed leaf certs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1926254/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926535] Re: [needs-packaging] Add "KWeather" (an official KDE app) to the Ubuntu repositories

2021-04-29 Thread Brian Murray
*** This is an automated message ***

This bug is tagged needs-packaging which identifies it as a request for
a new package in Ubuntu.  As a part of the managing needs-packaging bug
reports specification,
https://wiki.ubuntu.com/QATeam/Specs/NeedsPackagingBugs, all needs-
packaging bug reports have Wishlist importance.  Subsequently, I'm
setting this bug's status to Wishlist.

** Summary changed:

- Add "KWeather" (an official KDE app) to the Ubuntu repositories
+ [needs-packaging] Add "KWeather" (an official KDE app) to the Ubuntu 
repositories

** Changed in: ubuntu
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926535

Title:
  [needs-packaging] Add "KWeather" (an official KDE app) to the Ubuntu
  repositories

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1926535/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926536] Re: [needs-packaging] Add "KRecorder" (an official KDE app) to the Ubuntu repositories

2021-04-29 Thread Brian Murray
*** This is an automated message ***

This bug is tagged needs-packaging which identifies it as a request for
a new package in Ubuntu.  As a part of the managing needs-packaging bug
reports specification,
https://wiki.ubuntu.com/QATeam/Specs/NeedsPackagingBugs, all needs-
packaging bug reports have Wishlist importance.  Subsequently, I'm
setting this bug's status to Wishlist.

** Summary changed:

- Add "KRecorder" (an official KDE app) to the Ubuntu repositories
+ [needs-packaging] Add "KRecorder" (an official KDE app) to the Ubuntu 
repositories

** Changed in: ubuntu
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926536

Title:
  [needs-packaging] Add "KRecorder" (an official KDE app) to the Ubuntu
  repositories

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1926536/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926298] Re: Segfault added in the recent changes

2021-04-29 Thread Dan Bungert
** Description changed:

+ [Impact]
+ 
+ On Hirsute/Impish, update-notifier can crash when attempting to run
+ hooks.
+ 
+ [Test Case]
+ 
+ Create a file 'bug'
+ 
+ 'Name: bug
+ Priority: Low
+ Command: "/bin/true"
+ DisplayIf: /bin/true
+ Description: update notifier bug'
+ 
+ and copy it to /var/lib/update-notifier/user.d
+ 
+ [Where problems could occur]
+ 
+ This is not the most absolute minimal version of this fix.
+ If the minimal version of the fix is desired, I can provide that, which 
should be a +2/-2 diff.
+ The fix changeset includes other glib usage improvements which sound good 
from a maintainability perspective and may even close other yet unknown bugs 
but add their own risk of regressions if said maintainability was not done 
correctly.
+ 
+ [Original Bug Report Description]
+ 
  The issue is new using https://code.launchpad.net/~dbungert/update-
  notifier/+git/update-notifier/+merge/397367 , the previous revision
  didn't have the issue
  
  * Create a file 'bug'
  
  'Name: bug
  Priority: Low
  Command: "/bin/true"
  DisplayIf: /bin/true
  Description: update notifier bug'
  
  and copy it to /var/lib/update-notifier/user.d
  
  ->  update-notifier segfaults
  
  (gdb) bt
  #0  0x7718c769 in __GI___libc_free (mem=0x555aa7f9) at 
malloc.c:3288
  #1  0x77365215 in g_strfreev (str_array=) at 
../../../glib/gstrfuncs.c:2553
  #2  g_strfreev (str_array=0x555d9e00) at ../../../glib/gstrfuncs.c:2546
  #3  0xdd2d in hook_command_exists (cmd=0x55702600 
"\"/usr/bin/eog\"") at hooks.c:137
  #4  0xfd6e in is_hook_relevant (hook_file=0x55829e7b 
"apt-file.update-notifier")
- at hooks.c:717
+ at hooks.c:717
  #5  0xffb1 in check_update_hooks (ta=0x556c9a20) at 
hooks.c:781
  #6  0x55560715 in hook_tray_icon_init (ta=0x556c9a20) at 
hooks.c:969
- #7  0xcd77 in tray_icons_init (un=0x5562c3e0, 
+ #7  0xcd77 in tray_icons_init (un=0x5562c3e0,
  
+ It seems likely to be the error on top of the weekly report for hirsute
+ but that's missing a stacktrace
  
- It seems likely to be the error on top of the weekly report for hirsute but 
that's missing a stacktrace
- 
- 
- One comment in addition on the change there, was the env split + iterate over 
pathdirs basically a re-implementation of 
https://developer.gnome.org/glib/stable/glib-Miscellaneous-Utility-Functions.html#g-find-program-in-path
 ? If there is particular reason to do that I would recommend just using the 
glib function instead (which might also fix the issue as a side effect, I 
didn't check)
+ One comment in addition on the change there, was the env split + iterate
+ over pathdirs basically a re-implementation of
+ https://developer.gnome.org/glib/stable/glib-Miscellaneous-Utility-
+ Functions.html#g-find-program-in-path ? If there is particular reason to
+ do that I would recommend just using the glib function instead (which
+ might also fix the issue as a side effect, I didn't check)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926298

Title:
  Segfault added in the recent changes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1926298/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926538] Re: [needs-packaging] Add "Calindori" (an official KDE app) to the Ubuntu repositories

2021-04-29 Thread Brian Murray
*** This is an automated message ***

This bug is tagged needs-packaging which identifies it as a request for
a new package in Ubuntu.  As a part of the managing needs-packaging bug
reports specification,
https://wiki.ubuntu.com/QATeam/Specs/NeedsPackagingBugs, all needs-
packaging bug reports have Wishlist importance.  Subsequently, I'm
setting this bug's status to Wishlist.

** Summary changed:

-  Add "Calindori" (an official KDE app) to the Ubuntu repositories 
+ [needs-packaging]  Add "Calindori" (an official KDE app) to the Ubuntu 
repositories

** Changed in: ubuntu
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926538

Title:
  [needs-packaging]  Add "Calindori" (an official KDE app) to the Ubuntu
  repositories

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1926538/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926537] Re: [needs-packaging] Add "Kalk" (an official KDE app) to the Ubuntu repositories

2021-04-29 Thread Brian Murray
*** This is an automated message ***

This bug is tagged needs-packaging which identifies it as a request for
a new package in Ubuntu.  As a part of the managing needs-packaging bug
reports specification,
https://wiki.ubuntu.com/QATeam/Specs/NeedsPackagingBugs, all needs-
packaging bug reports have Wishlist importance.  Subsequently, I'm
setting this bug's status to Wishlist.

** Summary changed:

-  Add "Kalk" (an official KDE app) to the Ubuntu repositories 
+ [needs-packaging]  Add "Kalk" (an official KDE app) to the Ubuntu repositories

** Changed in: ubuntu
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926537

Title:
  [needs-packaging]  Add "Kalk" (an official KDE app) to the Ubuntu
  repositories

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1926537/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1821415] Re: pkexec fails in a non-graphical environment

2021-04-29 Thread Brian Murray
With the version of apport from focal-proposed this is also now fixed.

bdmurray@clean-focal-amd64:~$ apt policy apport
apport:
  Installed: 2.20.11-0ubuntu27.17
  Candidate: 2.20.11-0ubuntu27.17
  Version table:
 *** 2.20.11-0ubuntu27.17 500
500 http://192.168.10.7/ubuntu focal-proposed/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-proposed/main i386 Packages
100 /var/lib/dpkg/status
 2.20.11-0ubuntu27.16 500
500 http://192.168.10.7/ubuntu focal-updates/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-updates/main i386 Packages
500 http://192.168.10.7/ubuntu focal-security/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-security/main i386 Packages
 2.20.11-0ubuntu27 500
500 http://192.168.10.7/ubuntu focal/main amd64 Packages
500 http://192.168.10.7/ubuntu focal/main i386 Packages
bdmurray@clean-focal-amd64:~$ ubuntu-bug plymouth

*** Collecting problem information

The collected information can be sent to the developers to improve the
application. This might take a few minutes.
. AUTHENTICATING FOR com.ubuntu.apport.root-info ===
Authentication is required to collect system information for this problem report
Authenticating as: Ubuntu,,, (bdmurray)
Password: 
 AUTHENTICATION COMPLETE ===
 AUTHENTICATING FOR org.freedesktop.policykit.exec ===
Authentication is needed to run `/usr/share/apport/dump_acpi_tables.py' as the 
super user
Authenticating as: Ubuntu,,, (bdmurray)
Password: 
 AUTHENTICATION COMPLETE ===


** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821415

Title:
  pkexec fails in a non-graphical environment

To manage notifications about this bug go to:
https://bugs.launchpad.net/policykit-1/+bug/1821415/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922937] Re: reading casper-md5check.json fails

2021-04-29 Thread Brian Murray
The verification also passed on focal.

bdmurray@clean-focal-amd64:~$ apt-cache policy apport
apport:
  Installed: 2.20.11-0ubuntu27.17
  Candidate: 2.20.11-0ubuntu27.17
  Version table:
 *** 2.20.11-0ubuntu27.17 500
500 http://192.168.10.7/ubuntu focal-proposed/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-proposed/main i386 Packages
100 /var/lib/dpkg/status
 2.20.11-0ubuntu27.16 500
500 http://192.168.10.7/ubuntu focal-updates/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-updates/main i386 Packages
500 http://192.168.10.7/ubuntu focal-security/main amd64 Packages
500 http://192.168.10.7/ubuntu focal-security/main i386 Packages
 2.20.11-0ubuntu27 500
500 http://192.168.10.7/ubuntu focal/main amd64 Packages
500 http://192.168.10.7/ubuntu focal/main i386 Packages
bdmurray@clean-focal-amd64:~$ ubuntu-bug coreutils

*** Collecting problem information

The collected information can be sent to the developers to improve the
application. This might take a few minutes.
.. AUTHENTICATING FOR com.ubuntu.apport.root-info ===
Authentication is required to collect system information for this problem report
Authenticating as: Ubuntu,,, (bdmurray)
Password: 
 AUTHENTICATION COMPLETE ===


*** Send problem report to the developers?

After the problem report has been sent, please fill out the form in the
automatically opened web browser.

What would you like to do? Your options are:
  S: Send report (1.9 KB)
  V: View report
  K: Keep report file for sending later or copying to somewhere else
  I: Cancel and ignore future crashes of this program version
  C: Cancel
Please choose (S/V/K/I/C): c


** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922937

Title:
  reading casper-md5check.json fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1922937/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914239] Re: ubuntu-20.04 pip3 ignores /etc/pip.conf

2021-04-29 Thread Stefano Rivera
** Description changed:

+ [Impact]
+ 
+  * Ubuntu's pip doesn't read /etc/pip.conf, the upstream documented 
+configuration file location, instead it reads the alternate path:
+/etc/xdg/pip.conf
+  * While the alternate path is documented, too, this will probably confuse
+users.
+ 
+ [Test Plan]
+ 
+ # apt install python3-pip
+ # python3 -c "from pip._internal.configuration import 
get_configuration_files; print('/etc/pip.conf' in 
get_configuration_files()['global'])"
+ 
+ False = bug
+ True = expected behaviour
+ 
+ [Where problems could occur]
+ 
+  * It's possible that somebody is relying on this behaviour to target one
+config file at Ubuntu's pip and another at upstream pip, but that does
+seem far-fetched.
+  * The patch is from upstream, so we're not stepping into uncharted
+territory.
+ 
+ [Other Info]
+  
+  * Upstream PR: https://github.com/pypa/pip/pull/7786
+ 
+ [Original Bug Report]
+ 
  The pip3-20.0.2 from python3-pip package, and also installed with
  "python3 -m venv" (ensurepip module), ignores /etc/pip.conf.
  
  Based on https://pip.pypa.io/en/stable/user_guide/#config-file the
  /etc/pip.conf should work. Also it does work properly if original
  pip-20.0.2 is reinstalled to a venv from PyPI.
  
  Steps to reproduce:
  
  1. Add special package index URL to /etc/pip.conf, for example
  
  [global]
  index-url = https://download.zope.org/ppix
  
  2. Try to install a package from your special index
  
  Expected result:
  
  * Packages from your index are available.
  
  Current result:
  
  * Only PyPI packaged are available.
  
  
  
  We are trying to use this functionality to provide a local cache of PyPI
  using Artifactory - to speed-up creating virtual environments inside
  short-lived Docker and lessen PyPI bandwidth.
  
  We are working around this by copying the file to
  ~/.config/pip/pip.conf, but we'd like to make it work system-wide.
  
  
  
  vagrant@ubuntu-focal:~$ lsb_release -rd
  Description:  Ubuntu 20.04.2 LTS
  Release:  20.04
  
  vagrant@ubuntu-focal:~$ apt-cache policy python3-pip
  python3-pip:
-   Installed: 20.0.2-5ubuntu1.1
-   Candidate: 20.0.2-5ubuntu1.1
-   Version table:
-  *** 20.0.2-5ubuntu1.1 500
- 500 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 
Packages
- 500 http://security.ubuntu.com/ubuntu focal-security/universe amd64 
Packages
- 100 /var/lib/dpkg/status
-  20.0.2-5ubuntu1 500
- 500 http://archive.ubuntu.com/ubuntu focal/universe amd64 Packages
+   Installed: 20.0.2-5ubuntu1.1
+   Candidate: 20.0.2-5ubuntu1.1
+   Version table:
+  *** 20.0.2-5ubuntu1.1 500
+ 500 http://archive.ubuntu.com/ubuntu focal-updates/universe amd64 
Packages
+ 500 http://security.ubuntu.com/ubuntu focal-security/universe amd64 
Packages
+ 100 /var/lib/dpkg/status
+  20.0.2-5ubuntu1 500
+ 500 http://archive.ubuntu.com/ubuntu focal/universe amd64 Packages
  
  ProblemType: Bug
  DistroRelease: Ubuntu 20.04
  Package: python3-pip 20.0.2-5ubuntu1.1
  ProcVersionSignature: Ubuntu 5.4.0-65.73-generic 5.4.78
  Uname: Linux 5.4.0-65-generic x86_64
  ApportVersion: 2.20.11-0ubuntu27.14
  Architecture: amd64
  CasperMD5CheckResult: skip
  Date: Tue Feb  2 12:32:07 2021
  PackageArchitecture: all
  SourcePackage: python-pip
  UpgradeStatus: No upgrade log present (probably fresh install)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914239

Title:
  ubuntu-20.04 pip3 ignores /etc/pip.conf

To manage notifications about this bug go to:
https://bugs.launchpad.net/pip/+bug/1914239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Update Released

2021-04-29 Thread Steve Langasek
The verification of the Stable Release Update for ubuntu-advantage-tools
has completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Re: 'ua fix' tells me to reboot with inaccurate message

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package ubuntu-advantage-tools - 27.0~16.04.1

---
ubuntu-advantage-tools (27.0~16.04.1) xenial; urgency=medium

  * New upstream release 27.0: (LP: #1926361)
- apt-hook: mitigate failures with true
- messages: add optional (s) to apt messaging to include
  singular/plural pkgs
- apt-hook: avoid reporting and counting duplicate package
  names (GH: #1578)
- fix: don't say reboot required when unnecessary (LP: #1926183)
- test: uncomment additional xenial upgrade tests

 -- Lucas Moura   Tue, 27 Apr 2021 15:31:06
-0300

** Changed in: ubuntu-advantage-tools (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Update Released

2021-04-29 Thread Steve Langasek
The verification of the Stable Release Update for ubuntu-advantage-tools
has completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package ubuntu-advantage-tools - 27.0~16.04.1

---
ubuntu-advantage-tools (27.0~16.04.1) xenial; urgency=medium

  * New upstream release 27.0: (LP: #1926361)
- apt-hook: mitigate failures with true
- messages: add optional (s) to apt messaging to include
  singular/plural pkgs
- apt-hook: avoid reporting and counting duplicate package
  names (GH: #1578)
- fix: don't say reboot required when unnecessary (LP: #1926183)
- test: uncomment additional xenial upgrade tests

 -- Lucas Moura   Tue, 27 Apr 2021 15:31:06
-0300

** Changed in: ubuntu-advantage-tools (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914239] Re: ubuntu-20.04 pip3 ignores /etc/pip.conf

2021-04-29 Thread Stefano Rivera
The issue is that pip patched their vendored appdirs module, which we
de-vendored in Debian.

https://github.com/pypa/pip/pull/7786 is a better solution, which fixes
it in Ubuntu >= 20.10.

** Also affects: python-pip (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: python-pip (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914239

Title:
  ubuntu-20.04 pip3 ignores /etc/pip.conf

To manage notifications about this bug go to:
https://bugs.launchpad.net/pip/+bug/1914239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922937] Re: reading casper-md5check.json fails

2021-04-29 Thread Brian Murray
With the version of apport from groovy-proposed it is possible to read
the caspermd5-check.json file.

bdmurray@clean-groovy-amd64:~$ apt-cache policy python3-apport
python3-apport:
  Installed: 2.20.11-0ubuntu50.6
  Candidate: 2.20.11-0ubuntu50.6
  Version table:
 *** 2.20.11-0ubuntu50.6 500
500 http://192.168.10.7/ubuntu groovy-proposed/main amd64 Packages
500 http://192.168.10.7/ubuntu groovy-proposed/main i386 Packages
100 /var/lib/dpkg/status
 2.20.11-0ubuntu50.5 500
500 http://192.168.10.7/ubuntu groovy-updates/main amd64 Packages
500 http://192.168.10.7/ubuntu groovy-updates/main i386 Packages
500 http://192.168.10.7/ubuntu groovy-security/main amd64 Packages
500 http://192.168.10.7/ubuntu groovy-security/main i386 Packages
 2.20.11-0ubuntu50 500
500 http://192.168.10.7/ubuntu groovy/main amd64 Packages
500 http://192.168.10.7/ubuntu groovy/main i386 Packages
bdmurray@clean-groovy-amd64:~$ ubuntu-bug coreutils

*** Collecting problem information

The collected information can be sent to the developers to improve the
application. This might take a few minutes.
 AUTHENTICATING FOR com.ubuntu.apport.root-info ===
Authentication is required to collect system information for this problem report
Authenticating as: Ubuntu,,, (bdmurray)
Password: ...
 AUTHENTICATION COMPLETE ===



** Tags removed: verification-needed-groovy
** Tags added: verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922937

Title:
  reading casper-md5check.json fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1922937/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1821415] Re: pkexec fails in a non-graphical environment

2021-04-29 Thread Brian Murray
With the version of apport from groovy-proposed this is now fixed.

bdmurray@clean-groovy-amd64:~$ apt-cache policy python3-apport
python3-apport:
  Installed: 2.20.11-0ubuntu50.6
  Candidate: 2.20.11-0ubuntu50.6
  Version table:
 *** 2.20.11-0ubuntu50.6 500   
500 http://192.168.10.7/ubuntu groovy-proposed/main amd64 Packages
500 http://192.168.10.7/ubuntu groovy-proposed/main i386 Packages
100 /var/lib/dpkg/status
bdmurray@clean-groovy-amd64:~$ ubuntu-bug plymouth

*** Collecting problem information

The collected information can be sent to the developers to improve the
application. This might take a few minutes.
. AUTHENTICATING FOR com.ubuntu.apport.root-info ===
Authentication is required to collect system information for this problem report
Authenticating as: Ubuntu,,, (bdmurray)
Password: .
 AUTHENTICATION COMPLETE ===

** Tags removed: verification-needed-groovy
** Tags added: verification-done-groovy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821415

Title:
  pkexec fails in a non-graphical environment

To manage notifications about this bug go to:
https://bugs.launchpad.net/policykit-1/+bug/1821415/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Re: 'ua fix' tells me to reboot with inaccurate message

2021-04-29 Thread Chad Smith
Logs from Xenial test run asserting that no reboot needed message reported:
csmith@uptown:~/src/ubuntu-advantage-client$ cat proposed.yaml 
#cloud-config
write_files:
- content: 
ZGViIGh0dHA6Ly9hcmNoaXZlLnVidW50dS5jb20vdWJ1bnR1LyB4ZW5pYWwtcHJvcG9zZWQgcmVzdHJpY3RlZCBtYWluIG11bHRpdmVyc2UgdW5pdmVyc2UK
  encoding: b64
  owner: root:root
  path: /etc/apt/sources.list.d/proposed-ua.list
  permissions: '0644'

package_update: true
packages: [ubuntu-advantage-tools]
csmith@uptown:~/src/ubuntu-advantage-client$ lxc launch ubuntu-daily:xenial 
sru-test-1926183 -c user.user-data="$(cat proposed.yaml)"
Creating sru-test-1926183
Starting sru-test-1926183
csmith@uptown:~/src/ubuntu-advantage-client$ lxc exec sru-test-1926183 bash
root@sru-test-1926183:~# touch /var/run/reboot-required
root@sru-test-1926183:~# cloud-init status --wait --long

status: done
time: Thu, 29 Apr 2021 23:07:07 +
detail:
DataSourceNoCloud [seed=/var/lib/cloud/seed/nocloud-net][dsmode=net]
root@sru-test-1926183:~# ua version
27.0~16.04.1
root@sru-test-1926183:~# apt policy ubuntu-advantage-tools
ubuntu-advantage-tools:
  Installed: 27.0~16.04.1
  Candidate: 27.0~16.04.1
  Version table:
 *** 27.0~16.04.1 500
500 http://archive.ubuntu.com/ubuntu xenial-proposed/main amd64 Packages
100 /var/lib/dpkg/status
 10ubuntu0.16.04.1 500
500 http://archive.ubuntu.com/ubuntu xenial-updates/main amd64 Packages
root@sru-test-1926183:~# ua fix USN-4898-1
USN-4898-1: curl vulnerabilities
Found CVEs:
https://ubuntu.com/security/CVE-2021-22890
https://ubuntu.com/security/CVE-2021-22876
1 affected package is installed: curl
(1/1) curl:
A fix is available in Ubuntu standard updates.
The update is already installed.
✔ USN-4898-1 is resolved.


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-22876

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-22890

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914239] Re: ubuntu-20.04 pip3 ignores /etc/pip.conf

2021-04-29 Thread Stefano Rivera
** Bug watch added: github.com/pypa/pip/issues #7784
   https://github.com/pypa/pip/issues/7784

** Also affects: pip via
   https://github.com/pypa/pip/issues/7784
   Importance: Unknown
   Status: Unknown

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914239

Title:
  ubuntu-20.04 pip3 ignores /etc/pip.conf

To manage notifications about this bug go to:
https://bugs.launchpad.net/pip/+bug/1914239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926183] Re: 'ua fix' tells me to reboot with inaccurate message

2021-04-29 Thread Richard Harding
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926183

Title:
  'ua fix' tells me to reboot with inaccurate message

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926183/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1734496] Re: snapper rollback does not work on ubuntu for btrfs

2021-04-29 Thread Javier Lopez
I've experienced this as well, thanks to @jseiters I was able to perform
a rollback. But is definitely not a nice experience when urgently
needing the rollback for the first time!

Hope It's fixed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1734496

Title:
  snapper rollback does not work on ubuntu for btrfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/snapper/+bug/1734496/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926669] [NEW] 20.04 LTS upgrade fails

2021-04-29 Thread Dave Cutler
Public bug reported:

The error message doesn't say what went wrong, but fails to install the
20.04 LTS upgrade. The first time I tried to upgrade is had an error on
3rd party software so I disabled all 3rd party sources and tried again.
Still fails, but doesn't say why.

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: ubuntu-release-upgrader-core 1:18.04.44
ProcVersionSignature: Ubuntu 4.15.0-142.146-generic 4.15.18
Uname: Linux 4.15.0-142-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.23
Architecture: amd64
CrashDB: ubuntu
CurrentDesktop: ubuntu:GNOME
Date: Thu Apr 29 16:54:06 2021
InstallationDate: Installed on 2016-12-20 (1591 days ago)
InstallationMedia: Ubuntu 16.04.1 LTS "Xenial Xerus" - Release amd64 (20160719)
PackageArchitecture: all
ProcEnviron:
 TERM=xterm-256color
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=en_US.UTF-8
 SHELL=/bin/bash
SourcePackage: ubuntu-release-upgrader
UpgradeStatus: Upgraded to bionic on 2021-04-29 (0 days ago)
VarLogDistupgradeTermlog:

** Affects: ubuntu-release-upgrader (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug bionic dist-upgrade third-party-packages

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926669

Title:
  20.04 LTS upgrade fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1926669/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
Xenial staging VM tests livepatch/fips all succeed

** Attachment added: "xenial-lxd-vm-staging.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493434/+files/xenial-lxd-vm-staging.log

** Description changed:

  [Impact]
  
  Ubuntu 16.04 reaches its end of standard support this week. After this
  time, Canonical customers can continue receiving security updates
  through ESM. No other updates are expected. To enable ESM, users need
  the ubuntu-advantage-tools package to provide the ua command, and this
  package needs updating to correctly interact with the ESM archives.
  Without this, users will have no opportunity to continue receiving
  updates.
  
  Due to the urgency of this infrastructional update to maintain
  continuity of security updates for Ubuntu users transitioning over to
  ESM for 16.04, and in consideration of the limitation of regression risk
  as noted below, we (Steve and Robie) have decided to waive the usual 7
  day aging period, as well as the usual reluctance to release on a
  Friday.
  
  The notable changes are:
     * Xenial and Bionic:
   - New Python-based client to automatically setup livepatch, fips, 
esm-infra, esm-apps using a single UA contract token from 
https://ubuntu.com/advantage. This is a backward incompatible transition from 
the previous shell-based ubuntu-advantage commands to the new Python-based "ua" 
command.
  
     * For all Ubuntu releases:
       - APT command and MOTD messaging hooks about available esm-infra and 
esm-apps package upgrades and ESM-infra availability on Ubuntu releases 
entering Extended Security Maintenance (Xenial)
       - FIPS and FIPS-updates support
       - New “ua fix” subcommand to allow fixing individual CVE or USN security 
issues.
       - New “ua help” command to give information about the available products 
the “ua” command can enable.
       - Notices section in “ua status” about outstanding configuration changes 
needed to apply configuration changes as a result of Ubuntu Advantage services
  
  See the changelog entry below for a full list of changes and bugs.
  
  [Test Case]
  
  The following development and SRU process was followed:
  
  https://wiki.ubuntu.com/UbuntuAdvantageToolsUpdate
  
  The ubuntu-advantage-tools team will be in charge of attaching the
  artifacts and console output of the appropriate run to the bug. ubuntu-
  advantage-tools team members will not mark ‘verification-done’ until
  this has happened.
  
  * Automated Test Results
- 
+ 
+ 
+ Logs added for all Xenial tests. Xenial is a pass.
+ 
+  Hirsute verification tomorrow>
  Attach or link the following automated integration test runs for 
ubuntu-advantage-tools on each affected LTS release:
  - lxd.container platform
  - lxd.kvm platform
  - AWS Ubuntu PRO
  - AWS Ubuntu cloud-images (non-Pro)
  - Azure Ubuntu PRO
  - Azure Ubuntu cloud-images (non-Pro)
  - GCP Ubuntu PRO
  - GCP Ubuntu cloud-images (non-Pro)
  
  
  * Manual Test Runs
  1.  Manual upgrade enabled livepatch/fips bash client -> retains 
enabled service attachment to APT repos/livepatch without running `ua attach
  2. Manual update enabled livepatch/FIPS bash client -> ua attach 
token  -> retains enabled livepatch/FIPS services
  Verification Script 1 & 2: 
https://github.com/canonical/ubuntu-advantage-client/blob/main/tools/test_xenial_upgrade.sh
  3. Upgrade Test Trusty released UA client -> Xenial
  
  * 
  
  [Where problems could occur]
  
  Extensive integration testing has been done to try to mitigate
  regression potential.  This section evaluates if issues do arise, where
  they may appear.
  
  Since Ubuntu 16.04 will be at the end of standard support, security
  updates will be ending for non-ESM users.  These users will already need
  to upgrade to a newer LTS, thus limiting our regression concerns.
  
  In a worst case scenario, if the update goes wrong it potentially could
  break: 1) users not interested in ESM, shortly before no other source of
  updates are available for 16.04; 2) users who wish to enable ESM, but in
  a manner that prevents ESM from being enabled.
  
  The list below represents places where this update could cause
  regressions:
  
  * apt hook messages not working properly resulting in error messages
  from ubuntu-advantage-tools apt hooks. apt will still exit 0 in these
  cases
  
  * MOTD hooks during error conditions omitting messages about available
  esm package updates.
  
  [ Known issues ]
-  
- * The CLI for the “ua” command has changed, by design. 
+ 
+ * The CLI for the “ua” command has changed, by design.
  It is possible that existing UA users have scripted use of this command, for 
example to enable UA on new cloud instances. We don’t think this type of 
breakage is likely. Therefore we have concluded that this deliberate 
behavioural change is acceptable, and this decision has been approved by Steve 
and Robie wearing their TB 

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
Xenial staging VM tests livepatch/fips all succeed

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

** Attachment added: "xenial-lxd-vm-staging.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493433/+files/xenial-lxd-vm-staging.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922937] Re: reading casper-md5check.json fails

2021-04-29 Thread Brian Murray
** Description changed:

  [Impact]
  Bugs reported by apport are not including information about the results of 
the md5 check of the installation media used. Additionally, users are presented 
with a traceback regarding the ubuntu hook which is used with all bug reports.
  
  [Test Case]
  1) Boot an Ubuntu 20.04 LTS or Ubuntu 20.10 install
- 2) Create the file /var/log/installer/caspter-md5check.json with mode 0600.
+ 2) Create the file /var/log/installer/casper-md5check.json with mode 0600.
  3) Run 'ubuntu-bug coreutils'
  
  *** Collecting problem information
  
  The collected information can be sent to the developers to improve the
  application. This might take a few minutes.
  ..ERROR: hook /usr/share/apport/general-hooks/ubuntu.py crashed:
  Traceback (most recent call last):
    File "/usr/lib/python3/dist-packages/apport/report.py", line 228, in 
_run_hook
  symb['add_info'](report, ui)
    File "/usr/share/apport/general-hooks/ubuntu.py", line 84, in add_info
  apport.hookutils.attach_casper_md5check(report,
    File "/usr/lib/python3/dist-packages/apport/hookutils.py", line 995, in 
attach_casper_md5check
  with open(location) as json_file:
  PermissionError: [Errno 13] Permission denied: 
'/var/log/installer/casper-md5check.json'
  
  [Where problems could occur]
  We are switching to reading the file with attach_root_command_outputs which 
is a well tested function in apport so the only problem would be a result of 
the new code being added. This works well in Hirsute so there is little chance 
of their being an error.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922937

Title:
  reading casper-md5check.json fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1922937/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926119] Re: Server Browse List missing

2021-04-29 Thread Athos Ribeiro
Hi Axis,

Thanks for the detailed bug report :)

I did some digging into the issue. Here are my findings so far:

The feature is no longer supported for newer (safer)  SMB protocol
versions. See [1].

This issue was reported upstream (and eventually dropped) on [2], which
originated from [3] where the issue is described with more details.

The regression was introduced in this upstream commit [4]. The relevant
code was refactored later in [5].

While patching the code downstream may have security implications (I
will bring this to upstream), a workaround exists:

run with the reported command with the following option

$ smbclient -NL localhost --option 'client use spnego = no'

Alternativelly, in the general section in smb.conf set

  client use spnego = no

For newer versions (verified in samba 4.14), you should also set the
protocol. For instance

$ smbclient -NL localhost --option 'client use spnego = no' --option
'client max protocol = NT1'

Note that the "use spnego" option is deprecated since samba 4.13, and
will be removed [6] (I will also bring this up upstream).

Finally, it is worth to mention that the changes which introduced this
regression are related to known vulnerabilities. See [7] and [8] for
further reference.

[1] https://bugzilla.samba.org/show_bug.cgi?id=12863
[2] https://bugzilla.samba.org/show_bug.cgi?id=12061
[3] https://bugzilla.samba.org/show_bug.cgi?id=11849#c14
[4] e72ad193a53e20b769f798d02c0610f91859bd38 
[5] 5b8ed5009bb4868c1391841193a3911fb0681cb5
[6] 
https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html#CLIENTUSESPNEGO
[7] https://www.samba.org/samba/security/CVE-2016-2110.html
[8] https://www.samba.org/samba/security/CVE-2016-2111.html


** Changed in: samba (Ubuntu)
 Assignee: (unassigned) => Athos Ribeiro (athos-ribeiro)

** Changed in: samba (Ubuntu)
   Status: New => Confirmed

** Bug watch added: Samba Bugzilla #12863
   https://bugzilla.samba.org/show_bug.cgi?id=12863

** Bug watch added: Samba Bugzilla #12061
   https://bugzilla.samba.org/show_bug.cgi?id=12061

** Bug watch added: Samba Bugzilla #11849
   https://bugzilla.samba.org/show_bug.cgi?id=11849

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2110

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2111

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926119

Title:
  Server Browse List missing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1926119/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924809] Re: apt 2.0.5 in focal causes autopkgtest failures for update-manager

2021-04-29 Thread Brian Murray
Using the update_excuses report as a reference we can see the test pass
for Focal.

update-manager (1:20.04.10.6 to 1:20.04.10.7)

Migration status for update-manager (1:20.04.10.6 to 1:20.04.10.7): 
BLOCKED: Needs an approval (either due to a freeze, the source suite or a 
manual hint)
Issues preventing migration:
Not touching package due to block request by freeze (please contact 
ubuntu-release if update is needed)
Additional info:
0 days old

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924809

Title:
  apt 2.0.5 in focal causes autopkgtest failures for update-manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1924809/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924809] Re: apt 2.0.5 in focal causes autopkgtest failures for update-manager

2021-04-29 Thread Brian Murray
And they also passed for Hirsute.

update-manager (1:21.04.8 to 1:21.04.10)

Migration status for update-manager (1:21.04.8 to 1:21.04.10): BLOCKED: 
Needs an approval (either due to a freeze, the source suite or a manual hint)
Issues preventing migration:
Not touching package due to block request by freeze (please contact 
ubuntu-release if update is needed)
Additional info:
0 days old 


** Tags removed: verification-needed-focal verification-needed-hirsute
** Tags added: verification-done-focal verification-done-hirsute

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924809

Title:
  apt 2.0.5 in focal causes autopkgtest failures for update-manager

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1924809/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1915502] Re: "systemd --user" fails to start for non-local users

2021-04-29 Thread Haoke Xu
** Also affects: systemd
   Importance: Undecided
   Status: New

** No longer affects: systemd

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915502

Title:
  "systemd --user" fails to start for non-local users

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1915502/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
Adding vm tests for bionic.

Those tests were executed using the package on this PPA:
https://launchpad.net/~ua-client/+archive/ubuntu/staging/

** Attachment added: "vm-bionic-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493432/+files/vm-bionic-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
xenial-VM tests (livepatch/fips)

** Attachment added: "xenial-vm.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493431/+files/xenial-vm.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
xenial-VM tests (livepatch/fips)

** Attachment added: "xenial-vm.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493430/+files/xenial-vm.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1734278] Re: Grub2 cannot boot up when 8254 time function disable

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package grub2-signed - 1.167~16.04.1

---
grub2-signed (1.167~16.04.1) xenial; urgency=medium

  * Use debhelper-compat 9 for ease of SRUs to Bionic and earlier. LP:
#1920008

grub2-signed (1.167~16.04.0) xenial; urgency=medium

  * grub-efi-amd64-signed: add depends on grub2-common with support for
R_X86_64_PLT32 relocations. LP: #1920008

 -- Dimitri John Ledkov   Tue, 23 Mar 2021 11:01:58
+

** Changed in: grub2-signed (Ubuntu Xenial)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1734278

Title:
  Grub2 cannot boot up when 8254 time function disable

To manage notifications about this bug go to:
https://bugs.launchpad.net/hwe-next/+bug/1734278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1780897] Re: Installation failure on UEFI systems using older images with automatic download of updates enabled

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package grub2-signed - 1.167~16.04.1

---
grub2-signed (1.167~16.04.1) xenial; urgency=medium

  * Use debhelper-compat 9 for ease of SRUs to Bionic and earlier. LP:
#1920008

grub2-signed (1.167~16.04.0) xenial; urgency=medium

  * grub-efi-amd64-signed: add depends on grub2-common with support for
R_X86_64_PLT32 relocations. LP: #1920008

 -- Dimitri John Ledkov   Tue, 23 Mar 2021 11:01:58
+

** Changed in: grub2-signed (Ubuntu Xenial)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780897

Title:
  Installation failure on UEFI systems using older images with automatic
  download of updates enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/1780897/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926379] Re: stack smashing attack detected in bash host tab completion

2021-04-29 Thread Haw Loeung
We're also seeing this with rsyncd:

| Apr 28 09:35:04 behaim rsync[2152929]: *** stack smashing detected
***: terminated

>From apt history logs:

| Upgrade: libldap-2.4-2:amd64 (2.4.49+dfsg-2ubuntu1.7, 
2.4.49+dfsg-2ubuntu1.8), libc6-dev:amd64 (2.31-0ubuntu9.2, 2.31-0ubuntu9.3), 
grub-common:amd64 (2.04-1ubuntu26.9, 2.04-1ubuntu26.11), python3-pip:amd64 
(20.0.2-5ubuntu1.1, 20.0.2-5ubuntu1.3), libc6:amd64 (2.31-0ubuntu9.2,
2.31-0ubuntu9.3)...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926379

Title:
  stack smashing attack detected in bash host tab completion

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1926379/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1915536] Re: one grub

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package grub2-signed - 1.167~16.04.1

---
grub2-signed (1.167~16.04.1) xenial; urgency=medium

  * Use debhelper-compat 9 for ease of SRUs to Bionic and earlier. LP:
#1920008

grub2-signed (1.167~16.04.0) xenial; urgency=medium

  * grub-efi-amd64-signed: add depends on grub2-common with support for
R_X86_64_PLT32 relocations. LP: #1920008

 -- Dimitri John Ledkov   Tue, 23 Mar 2021 11:01:58
+

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915536

Title:
  one grub

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1915536/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1915536] Re: one grub

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package grub2 - 2.02~beta2-36ubuntu3.31

---
grub2 (2.02~beta2-36ubuntu3.31) xenial; urgency=medium

  [ Dimitri John Ledkov & Steve Langasek ]
  * Relax dependencies to allow grub-efi be installed with later versions
of grub-efi-amd64. Stop building grub-efi-amd64|arm64{-bin,dbg}
packages, now provided by src:grub2-unsigned. LP: #1915536

  [ Dimitri John Ledkov ]
  * Cherrypick 2.02+dfsg1-5 patch for x86-64: Treat R_X86_64_PLT32 as
R_X86_64_PC32 to allow processing 2.04 grub modules built with newer
binutils.

 -- Dimitri John Ledkov   Wed, 24 Feb 2021 19:59:33
+

** Changed in: grub2 (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

** Changed in: grub2-signed (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1915536

Title:
  one grub

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1915536/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1920008] Re: grub2-signed depends on grub2-common

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package grub2-signed - 1.167~16.04.1

---
grub2-signed (1.167~16.04.1) xenial; urgency=medium

  * Use debhelper-compat 9 for ease of SRUs to Bionic and earlier. LP:
#1920008

grub2-signed (1.167~16.04.0) xenial; urgency=medium

  * grub-efi-amd64-signed: add depends on grub2-common with support for
R_X86_64_PLT32 relocations. LP: #1920008

 -- Dimitri John Ledkov   Tue, 23 Mar 2021 11:01:58
+

** Changed in: grub2-signed (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1920008

Title:
  grub2-signed depends on grub2-common

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/1920008/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
lxc container xenial staging CI run

** Attachment added: "xenial-lxd-staging.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493428/+files/xenial-lxd-staging.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926437] Re: [SRU] Backport zstd support, fix bug in python-apt

2021-04-29 Thread Julian Andres Klode
FWIW, I upgraded python-apt to the version in xenial-proposed

Unpacking python3-apt (1.1.0~beta1ubuntu0.16.04.12) over
(1.1.0~beta1ubuntu0.16.04.11) ...

And verified that the script

import apt_inst, apt_pkg
apt_pkg.init()
apt_inst.DebFile("glibc-doc-reference_2.33-0ubuntu2~zstd1_all.deb").control.extractall()


worked.

So verification-done-xenial is valid for this one too :D

apport fails weirdly, not have many other autopkgtest results back yet.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926437

Title:
  [SRU] Backport zstd support, fix bug in python-apt

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1926437/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1925010] Re: shim-signed 15.4 does not boot on EFI 1.10 systems

2021-04-29 Thread Julian Andres Klode
FWIW, "during the life cycle" = "today" - the revocations for the old
shims have been published today: https://uefi.org/revocationlistfile

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1925010

Title:
  shim-signed 15.4 does not boot on EFI 1.10 systems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1925010/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926265] Re: slapd enter in infinite loop on sched_yield syscall

2021-04-29 Thread Sergio Durigan Junior
Thank you for taking the time to file a bug report.

This one looks like a rabbit hole :-(.  I've also found many (very) old
reports of similar problems, but they all appear to have been fixed a
while ago (before Bionic was released).  I even found a possible patch
(from 2005) to fix the issue, and was able to determine that Bionic's
openldap already carries an improved version of the patch
(unsurprisingly).  I've also found an old Launchpad bug (#15270) and the
related Debian bug (https://bugs.debian.org/cgi-
bin/bugreport.cgi?bug=255276) that reports the same problem as you, and
is marked having been fixed in Debian (also back in 2005).

I am a bit surprised that you're experiencing this problem on Bionic.  I
understand that it is hard to provide steps for reproducing this
problem, but I would like to ask you to provide as much information as
you can, please.  For example:

- Your full openldap configuration (please remove any confidential bits,
of course).

- Any log messages from slapd or related services.

- If you can, please install the debug symbols for openldap/slapd and
run "gdb -p $PROCESS_PID" (where "$PROCESS_PID" is slapd's PID), then
run a "bt" command and attach the output to this bug.

- More information about what is going on in the system when the problem
happens.  For example, I've read that this might happen when the system
load is high; do you notice that as well?

Meanwhile, I will mark this bug as Incomplete.  Feel free to revert its
status back to New once you provide more info.  Thanks!

** Bug watch added: Debian Bug tracker #255276
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=255276

** Changed in: openldap (Ubuntu)
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926265

Title:
  slapd enter in infinite loop on sched_yield syscall

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openldap/+bug/1926265/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1907262] Re: raid10: discard leads to corrupted file system

2021-04-29 Thread Matthew Ruffell
** Changed in: linux (Ubuntu Groovy)
 Assignee: Sinclair Willis (yousure1222) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907262

Title:
  raid10: discard leads to corrupted file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1907262/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Grant Orndorff
Successful focal lxd vm integration test run output


** Attachment added: "focal-vm.txt"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493420/+files/focal-vm.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926663] [NEW] installation error of ubuntu 20.04. LTS

2021-04-29 Thread Vanessa Schulz
Public bug reported:

Installation error of ubuntu 20.04. LTS. it said smth like dv/gta (or smth like 
that) that it was missing or that it simply failed and it is a big error, so it 
couldn't finish the installation.
I booted from a DVD+RW.

ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity 20.04.15.10
ProcVersionSignature: Ubuntu 5.8.0-43.49~20.04.1-generic 5.8.18
Uname: Linux 5.8.0-43-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
ApportVersion: 2.20.11-0ubuntu27.16
Architecture: amd64
CasperMD5CheckResult: pass
CasperVersion: 1.445.1
CurrentDesktop: ubuntu:GNOME
Date: Thu Apr 29 23:23:41 2021
InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/ubuntu.seed 
maybe-ubiquity quiet splash ---
LiveMediaBuild: Ubuntu 20.04.2.0 LTS "Focal Fossa" - Release amd64 (20210209.1)
ProcEnviron:
 LANGUAGE=de_DE.UTF-8
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=
 LANG=de_DE.UTF-8
 LC_NUMERIC=C.UTF-8
SourcePackage: grub-installer
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: grub-installer (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug focal ubiquity-20.04.15.10 ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926663

Title:
  installation error of ubuntu 20.04. LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1926663/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926664] [NEW] Package has no effect on system crypto policy

2021-04-29 Thread Mark Johnston
Public bug reported:

The crypto-policies package's description is "unify the crypto policies
used by different applications and libraries".  Its README.md says "The
current implementations works by setting the desired policy in /etc
/crypto-policies/config. After this file is changed the script 'update-
crypto-policies' should be executed, and the new policies will
activate."

This information is misleading, because the crypto-policies package
doesn't seem to have any effect on the system's crypto policies.
Running update-crypto-policies only updates files in /etc/crypto-
policies, but those files are not referenced by OpenSSL, OpenSSH, or any
other system config files.

The update-crypto-policies tool will also give the misleading output
"The configured policy is applied" when the policy is having no effect
on the system.

To reproduce:

1) update-crypto-policies --set EMPTY
2) curl https://ubuntu.com

The curl should fail, since EMPTY mode is supposed to disable all
ciphers, but it will succeed.

I think this package should be removed as misleading and dangerous, or
at least equipped with warnings stating that it will not do anything
unless the user manually changes all of their system configuration files
to reference those in /etc/crypto-policies/.

** Affects: crypto-policies (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926664

Title:
  Package has no effect on system crypto policy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/crypto-policies/+bug/1926664/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926324] Re: Autogenerated freshclam.conf should not mention now-deprecated option SafeBrowsing

2021-04-29 Thread Sergio Durigan Junior
Thanks for taking the time to report a bug and help making Ubuntu
better.

I can obviously confirm this problem, but it's a low priority one
(upstream seems to have decided that the SafeBrowsing option simply
doesn't do anything anymore, so it's not "dangerous" to leave it in the
configuration file).  For this reason, I think it's better to address
this on Debian's clamav package.

I went ahead and filed the following MR against Debian clamav:

https://salsa.debian.org/clamav-team/clamav/-/merge_requests/3

Eventually this will be accepted (I hope), and then Ubuntu's clamav will
incorporate the fix once it's merged.  Feel free to subscribe to the MR
above if you'd like to follow its progress.

Thanks.

** Changed in: clamav (Ubuntu)
   Status: New => Triaged

** Changed in: clamav (Ubuntu)
   Importance: Undecided => Low

** Changed in: clamav (Ubuntu)
 Assignee: (unassigned) => Sergio Durigan Junior (sergiodj)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926324

Title:
  Autogenerated freshclam.conf should not mention now-deprecated option
  SafeBrowsing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/1926324/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883886]

2021-04-29 Thread Libreoffice-commits
Heiko Tietze committed a patch related to this issue.
It has been pushed to "libreoffice-7-1":

https://git.libreoffice.org/core/commit/252bdaaf85466cc97cbd9e79390e24b68bc3ecb6

Resolves tdf#127782 - Print dialog height

It will be available in 7.1.4.

The patch should be included in the daily builds available at
https://dev-builds.libreoffice.org/daily/ in the next 24-48 hours. More
information about daily builds can be found at:
https://wiki.documentfoundation.org/Testing_Daily_Builds

Affected users are encouraged to test the fix and report feedback.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883886

Title:
   Print dialogue's height in Libreoffice Writer is too high to see and
  click buttons.

To manage notifications about this bug go to:
https://bugs.launchpad.net/df-libreoffice/+bug/1883886/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
Adding the manual for upgrading trusty to xenial, where xenial will have
the new package version that is sitting on the proposed pocket.

Also, this tests is using the first approach to fix the trusty to xenial 
upgrade issue regarding the status of esm-infra:
https://github.com/canonical/ubuntu-advantage-client/issues/1590

** Bug watch added: github.com/canonical/ubuntu-advantage-client/issues #1590
   https://github.com/canonical/ubuntu-advantage-client/issues/1590

** Attachment added: "trusty-xenial-upgrade-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493419/+files/trusty-xenial-upgrade-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Grant Orndorff
Attaching output of test_xenial_upgrade.sh

I've verified the output is what we expect. Note that it prints "set up
to use the daily ppa" in a couple places, but as you can see right below
that output, it is actually setting up to use uaclient from -proposed.


** Attachment added: "test_xenial_upgrade-proposed-out.txt"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493418/+files/test_xenial_upgrade-proposed-out.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
** Attachment added: "gcppro-focal-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493417/+files/gcppro-focal-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
** Attachment added: "gcppro-bionic-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493416/+files/gcppro-bionic-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
** Attachment added: "gcppro-xenial-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493415/+files/gcppro-xenial-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Chad Smith
SRU Xenial lxd test run logs 1 expectd known failure

** Attachment added: "xenial-lxd.log"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493414/+files/xenial-lxd.log

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926361] Re: sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic, Focal, Hirsute

2021-04-29 Thread Lucas Albuquerque Medeiros de Moura
Attaching integration test run output on bionic. Note that this was
using the ua-client/staging ppa which is the functional equivalent of
the proposed release.

There is two failures in this log which we have verified is due to a
special case because using the same staging ppa that we are testing as
part of the test itself. The other test is about using a token that
actually does support CIS, which enables the service when the test
expects it to fail. Grant has run that same test with a token with no
CIS support and the test work as expected.

** Attachment added: "lxd-bionic-out"
   
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+attachment/5493413/+files/lxd-bionic-out

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926361

Title:
  sru ubuntu-advantage-tools (10ubuntu0.16.04.1 -> 27.0) Xenial, Bionic,
  Focal, Hirsute

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1926361/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1926652] Re: gedit on launch shows only an image of the desktop

2021-04-29 Thread Sharad
Yes, it does seem similar to #1760818.

.xinputrc has a line:

run_im xim

I will try commenting that out and then see if it fixes the problem

... that seemed to fix it, although I'm now getting a "Failed to load
module "canberra-gtk-module" " message.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926652

Title:
  gedit on launch shows only an image of the desktop

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gedit/+bug/1926652/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1857392] Re: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10).

2021-04-29 Thread chmick
Looking up this type of error message I end up here. 
I have similar error message in my syslog . Seems to be related to function 
keys  like brightness or volume (hp pavilion notebook  running ubuntu 20.04 
with nvidia-drivers-460) . 
here is an example with the brightness key :
Apr 29 22:30:30 chmickmini kernel: [82648.971532] atkbd serio0: Unknown key 
pressed (translated set 2, code 0xab on isa0060/serio0).
Apr 29 22:30:30 chmickmini kernel: [82648.971536] atkbd serio0: Use 
'setkeycodes e02b ' to make it known.
Apr 29 22:30:30 chmickmini kernel: [82649.039403] atkbd serio0: Unknown key 
released (translated set 2, code 0xab on isa0060/serio0).
Apr 29 22:30:30 chmickmini kernel: [82649.039405] atkbd serio0: Use 
'setkeycodes e02b ' to make it known.
Apr 29 22:30:30 chmickmini gnome-shell[1839]: Window manager warning: 
Overwriting existing binding of keysym 73 with keysym 73 (keycode 27).
Apr 29 22:30:30 chmickmini gnome-shell[1839]: Window manager warning: 
Overwriting existing binding of keysym 31 with keysym 31 (keycode a).

hope this help

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1857392

Title:
  Window manager warning: Overwriting existing binding of keysym 37 with
  keysym 37 (keycode 10).

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-shell/+bug/1857392/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883315] Re: Showing esm update as installable when esm is disabled

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package update-notifier - 3.168.14

---
update-notifier (3.168.14) xenial; urgency=medium

  * data/apt_check.py:
- Add support to handle packages from ESM Apps in addition to ESM Infra
  and only display alerts if the distro is ESM. (LP: #1924766)
- Do not display a count of ESM packages if the system does not have ESM
  enabled. (LP: #1883315)
- Make distinction betweem standard security updates and ESM updates
  when performing package counts. (LP: #1926208)
- use 'applied' instead of 'installed', redact 0 of these updates are
  security updates, and correct singular messages
  * debian/control: Add a dependency on python3-distro-info.

 -- Lucas Moura   Tue, 20 Apr 2021 10:20:21
-0300

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883315

Title:
  Showing esm update as installable when esm is disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1883315/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883315] Re: Showing esm update as installable when esm is disabled

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package update-notifier - 3.192.30.7

---
update-notifier (3.192.30.7) focal; urgency=medium

  * data/apt_check.py:
- Add support to handle packages from ESM Apps in addition to ESM Infra
  and only display alerts if the distro is ESM. (LP: #1924766)
- Do not display a count of ESM packages if the system does not have ESM
  enabled. (LP: #1883315)
- Make distinction between standard security updates and ESM updates
  when performing package counts. (LP: #1926208)
- use 'applied' instead of 'installed', redact 0 of these updates are
  security updates, and correct singular messages
  * data/backend_helper.py:
- fix pyflakes test
  * debian/control: Add a dependency on python3-distro-info.

 -- Lucas Moura   Thu, 22 Apr 2021 18:56:22
-0300

** Changed in: update-notifier (Ubuntu Focal)
   Status: Fix Committed => Fix Released

** Changed in: update-notifier (Ubuntu Bionic)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883315

Title:
  Showing esm update as installable when esm is disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1883315/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883315] Re: Showing esm update as installable when esm is disabled

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package update-notifier - 3.192.1.10

---
update-notifier (3.192.1.10) bionic; urgency=medium

  * data/apt_check.py:
- Add support to handle packages from ESM Apps in addition to ESM Infra
  and only display alerts if the distro is ESM. (LP: #1924766)
- Do not display a count of ESM packages if the system does not have ESM
  enabled. (LP: #1883315)
- Make distinction between standard security updates and ESM updates
  when performing package counts. (LP: #1926208)
- use 'applied' instead of 'installed', redact 0 of these updates are
  security updates, and correct singular messages
  * debian/control: Add a dependency on python3-distro-info.

 -- Lucas Moura   Thu, 22 Apr 2021 18:39:19
-0300

** Changed in: update-notifier (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883315

Title:
  Showing esm update as installable when esm is disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1883315/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883315] Update Released

2021-04-29 Thread Brian Murray
The verification of the Stable Release Update for update-notifier has
completed successfully and the package is now being released to
-updates.  Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report.  In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883315

Title:
  Showing esm update as installable when esm is disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1883315/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1883315] Re: Showing esm update as installable when esm is disabled

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package update-notifier - 3.192.40.1

---
update-notifier (3.192.40.1) hirsute; urgency=medium

  [ Lucas Moura ]
  * data/apt_check.py:
- Add support to handle packages from ESM Apps in addition to ESM Infra
  and only display alerts if the distro is ESM. (LP: #1924766)
- Do not display a count of ESM packages if the system does not have ESM
  enabled. (LP: #1883315)
- Make distinction between standard security updates and ESM updates
  when performing package counts. (LP: #1926208)
- use 'applied' instead of 'installed', redact 0 of these updates are
  security updates, and correct singular messages
  * debian/control: Add a dependency on python3-distro-info.

 -- Chad Smith   Thu, 22 Apr 2021 17:47:19
-0600

** Changed in: update-notifier (Ubuntu Hirsute)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883315

Title:
  Showing esm update as installable when esm is disabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1883315/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1892559] Re: [MIR] ccid libpam-pkcs1 libpcsc-perl opensc pcsc-tools pcsc-lite

2021-04-29 Thread Seth Arnold
Thanks Marco, I'll take pam-pkcs11 off our todo list. (This can be
reversed, of course. If it turns out to be necessary for something,
someone shout. :)

Thanks

** Changed in: pam-pkcs11 (Ubuntu)
   Status: New => Invalid

** Changed in: pam-pkcs11 (Ubuntu)
 Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1892559

Title:
  [MIR] ccid libpam-pkcs1 libpcsc-perl opensc pcsc-tools pcsc-lite

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ccid/+bug/1892559/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1914878] Re: At boot on Pi4 with 20.04.02 i get: Failed to load '//uboot/ubuntu/boot.sel'

2021-04-29 Thread Robert
Why not backport the solution from Groovy to Focal? Isn't Focal LTS?
Support does not seem that long term :|

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1914878

Title:
  At boot on Pi4 with 20.04.02 i get: Failed to load
  '//uboot/ubuntu/boot.sel'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/u-boot/+bug/1914878/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1924766] Re: update-notifier does not handle ESM Apps in the apt-check script

2021-04-29 Thread Launchpad Bug Tracker
This bug was fixed in the package update-notifier - 3.192.1.10

---
update-notifier (3.192.1.10) bionic; urgency=medium

  * data/apt_check.py:
- Add support to handle packages from ESM Apps in addition to ESM Infra
  and only display alerts if the distro is ESM. (LP: #1924766)
- Do not display a count of ESM packages if the system does not have ESM
  enabled. (LP: #1883315)
- Make distinction between standard security updates and ESM updates
  when performing package counts. (LP: #1926208)
- use 'applied' instead of 'installed', redact 0 of these updates are
  security updates, and correct singular messages
  * debian/control: Add a dependency on python3-distro-info.

 -- Lucas Moura   Thu, 22 Apr 2021 18:39:19
-0300

** Changed in: update-notifier (Ubuntu Xenial)
   Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1924766

Title:
  update-notifier does not handle ESM Apps in the apt-check script

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-notifier/+bug/1924766/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   >