Tested on SKU 0A36 (Latitude 7420) and is PASS for both focal and
impish.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1943561
Title:
Add ACCEL_LOCATION=base property
It should also use oem kernel which mentioned in comment #15
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1926547
Title:
Add Dell Privacy Mic Mute Key mapping
Status
After adding impish-proposed to /etc/apt/source.list and updating the
systemd to 248.3-1 ubunutu8.1, GUI still doesn't pop up "Mic Mute" icon.
dmesg:
Unknown key with type 0x0012 and code 0x000e pressed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
All autopkgtests for the newly accepted glibc (2.31-0ubuntu9.4) for focal have
finished running.
The following regressions have been reported in tests triggered by the package:
snapd-glib/1.58-0ubuntu0.20.04.0 (armhf)
apt/2.0.6 (armhf)
libmath-mpfr-perl/4.13-1 (armhf)
All autopkgtests for the newly accepted glibc (2.31-0ubuntu9.4) for focal have
finished running.
The following regressions have been reported in tests triggered by the package:
snapd-glib/1.58-0ubuntu0.20.04.0 (armhf)
apt/2.0.6 (armhf)
libmath-mpfr-perl/4.13-1 (armhf)
Public bug reported:
Ubuntu version: 20.4
Not sure of package (bluez)? (Whatever handles Bluetooth)
What I expected: File is transferred.
What happened: transfer fails with mysterious error code (0x53) which
sometimes shows up on phone and sometimes doesn't. In any case the
transfer fails.
> The project doesn’t look dead to me…
Nevertheless, it's clear it is no longer being maintained as a package
in Ubuntu, with only distro maintenance uploads (rebuilds for ABI
changes, etc) since at least 2017 and no one pulling new upstream
versions into Ubuntu since 2015. If someone is
Removing packages from jammy:
maliit-inputcontext-gtk 0.99.1-0ubuntu2 in jammy
maliit-inputcontext-gtk2 0.99.1-0ubuntu2 in jammy amd64
maliit-inputcontext-gtk2 0.99.1-0ubuntu2 in jammy arm64
maliit-inputcontext-gtk2 0.99.1-0ubuntu2 in jammy
** Also affects: initramfs-tools (Ubuntu Jammy)
Importance: High
Status: Confirmed
** Tags removed: rls-jj-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
Confirmed this issue as attempt was made for an OEM and failed. See
build log at https://launchpadlibrarian.net/574391158/buildlog_ubuntu-
focal-amd64.ubiquity_20.04.15.17+kfocus2_BUILDING.txt.gz
** Also affects: ubiquity (Ubuntu Jammy)
Importance: Undecided
Status: Confirmed
** Also
** Tags added: fr-1938
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1954320
Title:
Add privacy screen modules to the initrd
Status in initramfs-tools package
Public bug reported:
New to Ubuntu/linux, got an error that asked to report. I did. I do not
have any detailed information about this error.
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: systemd 245.4-4ubuntu3.13
ProcVersionSignature: Ubuntu 5.11.0-41.45~20.04.1-generic 5.11.22
This bug was fixed in the package ubuntu-settings - 22.04.1
---
ubuntu-settings (22.04.1) jammy; urgency=medium
* Reinstate changes from 21.04.3:
- Adding 99-gpio.rules udev rules for Raspberry Pi GPIO functionality
(LP: #1923672)
- Replace netplan eth0 renaming rules
This bug was fixed in the package ubuntu-settings - 22.04.1
---
ubuntu-settings (22.04.1) jammy; urgency=medium
* Reinstate changes from 21.04.3:
- Adding 99-gpio.rules udev rules for Raspberry Pi GPIO functionality
(LP: #1923672)
- Replace netplan eth0 renaming rules
This bug was fixed in the package ubuntu-settings - 22.04.1
---
ubuntu-settings (22.04.1) jammy; urgency=medium
* Reinstate changes from 21.04.3:
- Adding 99-gpio.rules udev rules for Raspberry Pi GPIO functionality
(LP: #1923672)
- Replace netplan eth0 renaming rules
Public bug reported:
The /lib/systemd/system/unattended-upgrades.service unit leaves a
process, /usr/share/unattended-upgrades/unattended-upgrade-shutdown
--wait-for-signal, running from system start until shutdown. This
increases the minimum memory footprint of every host, VM, or container
** Also affects: tzdata (Ubuntu)
Importance: Undecided
Status: New
** Changed in: tzdata (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tzdata in Ubuntu.
Here is my proposed fix in Gwenview:
https://invent.kde.org/graphics/gwenview/-/merge_requests/125
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to exiv2 in Ubuntu.
https://bugs.launchpad.net/bugs/1941752
Title:
Regression:
Created attachment 144593
sample image that is causing the crash
Here is jpg file that is causing the the crash. It is clear that libexiv
is throwing exception when it tries to parse date. This exception is not
catched in gwenview.
$ exiv2 -P X print test.jpg
Xmp.tiff.Software
** Tags removed: rls-ff-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1953301
Title:
Segfault on AArch64 caused by OpenSSL affecting numerous packages
Status
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: initramfs-tools (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
Public bug reported:
libdvd-pkg: `apt-get check` failed, you may have broken packages. Aborting...
E: Sub-process /usr/bin/dpkg returned an error code (1)
ProblemType: Package
DistroRelease: Ubuntu 20.04
Package: initramfs-tools 0.136ubuntu6.6
ProcVersionSignature: Ubuntu
** Tags added: fr-1933
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1953301
Title:
Segfault on AArch64 caused by OpenSSL affecting numerous packages
Status in openssl
Thank you very much Ratchanan for the verification on Bionic & Focal. I
re-triggered those autopkgtest and they are now resolved.
** Tags removed: verification-needed-bionic verification-needed-focal
** Tags added: verification-done-bionic verification-done-focal
--
You received this bug
** Changed in: vorta (Debian)
Status: Unknown => Confirmed
** Changed in: python-hypothesis (Debian)
Status: Unknown => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3-defaults in
Ubuntu.
Public bug reported:
System crashes about 3 times a day; no appearant relation to application or
process or triggering situation. Happens constantly. Random time between
incidents normally several hours. This is a problem for month now.
Description:Ubuntu 21.04
Release:21.04
GUI
** Changed in: openssl (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1955026
Title:
Upgrade openssl to 3.0.1 on Jammy
Attached is a debdiff for this upgrade. Alternatively, a packaged
version has been uploaded to the following PPA, just pop the last
changelog entry to get the proper uploadable version:
https://launchpad.net/~schopin/+archive/ubuntu/test-
ppa/+sourcepub/13051752/+listing-archive-extra
** Patch
*** This bug is a security vulnerability ***
Public security bug reported:
Upstream has released a new version 3.0.1, including a security fix.
https://mta.openssl.org/pipermail/openssl-announce/2021-December/000212.html
Sounds suspiciously similar to
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1951279 but I'd
like confirmation that the situation described in the meson issue
comment (TLS 1.2 with ECDHE-RSA-CHACHA20-POLY1305) also applies there
before marking as duplicate.
--
You received this bug
** Tags added: rls-ff-incoming
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1953301
Title:
Segfault on AArch64 caused by OpenSSL affecting numerous packages
Status in
Most shells (including bash, zsh) have a built-in for kill so it's done
internally. Some shells don't so it executes /bin/kill instead which has
this issue.
One comment noted this was fixed at some point in 2013 in version 3.3.4
but it apparently broke again at some point and is broken at least
32 matches
Mail list logo