i got an additional error right here. Some syntax error:
==> root@eduapps:/home/eduardo# software-properties-gtk --open-tab=4
/usr/lib/python3/dist-packages/softwareproperties/gtk/DialogMirror.py:197:
SyntaxWarning: invalid escape sequence '\.'
elif
re.match("^((ftp)|(http)|(file
** Changed in: systemd (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2055270
Title:
Buy Tramadol Online At Lowest Prices
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python-apt in Ubuntu.
https://bugs.launchpad.net/bugs/2039217
Title:
python apt Cache(memonly=True) does
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Both CVEs are already in our tracker[1][2]. We don't consider this
issue to be a critical and have rated it to medium Priority [3]. Currently
there are no fix available on upstream for those CVEs, see [4].
Since
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: gst-plugins-bad1.0 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net/bugs/2035585
Title:
Versions in Ubuntu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This is now released with usg 20.04.17
** Changed in: usg
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1989731
Title:
Non-root
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1842320 ***
https://bugs.launchpad.net/bugs/1842320
I had the same issue
Trip Ericson (rovfan) tutorial solved it.
Thank you so much;
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better.
This is low priority CVE for us, it will only get patched if a higher
priority CVE for sqlite3 in 22.04 shows up. Right now there are none,
therefore no ETA.
** Description changed:
I have ubuntu 22.04 on my
** Project changed: ubuntu-security-certifications => usg
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1989731
Title:
Non-root user unable to change own password if
** Changed in: libxml2 (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
** Information type changed from Private Security to Public Security
** Changed in: cups (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hi Joshua and Pedro,
Have you reported the side effects of the fix to those projects you mentioned?
If yes could you add the bug reports here?
thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gdk-pixbuf in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
In case anyone rebooted (like me) and ended up with a message like:
"Kernel Panic - not syncing: VFS: Unable to mount root fs on unknown-
block(0,0)"
Just go to the grub menu, select Advanced Options > pick a previous
kernel and boot, once you get the terminal, type:
sudo dpkg --configure -a
@iogui, every system I've tried works well with that workaround (4
installations with Ubuntu 20.04). Please reinstall language-pack-pt-base
an try again.
Yes, it is a binary file, a gettext .po compiled into a .mo. The sed is a quick
workaround that works fine for me even with the binary. If you
** Changed in: language-pack-pt-base (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to language-pack-pt-base in
Ubuntu.
https://bugs.launchpad.net/bugs/1932579
Title:
snap pt_BR
** Also affects: language-pack-pt-base (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to language-pack-pt-base in
Ubuntu.
https://bugs.launchpad.net/bugs/1932579
Title:
** Changed in: ntp (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1891953
Title:
CVE-2019-8936
Status in ntp package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
do fundo do <3
Best Regards,
Eduardo Barbosa
eduardo.cm...@gmail.com
ProblemType: Bug
DistroRelease: Ubuntu 20.10
Package: xorg 1:7.7+19ubuntu15
ProcVersionSignature: Ubuntu 5.8.0-41.46-generic 5.8.18
Uname: Linux 5.8.0-41-generic x86_64
.tmp.unity_support_test.0:
ApportVersion: 2.20
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: libxml2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
https://bugs.launchpad.net/bugs/1895839
Title:
CVE-2020-24977
Status in libxml2 package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
No fan detected
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: xorg 1:7.7+19ubuntu14
ProcVersionSignature: Ubuntu 5.4.0-48.52-generic 5.4.60
Uname: Linux 5.4.0-48-generic x86_64
.tmp.unity_support_test.0:
ApportVersion: 2.20.11-0ubuntu27.9
Architecture: amd64
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity (not installed)
ProcVersionSignature: Ubuntu 5.4.0-42.46-generic 5.4.44
Uname: Linux 5.4.0-42-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion: 2.20.11
=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu
s:
https://bugzilla.kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
Proble
kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
Dis
kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
Dis
://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity
kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
Proble
/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the solution
for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity
** Summary changed:
- Will not logout or shutdown form guest-session
+ Will not logout or shutdown from guest-session
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1855350
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1885496
Title:
Bluetooth is disabled in gui, but audio
I can confirm that the error persist on Ubuntu 20.04 LTS with headphones
LE-Bose AE2 SoundLink.
Disabling voice prompts (as Daniel van Vugt mentioned in comment #8)
helps a lot, but still there is a whistle but no "call from" voice
anymore.
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Original fix suggestion came from
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860697/comments/6
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1866890
Title:
I added `options snd-hda-intel dmic_detect=0`
at the end of /etc/modprobe.d/alsa-base.conf
and after restarting the laptop I can now use the headphones and speakers.
Although I managed to fix this,
- could this be resolved for other users?
Many thanks!
Eduardo
--
You received this bug
Seems similar to
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860697
** Package changed: ubuntu => alsa-driver (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
This is the same as bug #1862364
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1862770
Title:
MySQL autopkgtest regressed in Focal release pocket
Status in mysql-8.0
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1799215 ***
https://bugs.launchpad.net/bugs/1799215
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
** Also affects: cups (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1850032
Title:
scanbd prevents HP printers to work
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1814596
Title:
DynamicUser can create setuid binaries when
** Changed in: jackd2 (Ubuntu)
Status: New => Confirmed
** Changed in: jackd2 (Debian)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to jackd2 in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks Luca for all the help and contribution, the fix is released. Feel
free to contact us in case of new issues.
** Changed in: zeromq3 (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1806961 ***
https://bugs.launchpad.net/bugs/1806961
** This bug has been marked a duplicate of bug 1806961
Lock can be circumvented by switching tty when using lightdm
** Information type changed from Private Security to Public Security
--
You received
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: krb5 (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1814501
Title:
pack
Thanks Luca,
The packages are being uploaded and should be available in the archive in a few
minutes.
Thanks
** Changed in: zeromq3 (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
** Changed in: zeromq3 (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
Status
Thanks for opening the ticket and attaching the patch.
I've generated a new version for bionic and cosmic, both can be found here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=zeromq3
Would anyone mind testing it before we release it?
Thanks
Thanks for opening the ticket and attaching the patch.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
Status in zeromq3
** Changed in: zeromq3 (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Ti
** Tags added: community-security
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1806961
Title:
Lock
Hi smurfendrek,
Please check jarnos comment #89, you need to use light-locker, using dm-tool
for lock is not recommended.
You could also try with other screen lockers program.
Also this is an old bug, if you are still experiencing the problem, please open
a new bug.
I am unsubscribing the
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This started happening after installing lubuntu-desktop. Even after
removing it, it is still failing to mount. After running "keyctl link @u
@s", it works.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
Note: I'm using 18.04
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1718658
Title:
ecryptfs-mount-private fails to initialize ecryptfs keys
Status in ecryptfs-utils
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
Message error
ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: libgmp10 2:6.1.2+dfsg-2
ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
Uname: Linux 4.15.0-36-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.4
Architecture: amd64
Date: Wed Oct 3 09:05:41 2018
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1789630
Title:
package systemd-sysv 237-3ubuntu10.3 failed to
*** This bug is a duplicate of bug 1652282 ***
https://bugs.launchpad.net/bugs/1652282
I have a similar problem not using Wayland. Ubuntu 18.04.1
eduardo@MiPcLinux:~$ sudo gparted
[sudo] contraseña para eduardo:
Unit -.mount does not exist, proceeding anyway
it was resolved, the problem resolved remove teamviewer package, that
package blocks after that update (and teamviewer update also).
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
Public bug reported:
Description:Ubuntu 14.04.5 LTS
Release:14.04
libc-bin:i386 2.19-0ubuntu6.14
after update libc-bin any usb dont work preperly, (usb storage dont
automount, wifi usb dont work (term and networkmanager), bt dongle too),
usb modem (dont connect)
before update all
** Changed in: kolla
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dh-python in Ubuntu.
https://bugs.launchpad.net/bugs/1759796
Title:
Ubuntu images fail to build due to broken
** Also affects: python3-stdlib-extensions (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: python3-stdlib-extensions (Ubuntu)
** Also affects: dh-python (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a
** Changed in: unattended-upgrades (Ubuntu)
Status: Invalid => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1725928
Title:
package libsane1
Public bug reported:
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 16.04.3 LTS
Release:16.04
Codename: xenial
Steps to reproduce the bug:
1. Click on the volume icon on the pannel, and then on Sound Settings
2. Click on label Input,
systemctl status avahi-daemon.service
● avahi-daemon.service - Avahi mDNS/DNS-SD Stack
Loaded: loaded (/lib/systemd/system/avahi-daemon.service; enabled; vendor
preset: enabled)
Active: failed (Result: exit-code) since dom 2017-11-05 21:14:35 ART; 2min
45s ago
Process: 2978
Public bug reported:
After logging in to Ubuntu this error appear on the screen. System
program error.
ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: libc-bin 2.19-0ubuntu6.13
ProcVersionSignature: Ubuntu 4.4.0-97.120~14.04.1-generic 4.4.87
Uname: Linux 4.4.0-97-generic x86_64
** Description changed:
When I try scale the screen on my xps 15 9560 core i7 screen 4k the
image start to flap and sometimes the screen stay all black.
- I tried use the nvidia driver but still doesn work and when I try scale
- the apply using the settings option the button disapear.
+ I
Public bug reported:
When I try scale the screen on my xps 15 9560 core i7 screen 4k the
image start to flap and sometimes the screen stay all black.
I tried use the nvidia driver but still doesn work and when I try scale
the apply using the settings option the button disapear.
ProblemType: Bug
Reboot in 4.10-0-33 and youtube is muted on Dummy Output. Tried VLC with
same results. The weird thing is that I could hear audio in 4.10.0-35 in
some occasions, with my device being correctly displayed in pavucontrol.
Suddenly, it had a Dummy Output again...
--
You received this bug
1 - 100 of 173 matches
Mail list logo