** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1352007
Title:
avconv crashed with SIGSEGV in paint_mouse_pointer()
To manage notifications about th
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1368481
Title:
avconv assert failure: avconv:
/build/buildd/libav-11~beta1/libavcodec/put_bits.h:13
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980943/+attachment/3059934/+files/CoreDump.gz
** Information type changed from Private to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
Ack from the Ubuntu Security team for both gnutls28 3.5.18-1ubuntu1.5
and 3.4.10-4ubuntu1.9 to go to bionic-security and xenial-security
respectively.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928
** Description changed:
[Impact]
s390 BPF JIT vulnerabilities allow the eBPF verifier to be bypassed, leading
to possible local privilege escalation.
[Mitigation]
Disable unprivileged eBPF.
sysctl -w kernel.unprivileged_bpf_disabled=1
[Potential regression]
BPF programs might
Commits to address this are upstream in Linus' tree; they are:
1511df6f5e9e ("s390/bpf: Fix branch shortening during codegen pass")
6e61dc9da0b7 ("s390/bpf: Fix 64-bit subtraction of the -0x8000 constant")
db7bee653859 ("s390/bpf: Fix optimizing out zero-extensions")
--
You received th
** Bug watch added: Sourceware.org Bugzilla #27256
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
** Also affects: glibc via
https://sourceware.org/bugzilla/show_bug.cgi?id=27256
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a me
Is this worth addressing in the cloud kernels or should we stick to
early microcode loads only?
** Changed in: linux-aws (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
** Package changed: glibc (Ubuntu) => pcre2 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942673
Title:
glibc AddressS
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Looks like https://git.claws-
mail.org/?p=claws.git;a=commit;h=ac286a71ed78429e16c612161251b9ea90ccd431
is the upstream commit to address the issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/194292
** Changed in: glibc (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942923
Title:
CVE-2
** Also affects: sylpheed (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942927
Title:
claws-mail package outdated (security risk)
To manage not
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: linux (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192
Title:
test_utils_testsuite from ubuntu_qrt_apparmor linux ADT test failure
This is due to apparmor in hirsute missing the fix for
https://gitlab.com/apparmor/apparmor/-/merge_requests/656 which breaks
the apparmor python utils testsuite; the fix for this has landed in
impish's apparmor package.
We are unlikely to SRU a fix for this in hirsute, so have worked around it in
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938893
Title:
Network perpherals not detected
To manage notifications about this bug go to:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Groovy has reached end of supported status, and as such will not be
fixed.
** Changed in: glibc (Ubuntu Groovy)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1929105
T
The Ubuntu Security Team is okay with publishig the xenial openssl in
proposed (1.0.2g-1ubuntu4.20) to xenial-security and updates. I didn't
see any symbol changes or dependency changes in the binaries that would
have indicated that building against xenial-updates was a problem.
Thanks!
--
You r
** Changed in: linux (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1933980
Title:
NVIDIA CVE-2021-{1093|1094|1094}
To manage notifications about this bug go t
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This seems to have been the failure in the grub-install attempt:
Jul 16 06:19:37 ubuntu grub-installer: info: Installing grub on '/dev/nvme0n1'
Jul 16 06:19:37 ubuntu grub-installer: info: grub-install does not support
--no-floppy
Jul 16 06:19:37 ubuntu grub-installer: info: Running chroot /targe
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1938290 ***
https://bugs.launchpad.net/bugs/1938290
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This was fixed in Ubuntu packages in
https://ubuntu.com/security/notices/USN-3816-1 ; adjusting the state to
reflect that a fix was released.
Thanks.
** Changed in: systemd (Ubuntu)
Status: Invalid => Fix Released
--
You received this bug notification because you are a member of Ubuntu
B
Assigning the verification and publication to xenial-security to myself.
Thanks.
** Changed in: openssl (Ubuntu Xenial)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ht
Łukasz, the Ubuntu Security Team is indeed okay with promoting this to
main for focal as well. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1907284
Title:
[MIR] u-boot-menu
To manage notif
ed in: shibboleth-sp (Ubuntu)
Status: New => In Progress
** Changed in: shibboleth-sp (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
The root issue is likely something in the utf-8 handling code in glibc
on arm64 hirsute and impish; the reproducer is:
bash -c 'i=210; echo -n $(printf "\\$(printf "%03o" $i)") | od -An -t uC'
210 138
running valgrind in a default environemnt (so LANG=en_US.UTF-8) turned
up
==46656== ERROR S
Georgia's patch was committed in the upstream apparmor project in
https://gitlab.com/apparmor/apparmor/-/commit/458a981b6242e8b1cce1599ca95d89dcd10f60e7
in https://gitlab.com/apparmor/apparmor/-/merge_requests/765 and was
cherrypicked to the apparmor-3.0 branch amongst others in
https://gitlab.com/
** Also affects: apparmor (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1932331
Title:
ubuntu_qrt_apparmor: i18n test fails on arm64 Hirsute / Im
These have all been published to the security pockets for bionic and
newer, closing out this bug.b
** Changed in: grub2 (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: grub2-signed (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: grub2-unsigned (Ubuntu)
St
** Changed in: ceph (Ubuntu Focal)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** Changed in: ceph (Ubuntu Groovy)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
s for the Ubuntu 20.04.3 release media.
--
Steve Beattie
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1911893
Title:
latest microcode is not working properly on intel core i9
To manage notification
al-security/focal-updates
is 3.20210608.0ubuntu0.20.04.1:
https://launchpad.net/ubuntu/+source/intel-microcode
--
Steve Beattie
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1911893
Title:
lates
** Changed in: apache2 (Ubuntu)
Status: New => Confirmed
** Changed in: samba (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
Thanks, given the public commits, I'm making this issue public.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923527
Title:
Nul
This is fixed in hirsute and newer via glibc 2.33.
** Changed in: glibc (Ubuntu)
Importance: Undecided => Low
** Also affects: glibc (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: glibc (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects:
** Changed in: codeblocks (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1928620
Title:
segmentation fault(core dumped)
To manage notifications abou
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Yes, the systemd-container package will end up in main, likely for the
current package in bionic-updates, and thus will be reflected that way
in rmadison etc.
For the record, ack from the Ubuntu Security Team on promoting the
systemd-container binary from universe to main in bionic.
Thanks.
--
This was fixed with linux 4.4.0-211.243 in Ubuntu 16.04 ESM (Infra).
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/192
** Changed in: linux-oem-5.6 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1879341
Title:
test_350_retpolined_modules from ubuntu_qrt_kernel_security failed
Public bug reported:
The ruby based command line tools for interacting with openshift have
been deprecated to the point that the upstream project has been archived
on github:
https://github.com/openshift/rhc
The replacement is
https://github.com/openshift/oc/
which alas does not appear to
** Changed in: exim4 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927755
Title:
Fix for CVE-2020-28007 causes build failure when DMARC is enabled
To manag
** Changed in: mariadb-10.5 (Ubuntu Impish)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1926926
Title:
CVE-2021-27928 et al affects MariaDB in Ubuntu
To manage not
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928694
Title:
[Cezanne/Renoire]: Replace some fixes from linux-oem-5.10 with those
landin
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927409
Title:
Race between two functions
To manage notifications about this bug g
Sorry for the lag on this issue.
Timo, while the added hooks are useful, they don't for the time being
obviate the need for the larger hammer of the sysctl, so we'd still like
to keep the referred to patch available, until we are forced to make a
choice if and when upstream drops the sysctl entire
Hi, this looks like a legit issue with the linux-oem-5.6 da903x-
regulator module, which appears to have been addressed in f16861b12fa0
("regulator: rename da903x to da903x-regulator") (v5.8-rc6), which
points out that kmod gets confused before that commit.
You can verify this with e.g.:
$ modi
The Ubuntu Security team is +1 on disallowing purely numeric usernames,
as they are too easily confused with UIDs.
I think our preference would be to disallow leading numeric digits
entirely so that for example, 0x0 and 0o0 would be blocked as well, to
try to prevent both user and programmatic con
Ack from the Ubuntu Security team for moving libztsd into main in
xenial.
(There is a third CVE believed to be affecting libzstd/xenial as well,
CVE-2019-11922)
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11922
--
You received this bug notification because you are a member
Public bug reported:
tcpdump has a sync from debian 4.99.0-2 that is currently blocked in
hirsute-proposed due to a regression in the apparmor adt tests. The
reason for this failure is that 'compile-policy' testcase is failing;
this test ensures that various apparmor policies included in packages
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1909937
Title:
Physical Ethernet interfaces leak MAC addresses on link up
To manag
Hi, looking at your package dependencies, there are a bunch of "oibaf"
originating packages in the display stack. Can you confirm that you see
the same behavior on a system with packages solely originating from the
Ubuntu archive?
Thanks.
** Changed in: light-locker (Ubuntu)
Status: New =
** Changed in: shibboleth-sp (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1919419
Title:
Phishing vulnerability: Template generation allows external param
** Changed in: gdm3 (Ubuntu)
Status: New => Incomplete
** Changed in: gnome-shell (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921585
Title:
Scree
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923320
Title:
lot's of teminal command run every time i turn on the system
To manage noti
** Changed in: jhead (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923538
Title:
jhead heap-buffer-overflow of exif.c in function Get16u
To manage notifica
Please note that upstream has indicated that this issue only affects the
xmllint binary, and not the shared library.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1895839
Title:
CVE-2020-24977
To m
ches can be dropped that much
easier. Thanks.
--
Steve Beattie
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1923432
Title:
apparmor-utils: missing CAP_CHECKPOINT_RESTORE in
/etc/apparmor/severity.db
://gitlab.com/apparmor/apparmor/-/commit/80efc15e18a6bb0d0abd2821cb03bf6be51cc517
This should be safe to cherrypick for hirsute.
(Similar cherrypicks occurred for prior AppArmor branches.)
--
Steve Beattie
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Summary changed:
- Update for GHSA-xgh4-387p-hqpp
+ Update for CVE-2021-21381
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918482
Title:
Update for CVE-2021-21381
To manage notifications abou
Hi Fabio and Joshua, thanks for preparing these updates. I have reviewed
them, adjusted the changelogs slightly, and have uploaded packages to
the ubuntu-security-proposed ppa https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages to make them available for
testing.
Any tes
.
Any feedback on them would be greatly appreciated. Thanks
** Changed in: flatpak (Ubuntu Bionic)
Assignee: Andrew Hayzen (ahayzen) => Steve Beattie (sbeattie)
** Changed in: flatpak (Ubuntu Focal)
Assignee: Andrew Hayzen (ahayzen) => Steve Beattie (sbeattie)
** Changed in: f
Thanks, I'm taking a look at these. I've adjusted the versions to
imclude per-release versions, since focal and groovy had the same
version of caribou.
** Changed in: caribou (Ubuntu Focal)
Assignee: Joshua Peisach (itzswirlz) => Steve Beattie (sbeattie)
** Changed in: ca
This was merged into q-r-t in https://git.launchpad.net/qa-regression-
testing/commit/?id=c1af010b49291e5526ccac85cd1fd334fa3bd0c5 .
Until this actually makes into a kernel in updates/security, the test
will fail for those kernels. Worth keeping in mind if we have to do any
respins.
Thanks!
** C
** Changed in: shim (Ubuntu)
Status: New => Confirmed
** Changed in: shim-signed (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921134
Title:
SBAT sh
(Bah, didn't realize the original link contained the full thread as
well.)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918312
Title:
group changes don't show up in kerberizedd mounts
To manage n
Hey Charles,
Apologies for the lack of response earlier. I see that you have gone ahead and
reported this issue to upstream at
https://lore.kernel.org/linux-nfs/cc0f1034-8572-4556-8351-284999032...@rutgers.edu/
This response explains why things take a long time or don't show up at
all:
https:/
It seems like the EFI partition does not have enough free space?
Apr 1 01:40:20 ubuntu grub-installer: info: Identified partition label for
/dev/sdb2: msdos
Apr 1 01:40:20 ubuntu grub-installer: info: Installing grub on '/dev/sdb'
Apr 1 01:40:20 ubuntu grub-installer: info: grub-install does n
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
It seems like the EFI partition might have run out of space?
Apr 1 10:45:21 ubuntu grub-installer: info: Identified partition label for
/dev/sda6: msdos
Apr 1 10:45:21 ubuntu grub-installer: info: Installing grub on '/dev/sda5'
Apr 1 10:45:21 ubuntu grub-installer: info: grub-install does not
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
101 - 200 of 11308 matches
Mail list logo