[Bug 1960582] Re: [critical] dpkg error while processing - can't install nor upgrade
I had the same yesterday for a fresh new installed Ubuntu 22.04. Maybe it helps to have information, that the file it complained about in /var/lib/dpkg/ was dpkg -> /var/lib/dpkg This was definitely not created by myself, but by the system -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1960582 Title: [critical] dpkg error while processing - can't install nor upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1960582/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976456] [NEW] Backport server-backports to server-backports PPA for kinetic
Public bug reported: Backport the following packages to the server-backports PPA (https://launchpad.net/~canonical-server/+archive/ubuntu/server- backports/): * dpdk * edk2 * libslirp * libvirt * libvirt-python * meson * openvswitch * qemu * rdma-core * seabios * spice-protocol * spice-vdagent * virglrenderer * virt-manager ** Affects: dpdk (Ubuntu) Importance: Undecided Status: New ** Affects: libvirt (Ubuntu) Importance: Undecided Status: New ** Affects: openvswitch (Ubuntu) Importance: Undecided Status: New ** Affects: qemu (Ubuntu) Importance: Undecided Status: New ** Affects: dpdk (Ubuntu Kinetic) Importance: Undecided Status: New ** Affects: libvirt (Ubuntu Kinetic) Importance: Undecided Status: New ** Affects: openvswitch (Ubuntu Kinetic) Importance: Undecided Status: New ** Affects: qemu (Ubuntu Kinetic) Importance: Undecided Status: New ** Tags: needs-ppa-backport ** Changed in: dpdk (Ubuntu) Milestone: None => ubuntu-22.05 ** Changed in: libvirt (Ubuntu) Milestone: None => ubuntu-22.05 ** Changed in: openvswitch (Ubuntu) Milestone: None => ubuntu-22.05 ** Changed in: qemu (Ubuntu) Milestone: None => ubuntu-22.05 ** Also affects: qemu (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: libvirt (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: openvswitch (Ubuntu Kinetic) Importance: Undecided Status: New ** Also affects: dpdk (Ubuntu Kinetic) Importance: Undecided Status: New ** Description changed: - Backport server-backports as MRE for kinetic + Backport the following packages to the server-backports PPA + (https://launchpad.net/~canonical-server/+archive/ubuntu/server- + backports/): + + * dpdk + * edk2 + * libslirp + * libvirt + * libvirt-python + * meson + * openvswitch + * qemu + * rdma-core + * seabios + * spice-protocol + * spice-vdagent + * virglrenderer + * virt-manager -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976456 Title: Backport server-backports to server-backports PPA for kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpdk/+bug/1976456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971283] Re: Merge ldns from Debian unstable for kinetic
Check 1. Ubuntu Delta: - 1.7.1-2ubuntu4 - function fix d/p/lp-1966237-Fix-131-Compile-with-fno-strict-aliasing.patch - that is 4d2057f0b5 - upstream in 1.8.0 and later - 1.7.1-2ubuntu3 - FTBFS fix debian/patches/python3.10.patch - upstream as f126248f1 - upstream in 1.8.0 and later - 1.7.1-2ubuntu2 - no change rebuild - 1.7.1-2ubuntu1 - ssl fix debian/patches/OpenSSL3.patch - upstream in 1.8.0 and later => All our Delta is covered by 1.8.0 and later. 2. Upstream changes - 1.8.0 is out a while - more ssl3 fixes that we want - some features but not hard conflicting changes - fixes a few CVEs - 1.8.1 has some important fixes, we need 1.8.1 instead of 1.8.0 for sure => 1.8.1 or later should be fine 3. Debian changes - Debian is at 1.8.1-1 - no soname bump (no dep rebuilds needed) - new symbols exist though, just no drop - big built system cleanup - various more changes due to maintainer change, but non breaking => Should be fine Overall - we can syn this, no merge needed ** Tags removed: bite-size needs-merge ** Tags added: needs-sync -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971283 Title: Merge ldns from Debian unstable for kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ldns/+bug/1971283/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976335] Re: CVE-2022-25762 Score 8.6
Hi Arnold, thanks for your answer. i am interested, but i have no idea how package maintainer works. is it time to get involved here? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976335 Title: CVE-2022-25762 Score 8.6 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1976335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971315] Re: Merge qemu from Debian unstable for kinetic
Up to 1:7.0+dfsg-7 now. When merging >= 1:7.0+dfsg-6~ we also can do more. Debian has adopted our qemu-...-xen in a slightly modified way. 1. we might need some transitionals from our old to the new joint package names (in our src:qemu delta until 24.04) 2. afterwards we can make src:xen a sync as Debian also switched to depend on a -xen variant Adding src:xen task to remind us ** Also affects: xen (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971315 Title: Merge qemu from Debian unstable for kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1971315/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1973296] Re: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available
@Robie, I agree that just checking the detected and offered functionality is probably a bit shallow. Even if it worked before (but no longer, if the latest EP11 host library is used, that's how I understand it), it makes sense the run a more thorough test involving Dilithium. I think it could either be a manual test using a token with Dilithium, or maybe running the dedicated 'dilithium_tests' from testcases/crypto available upstream with an upstream package. (Btw. these testcases cannot be easily automated or even scripted in our case, since the external ep11 package is needed here, and a lot of upfront token/slot preparations, default PINs setup, hw etc. - but it's possible with some manual effort - did it in the past for a different testcase ...) I leave this here in case of any further discussions (also with IBM). And sorry for the delay in the verification (due to pub. holidays and the complex nature of this). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1973296 Title: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1973296] Re: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available
** Changed in: ubuntu-z-systems Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1973296 Title: [UBUNTU 20.04] OpenCryptoki >= 3.13 with upgraded EP11 host library - Dilithium support not available To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1973296/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976358] Re: Charset Boot-Login
** Description changed: - For Jammy Jellyfish 22.04: The Charset of the Login when I boot the - system is the American one. Even if I changed it to e.g. Swiss German. - If you have a password with special chars it may be tricky. Afterwards - it takes the custom setting charset. + For Jammy Jellyfish 22.04: The charset of the boot-login is the american + one. If I changed the charset to e.g. Swiss German, I will struggle, + because special chars are on other keys. For logins while running the + system it takes the custom charset. + + /* I can't run the terminal window while this issue encountered */ ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976358 Title: Charset Boot-Login To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976358/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976436] Re: sshd is reloaded immediately after start in the google 18.04 image
** Also affects: google-guest-agent (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976436 Title: sshd is reloaded immediately after start in the google 18.04 image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1976436/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1968631] Re: regression in jammy kernel 5.15 for module ath9k
Hi, I still have the same errore with kernel 5.15.0-33-generic !! Is that ok for you ? See below : [ 103.752602] [ 103.752613] UBSAN: invalid-load in /build/linux-MLl0vf/linux-5.15.0/net/mac80211/status.c:1164:21 [ 103.752622] load of value 255 is not a valid value for type '_Bool' [ 103.752628] CPU: 0 PID: 0 Comm: swapper/0 Tainted: P OE 5.15.0-33-generic #34-Ubuntu [ 103.752636] Hardware name: ASUSTeK COMPUTER INC. N550JK/N550JK, BIOS N550JK.208 09/26/2014 [ 103.752640] Call Trace: [ 103.752643] [ 103.752649] show_stack+0x52/0x58 [ 103.752666] dump_stack_lvl+0x4a/0x5f [ 103.752679] dump_stack+0x10/0x12 [ 103.752686] ubsan_epilogue+0x9/0x45 [ 103.752694] __ubsan_handle_load_invalid_value.cold+0x44/0x49 [ 103.752703] ieee80211_tx_status_ext.cold+0x4e/0x5f [mac80211] [ 103.752893] ieee80211_tx_status+0x72/0xa0 [mac80211] [ 103.752995] ath_txq_unlock_complete+0x12d/0x160 [ath9k] [ 103.753021] ath_tx_edma_tasklet+0xef/0x4c0 [ath9k] [ 103.753046] ? del_timer_sync+0x6c/0xb0 [ 103.753056] ath9k_tasklet+0x14e/0x290 [ath9k] [ 103.753079] tasklet_action_common.constprop.0+0xc0/0xf0 [ 103.753091] tasklet_action+0x22/0x30 [ 103.753100] __do_softirq+0xd9/0x2e3 [ 103.753113] irq_exit_rcu+0x8c/0xb0 [ 103.753122] common_interrupt+0x8a/0xa0 [ 103.753134] [ 103.753137] [ 103.753139] asm_common_interrupt+0x1e/0x40 [ 103.753149] RIP: 0010:cpuidle_enter_state+0xd9/0x620 [ 103.753161] Code: 3d f4 4b 7e 7a e8 07 ae 6c ff 49 89 c7 0f 1f 44 00 00 31 ff e8 58 ba 6c ff 80 7d d0 00 0f 85 5d 01 00 00 fb 66 0f 1f 44 00 00 <45> 85 f6 0f 88 69 01 00 00 4d 63 ee 49 83 fd 09 0f 87 e3 03 00 00 [ 103.753167] RSP: 0018:86c03db8 EFLAGS: 0246 [ 103.753174] RAX: 88c12ee30f00 RBX: c6afffc21500 RCX: [ 103.753179] RDX: RSI: 0002 RDI: [ 103.753182] RBP: 86c03e08 R08: 001828226b71 R09: 0007a120 [ 103.753187] R10: 0006 R11: 071c71c71c71c71c R12: 86ed36c0 [ 103.753191] R13: 0005 R14: 0005 R15: 001828226b71 [ 103.753199] ? cpuidle_enter_state+0xc8/0x620 [ 103.753209] cpuidle_enter+0x2e/0x40 [ 103.753216] cpuidle_idle_call+0x13e/0x1e0 [ 103.753225] do_idle+0x83/0xf0 [ 103.753232] cpu_startup_entry+0x20/0x30 [ 103.753239] rest_init+0xd3/0x100 [ 103.753246] ? acpi_enable_subsystem+0x20b/0x213 [ 103.753257] arch_call_rest_init+0xe/0x1b [ 103.753269] start_kernel+0x4b6/0x4d3 [ 103.753279] x86_64_start_reservations+0x24/0x26 [ 103.753289] x86_64_start_kernel+0xe4/0xeb [ 103.753298] secondary_startup_64_no_verify+0xc2/0xcb [ 103.753313] [ 103.753341] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1968631 Title: regression in jammy kernel 5.15 for module ath9k To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1968631/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967814] Re: Ubuntu 20.04.3 - ilzlnx3g1 - virtio-scsi devs on KVM guest having miscompares on disktests when there is a failed path.
I've accepted this, and I agree that this is a good candidate for testing in proposed for longer than 7 days; I'll do so after at least 14 days, so double the normal soak time. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967814 Title: Ubuntu 20.04.3 - ilzlnx3g1 - virtio-scsi devs on KVM guest having miscompares on disktests when there is a failed path. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1967814/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1969637] Re: IBus lookup table appears bottom left of application (x11)
** Changed in: gnome-settings-daemon Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1969637 Title: IBus lookup table appears bottom left of application (x11) To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-settings-daemon/+bug/1969637/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975393] Re: Calamares - unable to select option "Next" after selecting "No Swap"
http://iso.qa.ubuntu.com/qatracker/milestones/433/builds/249365/testcases/1701/results After updating the latest Lubuntu Kinetic ISO with Proposed (which pulled in calamares 3.2.59-0ubuntu1), this bug no longer appears - selecting "No Swap" does not gray-out the Next button. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975393 Title: Calamares - unable to select option "Next" after selecting "No Swap" To manage notifications about this bug go to: https://bugs.launchpad.net/calamares/+bug/1975393/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976436] Re: sshd is reloaded immediately after start in the google 18.04 image
Thank you for taking the time to report this bug and helping to make Ubuntu better. It seems that your bug report is not filed about a specific source package though, rather it is just filed against Ubuntu in general. It is important that bug reports be filed about source packages so that people interested in the package can find the bugs about it. You can find some hints about determining what package your bug might be about at https://wiki.ubuntu.com/Bugs/FindRightPackage. You might also ask for help in the #ubuntu-bugs irc channel on Libera.chat. To change the source package that this bug is filed about visit https://bugs.launchpad.net/ubuntu/+bug/1976436/+editstatus and add the package name in the text box next to the word Package. [This is an automated message. I apologize if it reached you inappropriately; please just reply to this message indicating so.] ** Tags added: bot-comment -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976436 Title: sshd is reloaded immediately after start in the google 18.04 image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1976436/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1430143] Re: sss_obfuscate breaks /etc/sssd/sssd.conf
[Expired for sssd (Ubuntu) because there has been no activity for 60 days.] ** Changed in: sssd (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1430143 Title: sss_obfuscate breaks /etc/sssd/sssd.conf To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sssd/+bug/1430143/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967290] Re: USB Kyb and Mouse hangs "Suspend" ?
[Expired for gnome-shell (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-shell (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967290 Title: USB Kyb and Mouse hangs "Suspend" ? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1967290/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967471] Re: Artifacts when any window is being minimized to tray (on the second or more tries)
[Expired for gnome-shell (Ubuntu) because there has been no activity for 60 days.] ** Changed in: gnome-shell (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967471 Title: Artifacts when any window is being minimized to tray (on the second or more tries) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1967471/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967510] Re: IPU6: 2022-04-01 Andrews MLK PV release
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967510 Title: IPU6: 2022-04-01 Andrews MLK PV release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1967510/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1969889] Re: My wired connection randomly disconnets after upgrade
Please give latest mainline kernel a try: https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.18/amd64/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1969889 Title: My wired connection randomly disconnets after upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1969889/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1969889] Re: My wired connection randomly disconnets after upgrade
So the wired network worked fine under 20.04? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1969889 Title: My wired connection randomly disconnets after upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1969889/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1973159] Re: Please update gce-compute-image-packages to 20220211.00
This bug has been reported on the Ubuntu ISO testing tracker. A list of all reports related to this bug can be found here: http://iso.qa.ubuntu.com/qatracker/reports/bugs/1973159 ** Tags added: iso-testing -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1973159 Title: Please update gce-compute-image-packages to 20220211.00 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gce-compute-image-packages/+bug/1973159/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976396] Re: laptop keyboard not working for about 30 seconds after resume from suspend
Please add kernel parameter "i8042.debug=1", reproduce the issue, and attach dmeseg here. ** Changed in: linux (Ubuntu) Status: Confirmed => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976396 Title: laptop keyboard not working for about 30 seconds after resume from suspend To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976396/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1950864] Re: snap--.mount systemd units left behind
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: snapd (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1950864 Title: snap--.mount systemd units left behind To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1950864/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972140] Re: UBSAN: array-index-out-of-bounds in /build/linux-HMZHpV/linux-5.15.0/drivers/net/wireless/ath/ath5k/base.c:1695:20
Alright, please give this one a try: https://people.canonical.com/~khfeng/lp1972140 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972140 Title: UBSAN: array-index-out-of-bounds in /build/linux- HMZHpV/linux-5.15.0/drivers/net/wireless/ath/ath5k/base.c:1695:20 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1972140/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972815] Re: Headset mic with Cirrus logic codec doesn't work
** Tags removed: verification-needed-focal verification-needed-jammy ** Tags added: verification-done-focal verification-done-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972815 Title: Headset mic with Cirrus logic codec doesn't work To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1972815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1974018] Re: UBSAN: invalid-load in /build/linux-WD899k/linux-5.15.0/net/mac80211/status.c:1164:21
Should be fixed by mainline kernel: https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.18/amd64/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1974018 Title: UBSAN: invalid-load in /build/linux- WD899k/linux-5.15.0/net/mac80211/status.c:1164:21 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1974018/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975549] Re: NetworkManager uses tethered Android phone as ethernet connection instead of wired ethernet connection
Sebastien, do you know how I can mark my ethernet connection as the default one? The ethernet connection I want to set as default is the wired ethernet, which is enp4s0 in the dumps shown above. I cannot find a setting in the Settings program to set a default connection. I also cannot find a discussion of it in the docs.[1,2] The docs only say the program usually picks the right one:[1] In most cases the wired network connection will simply work without any changes to the default Kubuntu configuration. Wired network connections are selected as default when they are available. (And it is not picking a wired connection as stated in the docs. It is picking a Wifi connection via the Android phone). [1] https://userbase.kde.org/Kubuntu/Basic/en#Networking [2] https://userbase.kde.org/NetworkManagement -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975549 Title: NetworkManager uses tethered Android phone as ethernet connection instead of wired ethernet connection To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1975549/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 938751] Re: Images are washed out or colors are skewed in some apps (particularly Image Viewer and Chrome)
Ubuntu 21.10 The issue still remain. In colour setting window, the "remove" button is now disabled. There is what fixed the issue for me: Deny any access to any user to the folder contains the ICC files. $ sudo chmod 000 ~/.local/share/icc $ reboot Here is how a track down the ICC folder in use: 1. Install gnome-color-manager 2. Open colour settings. 3. Click the colour profile in use and click the "View profile" button. 4. Find the path to the ICC file. 5. Deny any access to any user to the folder contains the ICC files. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/938751 Title: Images are washed out or colors are skewed in some apps (particularly Image Viewer and Chrome) To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/938751/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1968519] Re: [Lenovo Ubuntu 22.04 Bug]The Physical VGA displayer shows no signal (black screen) when install Ubuntu 22.04
The fix is included in kernel 5.15.0-34.35. The daily image should have the kernel soon. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1968519 Title: [Lenovo Ubuntu 22.04 Bug]The Physical VGA displayer shows no signal (black screen) when install Ubuntu 22.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1968519/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1931715] Re: [Lenovo Ideapad S145 82DJ0001BR] touchpad not working - does not appear on "cat /proc/bus/input/devices"
If "pci=nocrs" kernel parameter can workaround the issue, the fix from Hans should work. I'll backport it to both 20.04 and 22.04 kernel once it's in upstream. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931715 Title: [Lenovo Ideapad S145 82DJ0001BR] touchpad not working - does not appear on "cat /proc/bus/input/devices" To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1931715/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1974214] Re: Segfaults on verify callout, in _gnutls_trust_list_get_issuer
Thank you for testing the package from the PPA and providing feedback, Malcom and Raf. I took some time today to try and come up with a reproducer for the bug, since this is one of the requirements for a successful SRU to Jammy. So far I haven't had any success, but I'll try to continue working on this tomorrow. I found some possible reproducer in the upstream bug but none of them worked OOTB for me. Meanwhile, if any of you already have a simple reproducer that'd be great. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1974214 Title: Segfaults on verify callout, in _gnutls_trust_list_get_issuer To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/exim4/+bug/1974214/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976204] ShellJournal.txt
apport information ** Attachment added: "ShellJournal.txt" https://bugs.launchpad.net/bugs/1976204/+attachment/5594178/+files/ShellJournal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976204 Title: system freeze and gnome-shell reports multiple stack trace To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1976204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976204] ProcCpuinfoMinimal.txt
apport information ** Attachment added: "ProcCpuinfoMinimal.txt" https://bugs.launchpad.net/bugs/1976204/+attachment/5594176/+files/ProcCpuinfoMinimal.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976204 Title: system freeze and gnome-shell reports multiple stack trace To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1976204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976204] ProcEnviron.txt
apport information ** Attachment added: "ProcEnviron.txt" https://bugs.launchpad.net/bugs/1976204/+attachment/5594177/+files/ProcEnviron.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976204 Title: system freeze and gnome-shell reports multiple stack trace To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1976204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976204] GsettingsChanges.txt
apport information ** Attachment added: "GsettingsChanges.txt" https://bugs.launchpad.net/bugs/1976204/+attachment/5594175/+files/GsettingsChanges.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976204 Title: system freeze and gnome-shell reports multiple stack trace To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1976204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976204] Re: system freeze and gnome-shell reports multiple stack trace
apport information ** Tags added: apport-collected jammy wayland-session ** Description changed: [Summary] The system will run into freeze if I connect the external monitor through DP/HDMI with dongle DA310 or Docking WD19TB [Steps to reproduce] 1. Attact DA310 or WD19TB to DUT 2. Cold Boot into OS 3. Plug the DP/HDMI cable to DA310 or WD19TB 4. Check the external monitor has signal 5. Click keyboard or move mouse to check system can work well [Expected result] System won't be freeze with external monitor. [Actual result] System will be freeze. It can be recovered after unplug the external monitor sometime. [gnome-shell stack trace] 五 27 22:12:31 ubuntu-XPS-9320 gnome-shell[1998]: Window manager warning: Overwriting existing binding of keysym 37 with keysym 37 (keycode 10). 五 27 22:12:31 ubuntu-XPS-9320 gnome-shell[1998]: Window manager warning: Overwriting existing binding of keysym 35 with keysym 35 (keycode e). 五 27 22:12:31 ubuntu-XPS-9320 gnome-shell[1998]: Window manager warning: Overwriting existing binding of keysym 33 with keysym 33 (keycode c). 五 27 22:12:31 ubuntu-XPS-9320 gnome-shell[1998]: meta_window_set_stack_position_no_sync: assertion 'window->stack_position >= 0' failed 五 27 22:12:55 ubuntu-XPS-9320 sudo[2916]: ubuntu : TTY=pts/2 ; PWD=/home/ubuntu ; USER=root ; COMMAND=/usr/bin/dmesg 五 27 22:12:55 ubuntu-XPS-9320 sudo[2916]: pam_unix(sudo:session): session opened for user root(uid=0) by ubuntu(uid=1001) 五 27 22:12:55 ubuntu-XPS-9320 sudo[2916]: pam_unix(sudo:session): session closed for user root 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: Attempting to call back into JSAPI during the sweeping phase of GC. This is most likely caused by not destroying a Clutter actor or Gtk+ widget with ::destroy signals connected, but can also be caused by using the destroy(), dispose(), or remove() vfuncs. Because it would crash the application, it has been blocked and the JS callback not invoked. 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: == Stack trace for context 0x56156f8f04a0 == 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: == Stack trace for context 0x56156f8f04a0 == 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: The offending signal was window-added on MetaWorkspace 0x56156f916640. 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: Attempting to call back into JSAPI during the sweeping phase of GC. This is most likely caused by not destroying a Clutter actor or Gtk+ widget with ::destroy signals connected, but can also be caused by using the destroy(), dispose(), or remove() vfuncs. Because it would crash the application, it has been blocked and the JS callback not invoked. 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: The offending signal was window-added on MetaWorkspace 0x56156f916640. 五 27 22:12:56 ubuntu-XPS-9320 gnome-shell[1998]: Attempting to call back into JSAPI during the sweeping phase of GC. This is most likely caused by not destroying a Clutter actor or Gtk+ widget with ::destroy signals connected, but can also be caused by using the destroy(), dispose(), or remove() vfuncs. Because it would crash the application, it has been blocked and the JS callback not invoked. - This system is using OLED (3456x2160) panel, and I can't reproduce this - issue on FHD panel. + This system is using OLED (3456x2160) panel, and I can't reproduce this issue on FHD panel. + --- + ProblemType: Bug + ApportVersion: 2.20.11-0ubuntu82.1 + Architecture: amd64 + CasperMD5CheckResult: pass + CurrentDesktop: ubuntu:GNOME + DisplayManager: gdm3 + DistroRelease: Ubuntu 22.04 + InstallationDate: Installed on 2022-03-17 (75 days ago) + InstallationMedia: Ubuntu 22.04 LTS "Jammy Jellyfish" - Alpha amd64 (20220313) + Package: gnome-shell 42.1-0ubuntu0.1 + PackageArchitecture: amd64 + ProcVersionSignature: Ubuntu 5.15.0-35.36-generic 5.15.35 + RelatedPackageVersions: mutter-common 42.0-3ubuntu2 + Tags: jammy wayland-session + Uname: Linux 5.15.0-35-generic x86_64 + UpgradeStatus: No upgrade log present (probably fresh install) + UserGroups: adm cdrom dip lpadmin lxd plugdev sambashare sudo + _MarkForUpload: True ** Attachment added: "Dependencies.txt" https://bugs.launchpad.net/bugs/1976204/+attachment/5594174/+files/Dependencies.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976204 Title: system freeze and gnome-shell reports multiple stack trace To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1976204/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976438] Re: Fix sub-optimal I210 network speed
** Tags added: oem-priority originate-from-1968653 sutton -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976438 Title: Fix sub-optimal I210 network speed To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1976438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976438] Missing required logs.
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window: apport-collect 1976438 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976438 Title: Fix sub-optimal I210 network speed To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1976438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976438] [NEW] Fix sub-optimal I210 network speed
Public bug reported: [Impact] I210 may not reach maximum speed on Intel Alder Lake platforms. [Fix] Following the datasheet to ensure I210 is not in idle state when CPU is using PCIe link to perform TX. [Test] With the fix applied, the I210 TX/RX speed can reach ~94x MBps. [Where problems could occur] Since this changes how hardware idles, it can slightly increase power consumption. ** Affects: hwe-next Importance: Undecided Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Affects: linux-oem-5.14 (Ubuntu) Importance: Undecided Status: New ** Affects: linux-oem-5.17 (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Focal) Importance: Undecided Status: Won't Fix ** Affects: linux-oem-5.14 (Ubuntu Focal) Importance: Medium Status: Confirmed ** Affects: linux-oem-5.17 (Ubuntu Focal) Importance: Undecided Status: Invalid ** Affects: linux (Ubuntu Jammy) Importance: Medium Status: Confirmed ** Affects: linux-oem-5.14 (Ubuntu Jammy) Importance: Undecided Status: Invalid ** Affects: linux-oem-5.17 (Ubuntu Jammy) Importance: Medium Status: Confirmed ** Tags: oem-priority originate-from-1968653 sutton ** Also affects: linux-oem-5.14 (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-oem-5.17 (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux-oem-5.14 (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux-oem-5.17 (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux-oem-5.14 (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: linux-oem-5.17 (Ubuntu Jammy) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Focal) Status: New => Won't Fix ** Changed in: linux (Ubuntu Jammy) Status: New => Confirmed ** Changed in: linux-oem-5.14 (Ubuntu Focal) Status: New => Confirmed ** Changed in: linux-oem-5.14 (Ubuntu Jammy) Status: New => Invalid ** Changed in: linux-oem-5.17 (Ubuntu Focal) Status: New => Invalid ** Changed in: linux-oem-5.17 (Ubuntu Jammy) Status: New => Confirmed ** Changed in: linux (Ubuntu Jammy) Importance: Undecided => Medium ** Changed in: linux-oem-5.14 (Ubuntu Focal) Importance: Undecided => Medium ** Changed in: linux-oem-5.17 (Ubuntu Jammy) Importance: Undecided => Medium -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976438 Title: Fix sub-optimal I210 network speed To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1976438/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1967814] Re: Ubuntu 20.04.3 - ilzlnx3g1 - virtio-scsi devs on KVM guest having miscompares on disktests when there is a failed path.
Hello bugproxy, or anyone else affected, Accepted qemu into focal-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/qemu/1:4.2-3ubuntu6.22 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- focal to verification-done-focal. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-focal. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: qemu (Ubuntu Focal) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1967814 Title: Ubuntu 20.04.3 - ilzlnx3g1 - virtio-scsi devs on KVM guest having miscompares on disktests when there is a failed path. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1967814/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1786013] Autopkgtest regression report (linux-meta-oracle/5.4.0.1074.74)
All autopkgtests for the newly accepted linux-meta-oracle (5.4.0.1074.74) for focal have finished running. The following regressions have been reported in tests triggered by the package: lxc/1:4.0.6-0ubuntu1~20.04.1 (arm64) Please visit the excuses page listed below and investigate the failures, proceeding afterwards as per the StableReleaseUpdates policy regarding autopkgtest regressions [1]. https://people.canonical.com/~ubuntu-archive/proposed- migration/focal/update_excuses.html#linux-meta-oracle [1] https://wiki.ubuntu.com/StableReleaseUpdates#Autopkgtest_Regressions Thank you! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1786013 Title: Packaging resync To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1786013/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976287] Re: casper: qemu instances too small during autopkgtest (potential OOM failures)
This bug was fixed in the package casper - 1.471 --- casper (1.471) kinetic; urgency=medium * Increase memory for qemu autopkgtest instances to 1G (LP: #1976287) -- Andrea Righi Mon, 30 May 2022 14:40:38 + ** Changed in: casper (Ubuntu Kinetic) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976287 Title: casper: qemu instances too small during autopkgtest (potential OOM failures) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1976287/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1970943] Re: OpenVPN connection fails with smartcard provided private key; please update pkcs11-helper
This bug was fixed in the package pkcs11-helper - 1.28-1ubuntu0.22.04.1 --- pkcs11-helper (1.28-1ubuntu0.22.04.1) jammy; urgency=medium * debian/patches/git-openvpn-smartcard.patch: - openssl: set back key into EVP for openssl-3 to work, fix openvpn authentification using smartcards (lp: #1970943) -- Sebastien Bacher Wed, 18 May 2022 15:29:01 +0200 ** Changed in: pkcs11-helper (Ubuntu Jammy) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970943 Title: OpenVPN connection fails with smartcard provided private key; please update pkcs11-helper To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pkcs11-helper/+bug/1970943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1974456] Re: regression: apt.postint fails if never previously configured
Hello David, or anyone else affected, Accepted apt into focal-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/apt/2.0.9 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- focal to verification-done-focal. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-focal. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: apt (Ubuntu Focal) Status: Confirmed => Fix Committed ** Tags added: verification-needed verification-needed-focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1974456 Title: regression: apt.postint fails if never previously configured To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1974456/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976436] Re: sshd is reloaded immediately after start in the google 18.04 image
I have not seen this behavior in the equivalent AWS images. It seems GCP specific. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976436 Title: sshd is reloaded immediately after start in the google 18.04 image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1976436/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976436] [NEW] sshd is reloaded immediately after start in the google 18.04 image
Public bug reported: In recent published 18.04 images for Google Cloud, sshd is reloaded by systemd immediately after it is started. The images I'm using are sourced from https://cloud-images.ubuntu.com/locator/. I've found this issue in ubuntu-1804-bionic-v20220505 and ubuntu-1804-bionic-v20220419. The image ubuntu-1804-bionic-v20210129 does not have the issue (sshd is not reloaded). I have not tested intermediate versions. The specific version attributes are: Cloud=Google Compute Engine Zone=us-west2 Name=bionic Version=18.04 Arch=amd64 Instance Type=kvm Here's a snippet from the syslog of an image affected by this bug: = systemd[1]: Starting Login Service... systemd-logind[2057]: Watching system buttons on /dev/input/event0 (Power Button) systemd-logind[2057]: Watching system buttons on /dev/input/event1 (Sleep Button) systemd-logind[2057]: Watching system buttons on /dev/input/event2 (AT Translated Set 2 keyboard) systemd-logind[2057]: New seat seat0. systemd[1]: Started Login Service. systemd[1]: Stopping Regular background program processing daemon... systemd[1]: Stopped Regular background program processing daemon. systemd[1]: Started Regular background program processing daemon. cron[2066]: (CRON) INFO (pidfile fd = 3) cron[2066]: (CRON) INFO (Skipping @reboot jobs -- not system startup) GCEGuestAgent[1899]: 2022-06-01T01:09:28.4626Z GCEGuestAgent Error oslogin.go:109: Error restarting service: Failed to try-restart crond.service: Unit crond.service not found. . google_guest_agent[1899]: 2022/06/01 01:09:28 logging client: rpc error: code = Unauthenticated desc = transport: metadata: GCE metadata "instance/service-accounts/default/token?scopes=https%3A%2F%2Fwww.googleapis.com%2Fauth%2Flogging.write" not defined pollinate[2093]: [1.0K blob data] systemd[1]: Started Pollinate to seed the pseudo random number generator. systemd[1]: Starting OpenBSD Secure Shell server... sshd[2108]: Server listening on 0.0.0.0 port 22. sshd[2108]: Server listening on :: port 22. systemd[1]: Started OpenBSD Secure Shell server. systemd[1]: Reloading OpenBSD Secure Shell server. sshd[2108]: Received SIGHUP; restarting. systemd[1]: Reloaded OpenBSD Secure Shell server. sshd[2108]: Server listening on 0.0.0.0 port 22. sshd[2108]: Server listening on :: port 22. systemd[1]: Reloading. systemd[1]: Reloading. The line of importance to me is "systemd[1]: Reloading OpenBSD Secure Shell server." This is in contrast to the first boot of an older, unaffected image, where no reloading is observed: google-accounts[1795]: INFO Creating a new user account for admin. google_accounts_daemon[1795]: useradd: group admin exists - if you want to add this user to that group, use -g. useradd[1893]: failed adding user 'admin', data deleted google-accounts[1795]: WARNING Could not create user admin. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', 'admin']' returned non-zero exit status 9.. google-clock-skew[1791]: INFO Synced system time with hardware clock. pollinate[1923]: [1.0K blob data] systemd[1]: Started Pollinate to seed the pseudo random number generator. systemd[1]: Starting OpenBSD Secure Shell server... sshd[1945]: Server listening on 0.0.0.0 port 22. sshd[1945]: Server listening on :: port 22. systemd[1]: Started OpenBSD Secure Shell server. systemd[1]: Reloading. systemd[1]: Reloading. Note that the new image has swapped to using google_guest_agent instead of google_accounts_daemon, and that google_guest_agent prints an error message directly before the reload. I don't know if that is related. This bug is impactful to me as I cannot safely "just" wait for SSH to be online in scripts before proceeding. This bug should be observable in the aforementioned images on first boot with no modifications. ** Affects: ubuntu Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976436 Title: sshd is reloaded immediately after start in the google 18.04 image To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1976436/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1970943] Update Released
The verification of the Stable Release Update for pkcs11-helper has completed successfully and the package is now being released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970943 Title: OpenVPN connection fails with smartcard provided private key; please update pkcs11-helper To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pkcs11-helper/+bug/1970943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1974428] Re: Update to the current 1.36 stable version
This bug was fixed in the package network-manager - 1.36.6-0ubuntu1 --- network-manager (1.36.6-0ubuntu1) jammy; urgency=medium * New stable version (lp: #1974428) * debian/gbp.conf: - updated the packaging vcs serie * d/p/supplicant-add-BIP-interface-capability.patch, d/p/supplicant-enable-WPA3-transition-mode-only-when-interfac.patch: - remove, included in the new version -- Sebastien Bacher Fri, 20 May 2022 13:08:51 +0200 ** Changed in: network-manager (Ubuntu Jammy) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1974428 Title: Update to the current 1.36 stable version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1974428/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1974428] Update Released
The verification of the Stable Release Update for network-manager has completed successfully and the package is now being released to -updates. Subsequently, the Ubuntu Stable Release Updates Team is being unsubscribed and will not receive messages about this bug report. In the event that you encounter a regression using the package from -updates please report a new bug using ubuntu-bug and tag the bug report regression-update so we can easily find any regressions. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1974428 Title: Update to the current 1.36 stable version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1974428/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971933] Re: [Regression] Unable to wake laptop using trackpad input
Sorry for late reply, I had headache related issues, and hence I was a bit away from my device. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971933 Title: [Regression] Unable to wake laptop using trackpad input To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971933] Re: [Regression] Unable to wake laptop using trackpad input
Then, maybe, this (touchpad wake trigger) feature is more recent than the model of laptop you are using. Because USB wakeup feature has been present in laptops for quite a while. (My 10 year old laptop had that (USB wake trigger), but, touchpad wake has been available only on Dell Inspiron 7000 (series) laptop.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971933 Title: [Regression] Unable to wake laptop using trackpad input To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971933/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1969460] Re: software-properties-gtk crashed with TypeError in on_driver_selection_changed(): Expected a string or a pair of strings
This bug was fixed in the package software-properties - 0.99.24 --- software-properties (0.99.24) kinetic; urgency=medium * softwareproperties/gtk/SoftwarePropertiesGtk.py: Don't crash if the driver package does not have a matching modules package Fixes LP: #1969460 -- Alberto Milone Mon, 30 May 2022 16:50:03 +0200 ** Changed in: software-properties (Ubuntu) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1969460 Title: software-properties-gtk crashed with TypeError in on_driver_selection_changed(): Expected a string or a pair of strings To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1969460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1971788] Re: Failure to enable SSL out of the box when in fips mode
On Mon, May 30, 2022 at 09:38:52AM -, Tobias Heider wrote: > I don't think it does, but you have a point. It might be a little safer > not to touch the function signature. Here's an updated fix. This isn't quite as easy to read but I do like that the signature is unchanged. I sure hope upstream takes another stab at these functions, it feels pretty messy. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971788 Title: Failure to enable SSL out of the box when in fips mode To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1971788/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976276] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976276 Title: Hello sir/mam I am getting some problem regarding my brightness control i will expllain more about it in brief below. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1970270] Re: LibreOffice localization is not working out of the box
This bug has been reported on the Ubuntu ISO testing tracker. A list of all reports related to this bug can be found here: http://iso.qa.ubuntu.com/qatracker/reports/bugs/1970270 ** Tags added: iso-testing -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970270 Title: LibreOffice localization is not working out of the box To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/calamares-settings-ubuntu/+bug/1970270/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976120] Re: Update nautilus to 42.2
Hello Jeremy, or anyone else affected, Accepted nautilus into jammy-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/nautilus/1:42.2-0ubuntu1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- jammy to verification-done-jammy. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-jammy. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: nautilus (Ubuntu Jammy) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976120 Title: Update nautilus to 42.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1976120/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976276] Re: Hello sir/mam I am getting some problem regarding my brightness control i will expllain more about it in brief below.
** Package changed: ubuntu => linux (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976276 Title: Hello sir/mam I am getting some problem regarding my brightness control i will expllain more about it in brief below. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1956509] Re: Support AMD P-State cpufreq control mechanism
** Changed in: linux-oem-5.17 (Ubuntu) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1956509 Title: Support AMD P-State cpufreq control mechanism To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1956509/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976106] Re: [SRU] FTBFS logging_user_identity_format's default is using deprecated (now removed) tenant
Hello Corey, or anyone else affected, Accepted python-oslo.log into jammy-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/python- oslo.log/4.6.1-0ubuntu1.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- jammy to verification-done-jammy. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-jammy. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: python-oslo.log (Ubuntu Jammy) Status: Triaged => Fix Committed ** Tags added: verification-needed verification-needed-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976106 Title: [SRU] FTBFS logging_user_identity_format's default is using deprecated (now removed) tenant To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-oslo.log/+bug/1976106/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976263] Re: python-oslo.log ftbfs in the jammy release pocket
*** This bug is a duplicate of bug 1976106 *** https://bugs.launchpad.net/bugs/1976106 ** This bug has been marked a duplicate of bug 1976106 [SRU] FTBFS logging_user_identity_format's default is using deprecated (now removed) tenant -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976263 Title: python-oslo.log ftbfs in the jammy release pocket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-oslo.log/+bug/1976263/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1962349] Re: Bolt doesn't work with native USB4 hosts
** Changed in: linux-oem-5.17 (Ubuntu) Status: Fix Committed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1962349 Title: Bolt doesn't work with native USB4 hosts To manage notifications about this bug go to: https://bugs.launchpad.net/oem-priority/+bug/1962349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976102] Re: [SRU] Fix FTBFS for jammy
Hello Corey, or anyone else affected, Accepted python-castellan into jammy-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/python- castellan/3.10.0-0ubuntu1.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- jammy to verification-done-jammy. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-jammy. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: python-castellan (Ubuntu Jammy) Status: Triaged => Fix Committed ** Tags added: verification-needed verification-needed-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976102 Title: [SRU] Fix FTBFS for jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-castellan/+bug/1976102/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976261] Re: python-castellan ftbfs in the jammy release pocket
*** This bug is a duplicate of bug 1976102 *** https://bugs.launchpad.net/bugs/1976102 ** This bug has been marked a duplicate of bug 1976102 [SRU] Fix FTBFS for jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976261 Title: python-castellan ftbfs in the jammy release pocket To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-castellan/+bug/1976261/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1867071] Re: Raspberry Pi uses old, non-upstream DTB naming (bcm2710 instead of bcm283*)
Yes, I am running the generic arm64 kernel on the Pi. (It runs just fine when renaming/copying the DTBs.) I should note that this naming scheme is not used by the official Raspberry Pi OS (Raspbian) anymore either after the relevant device trees were merged into upstream Linux, leaving Ubuntu as one of the few (if not only) hold-outs of the old naming scheme. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1867071 Title: Raspberry Pi uses old, non-upstream DTB naming (bcm2710 instead of bcm283*) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flash-kernel/+bug/1867071/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971700] Re: [jammy] 5.17.0-1004-oem breaks resume from sleep
*** This bug is a duplicate of bug 1971597 *** https://bugs.launchpad.net/bugs/1971597 This should be fixed in 5.17.0-1005.5 and newer. It's actually a duplicate of bug https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1971597 ** This bug has been marked a duplicate of bug 1971597 amd_gpio AMDI0030:00: Failed to translate GPIO pin 0x to IRQ, err -517 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971700 Title: [jammy] 5.17.0-1004-oem breaks resume from sleep To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.17/+bug/1971700/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975945] Re: Update gnome-control-center to 41.7
Hello Jeremy, or anyone else affected, Accepted gnome-control-center into jammy-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/gnome-control- center/1:41.7-0ubuntu0.22.04.1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- jammy to verification-done-jammy. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-jammy. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: gnome-control-center (Ubuntu Jammy) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975945 Title: Update gnome-control-center to 41.7 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1975945/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975873] Re: gtk-vnc -dev packages have missing dependencies
Hello Jeremy, or anyone else affected, Accepted gtk-vnc into jammy-proposed. The package will build now and be available at https://launchpad.net/ubuntu/+source/gtk-vnc/1.3.0-1ubuntu1 in a few hours, and then in the -proposed repository. Please help us by testing this new package. See https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how to enable and use -proposed. Your feedback will aid us getting this update out to other Ubuntu users. If this package fixes the bug for you, please add a comment to this bug, mentioning the version of the package you tested, what testing has been performed on the package and change the tag from verification-needed- jammy to verification-done-jammy. If it does not fix the bug for you, please add a comment stating that, and change the tag to verification- failed-jammy. In either case, without details of your testing we will not be able to proceed. Further information regarding the verification process can be found at https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in advance for helping! N.B. The updated package will be released to -updates after the bug(s) fixed by this package have been verified and the package has been in -proposed for a minimum of 7 days. ** Changed in: gtk-vnc (Ubuntu Jammy) Status: In Progress => Fix Committed ** Tags added: verification-needed verification-needed-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975873 Title: gtk-vnc -dev packages have missing dependencies To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gtk-vnc/+bug/1975873/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1943178] Re: Update fwupd in focal to 1.5.12 to fix "Document must begin with an element" error
** Changed in: fwupd (Ubuntu Focal) Status: New => Fix Released ** Changed in: fwupd (Ubuntu Impish) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1943178 Title: Update fwupd in focal to 1.5.12 to fix "Document must begin with an element" error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fwupd/+bug/1943178/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976307] Re: Stack smashing in gamatronic driver
Thanks Lucas. I'm installing the version you prepared and will run it for a few days to see if it's stable, and then report back. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976307 Title: Stack smashing in gamatronic driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nut/+bug/1976307/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976433] [NEW] package chromium-browser 101.0.4951.64-0ubuntu0.18.04.1 failed to install/upgrade: el subproceso nuevo paquete chromium-browser script pre-installation devolvió el código de salida
Public bug reported: upgrading from comand line from 18.04 yo 20.08 ProblemType: Package DistroRelease: Ubuntu 20.04 Package: chromium-browser 101.0.4951.64-0ubuntu0.18.04.1 ProcVersionSignature: Ubuntu 4.15.0-180.189-generic 4.15.18 Uname: Linux 4.15.0-180-generic x86_64 ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: skip DRM.card0-HDMI-A-1: enabled: disabled dpms: On status: disconnected edid-base64: modes: DRM.card0-LVDS-1: enabled: enabled dpms: On status: connected edid-base64: AP///wAGr1wyAAAVAQOAGg54CpmFlVVWkigiUFQBAQEBAQEBAQEBAQEBAQEBEhtWWlAAGTAwIDYAAJAQAAAYDwAg/gBBVU8KICAgICAgICAg/gBCMTE2WFcwMyBWMiAKAOY= modes: 1366x768 1280x720 1152x768 1024x768 800x600 848x480 720x480 640x480 DRM.card0-VGA-1: enabled: disabled dpms: On status: disconnected edid-base64: modes: Date: Tue May 31 16:20:05 2022 Desktop-Session: 'None' 'None' 'None' Env: 'None' 'None' ErrorMessage: el subproceso nuevo paquete chromium-browser script pre-installation devolvió el código de salida de error 1 InstallationDate: Installed on 2022-01-07 (144 days ago) InstallationMedia: Ubuntu-Server 18.04.6 LTS "Bionic Beaver" - Release amd64 (20210915) InstalledPlugins: Load-Avg-1min: 1.01 Load-Processes-Running-Percent: 0.6% MachineType: Acer Aspire V5-121 ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-180-generic root=/dev/mapper/ubuntu--vg-ubuntu--lv ro Python3Details: /usr/bin/python3.8, Python 3.8.10, python3-minimal, 3.8.2-0ubuntu2 PythonDetails: /usr/bin/python2.7, Python 2.7.18, python-is-python2, 2.7.17-4 SourcePackage: chromium-browser Title: package chromium-browser 101.0.4951.64-0ubuntu0.18.04.1 failed to install/upgrade: el subproceso nuevo paquete chromium-browser script pre-installation devolvió el código de salida de error 1 UpgradeStatus: Upgraded to focal on 2022-05-31 (0 days ago) dmi.bios.date: 04/16/2013 dmi.bios.vendor: Insyde Corp. dmi.bios.version: V2.12 dmi.board.asset.tag: Base Board Asset Tag dmi.board.name: ZA10_BZ dmi.board.vendor: Acer dmi.board.version: Type2 - A01 Board Version dmi.chassis.type: 10 dmi.chassis.vendor: Chassis Manufacturer dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnInsydeCorp.:bvrV2.12:bd04/16/2013:svnAcer:pnAspireV5-121:pvrV2.12:rvnAcer:rnZA10_BZ:rvrType2-A01BoardVersion:cvnChassisManufacturer:ct10:cvrChassisVersion: dmi.product.family: Type1Family dmi.product.name: Aspire V5-121 dmi.product.version: V2.12 dmi.sys.vendor: Acer modified.conffile..etc.default.chromium-browser: [deleted] ** Affects: chromium-browser (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package focal third-party-packages uec-images -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976433 Title: package chromium-browser 101.0.4951.64-0ubuntu0.18.04.1 failed to install/upgrade: el subproceso nuevo paquete chromium-browser script pre-installation devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/chromium-browser/+bug/1976433/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1945371] Re: QtPass never finishes generating GnuPG key pair
Successfully reproduced bug on latest Lubuntu Kinetic daily ISO. The workaround by @rinni worked. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945371 Title: QtPass never finishes generating GnuPG key pair To manage notifications about this bug go to: https://bugs.launchpad.net/qtpass-backports/+bug/1945371/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976307] Re: Stack smashing in gamatronic driver
Thanks for reporting this bug Claudio. As you might have expected I was not able to reproduce it locally. After checking the the core dump, we can see the crash happened when executing the sec_poll function in drivers/gamatronic.c file. I went through the upstream history of this file and I found some commits in the latest version (2.8.0) which might fix this issue for you. Since version 2.8.0 is not even in Debian yet, I prepared a "dirty" package (removed some docs and manpages) and put it in this PPA: https://launchpad.net/~lucaskanashiro/+archive/ubuntu/nut Could you please try to test it and see if it fixes this issue for you? If yes, we can try to dig into those upstream commits and then find what is needed to SRU to jammy. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976307 Title: Stack smashing in gamatronic driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nut/+bug/1976307/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1970921] Re: Drag and drop does not work
I am observing the same issue on 22.04. I cannot drag and drop from nautilus into chrome or slack. If I switch to an xorg session I can drag and drop. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1970921 Title: Drag and drop does not work To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1970921/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976425] [NEW] Release of nvidia-graphics-drivers 515.48.07 for Bionic, Focal, Impish, Jammy, Kinetic
Public bug reported: [Impact] These releases provide both bug fixes and new features, and we would like to make sure all of our users have access to these improvements. See the changelog entry below for a full list of changes and bugs. [Test Case] The following development and SRU process was followed: https://wiki.ubuntu.com/NVidiaUpdates Certification test suite must pass on a range of hardware: https://git.launchpad.net/plainbox-provider-sru/tree/units/sru.pxu The QA team that executed the tests will be in charge of attaching the artifacts and console output of the appropriate run to the bug. Nvidia maintainers team members will not mark ‘verification-done’ until this has happened. [Regression Potential] In order to mitigate the regression potential, the results of the aforementioned system level tests are attached to this bug. [Changelog] RELEASE HIGHLIGHTS Published the source code to a variant of the NVIDIA Linux kernel modules dual-licensed as MIT/GPLv2. The source is available here: https://github.com/NVIDIA/open-gpu-kernel-modules and will be updated each driver release. Please see the "Open Linux Kernel Modules" chapter in the README for details. Added support for the VK_EXT_external_memory_dma_buf and VK_EXT_image_drm_format_modifier Vulkan extensions. To use this functionality, the nvidia-drm kernel module must be loaded with DRM KMS mode setting enabled. See the DRM KMS section of the README for guidance on enabling mode setting. Changed nvidia-suspend.service, nvidia-resume.service, and nvidia-hibernate.service to use WantedBy= rather than RequiredBy= dependencies for systemd-suspend.service and systemd-hibernate.service. This avoids a problem where suspend or hibernate fails if the NVIDIA driver is uninstalled without disabling these services first. See https://github.com/systemd/systemd/issues/21991 If these services were manually enabled, it may be necessary to update their dependencies by running sudo systemctl reenable nvidia-suspend.service nvidia-resume.service nvidia-hibernate.service Interlaced modes are now disabled when active stereo is enabled. NVIDIA X Server Settings will now display the quit confirmation dialog automatically if only there are pending changes that need to be manually saved. The corresponding configuration option to control the appearance of the quit dialog was thus also removed. Removed the warning message about mismatches between the compiler used to build the Linux kernel and the compiler used to build the NVIDIA kernel modules from nvidia-installer. Modern compilers are less likely to cause problems when this type of mismatch occurs, and it has become common in many distributions to build the Linux kernel with a different compiler than the default system compiler. Updated nvidia-installer to skip test-loading the kernel modules on systems where no supported NVIDIA GPUs are detected. Updated nvidia-installer to avoid a race condition which could cause the kernel module test load to fail due to udev automatically loading kernel modules left over from an existing NVIDIA driver installation. This failure resulted in an installation error message "Kernel module load error: File exists". Updated the RTD3 Video Memory Utilization Threshold (NVreg_DynamicPowerManagementVideoMemoryThreshold) maximum value from 200 MB to 1024 MB. Improved performance of GLX and Vulkan applications running in gamescope. Added a "kernelopen" feature tag to the supported-gpus.json file, to indicate which GPUs are compatible with open-gpu-kernel-modules. Improved Vulkan swapchain creation failure reporting. Applications can use the VK_EXT_debug_utils extension to receive additional information when an error was encountered in vkCreateSwapchainKHR(). Added a new configuration option for NVIDIA NGX to allow disabling the DSO signature check. See the "NGX" chapter of the README for more information. Fixed an issue where HDMI audio output was not working in some cases, especially with high display refresh rates (120Hz, 100Hz, etc.) using Fixed Rate Link (FRL) transmission mode. ** Affects: linux-restricted-modules (Ubuntu) Importance: Undecided Status: New ** Affects: linux-restricted-modules (Ubuntu Bionic) Importance: Undecided Status: New ** Affects: linux-restricted-modules (Ubuntu Focal) Importance: Undecided Status: New ** Affects: linux-restricted-modules (Ubuntu Impish) Importance: Undecided Status: New ** Affects: linux-restricted-modules (Ubuntu Jammy) Importance: Undecided Status: New ** Affects: linux-restricted-modules (Ubuntu Kinetic) Importance: Undecided Status: New ** Description changed: + RELEASE HIGHLIGHTS + Published the source code to a variant of the NVIDIA Linux kernel modules dual-licensed as MIT/GPLv2. The source is available here: https://github.com/NVIDIA/open-gpu-kernel-modules and will be updated each driver release. Please see
[Bug 1976427] [NEW] installer crashed from Live USB
Public bug reported: Installer crashed from Live USB after entering my name and naming the device ProblemType: Bug DistroRelease: Ubuntu 22.04 Package: ubiquity 22.04.15 ProcVersionSignature: Ubuntu 5.15.0-25.25-generic 5.15.30 Uname: Linux 5.15.0-25-generic x86_64 NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair ApportVersion: 2.20.11-0ubuntu82 Architecture: amd64 CasperMD5CheckResult: pass CasperVersion: 1.470 Date: Tue May 31 17:54:25 2022 InstallCmdLine: BOOT_IMAGE=/casper/vmlinuz file=/cdrom/preseed/ubuntu.seed maybe-ubiquity quiet splash --- LiveMediaBuild: Ubuntu 22.04 LTS "Jammy Jellyfish" - Release amd64 (20220419) RebootRequiredPkgs: Error: path contained symlinks. SourcePackage: ubiquity UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: ubiquity (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug jammy ubiquity-22.04.15 ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976427 Title: installer crashed from Live USB To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1976427/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
Hello Luís, 4.5MB feels pretty unlikely for a security fix; the diffstat on that debdiff is all over the place: $ diffstat spip_focal.debdiff /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-audio-ogg.swf |binary /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-audio.swf |binary /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video-hls.swf |binary /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video-mdash.swf |binary /tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-video.swf |binary spip-3.2.15/.gitignore | 129 spip-3.2.15/CHANGELOG.TXT | 318 + spip-3.2.15/config/ecran_securite.php | 23 ... Normally security fixes add patches to debian/patches/ directory, modify a debian/patches/series file, modifies the debian/changelog. It's very rare to modify files outside of this hierarchy (except for 'native packages', but those don't typically have version numbers this complex). Could you double-check that you've prepared the patches that you thought you prepared? Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1975898] Re: RM: ntp from kinetic?
** Changed in: ntp (Ubuntu) Status: New => Incomplete ** Changed in: ntp (Ubuntu) Status: Incomplete => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1975898 Title: RM: ntp from kinetic? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ntp/+bug/1975898/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 938751] Re: Images are washed out or colors are skewed in some apps (particularly Image Viewer and Chrome)
Same here. Installed the Ubuntu-based Pop OS, used for a few days beside Windows 11 on the same dual-boot PC. It was OK, but a subjective feeling started to grow that the colours are not so nice as with Windows: a bit washed-out under Linux on my HP U32, otherwise fine display. Especially the human skin was lifeless, lacking red. The contrast also seemed to be worse, shadows a bit too gray. Then I noticed in Settings / Colour there is a profile called "Automatic - HP U32 4K HDR" is installed and selected. Clicked on "Add profile" added a plain "Standard Space - sRGB" - and display quality is fine now! Quite similar, perhaps the same as in Windows. Now it is easy to quickly compare the difference: switch between these colour profiles, open a photo in Image Viewer, and don't have to rely on memory of the same photo under Windows. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/938751 Title: Images are washed out or colors are skewed in some apps (particularly Image Viewer and Chrome) To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-shell/+bug/938751/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972866] Re: [MIR] gsasl
** Changed in: gsasl (Ubuntu) Assignee: William Wilson (jawn-smith) => (unassigned) ** Changed in: gsasl (Ubuntu) Status: Incomplete => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972866 Title: [MIR] gsasl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gsasl/+bug/1972866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
** Patch added: "spip_jammy.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594136/+files/spip_jammy.debdiff ** Changed in: spip (Ubuntu) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976335] Re: CVE-2022-25762 Score 8.6
Hello Hans, the Ubuntu security team doesn't track security issues in Launchpad; you can check the status in: https://ubuntu.com/security/cve-2022-25762 tomcat9 is in universe, so it's community supported; there's currently a handful of issues still open in the 18.04 LTS version: https://ubuntu.com/security/cves?q=&package=tomcat9&priority=&version=bionic&status= If you're in a position to be able to address this issue, it'd be nice if you could grab as many of the other open issues as possible. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976335 Title: CVE-2022-25762 Score 8.6 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1976335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976335] Re: CVE-2022-25762 Score 8.6
** Information type changed from Private Security to Public Security ** Changed in: tomcat9 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976335 Title: CVE-2022-25762 Score 8.6 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1976335/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976405] Re: [MIR] libntlm
** Description changed: - TBD by foundations + [Summary] + * Due to the nature of the package (an authentication library) it should + be reviewed by the security team before promotion + * build log: https://launchpad.net/ubuntu/+source/libntlm/1.6-4/+build/22298428 + + [Availability] + * The package is already in Ubuntu universe. + * The package build for the architectures it is designed to work on. + + [Rationale] + *This MIR is transitive for an MIR of gsasl. It is needed to resolve + a component mismatch for mutt + + [Security] + * CVE-2019-17455 was fixed and is the only CVE listed for this package + * No `suid` or `sgid` binaries + * No executables in `/sbin` and `/usr/sbin` + * Package does not install services, timers or recurring jobs + * Packages does not open privileged ports (ports < 1024) + * Due to the nature of the package (an authentication library) it should + be reviewed by the security team before promotion + + [Quality assurance - function/usage] + * The package works well right after install + + [Quality assurance - maintenance] + * The package is maintained well in Debian/Ubuntu and has not too many + and long term critical bugs open + * The package does not deal with exotic hardware we cannot support + + [Quality assurance - testing] + * The package runs a test suite on build time, if it fails + it makes the build fail + * The package runs an autopkgtest, and is currently passing + * The package does have not failing autopkgtests right now + + [Quality assurance - packaging] + * debian/watch is present and works + * debian/control defines a correct Maintainer field + * This package does not yield massive lintian Warnings, Errors + * Full output of `lintian --pedantic`: + ``` + P: libntlm source: very-long-line-length-in-source-file configure line 11350 is 704 characters long (>512) + P: libntlm source: very-long-line-length-in-source-file m4/libtool.m4 line 6621 is 738 characters long (>512) + ``` + * Lintian overrides are not present + * This package has no python2 or GTK2 dependencies + * Packaging and build is easy + + [UI standards] + * Application is not end-user facing (does not need translation) + + [Dependencies] + * No further depends or recommends dependencies that are not yet in main + + [Standards compliance] + * This package correctly follows FHS and Debian Policy + + [Maintenance/Owner] + * Owning Team will be foundations + * Team is not yet, but will subscribe to the package before promotion + * This does not use static builds + * This does not use vendored code + * The package successfully built during the most recent test rebuild + + [Background information] + * The Package description explains the package well + * Upstream name is libntlm + * Link to upstream project https://www.nongnu.org/libntlm/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976405 Title: [MIR] libntlm To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libntlm/+bug/1976405/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971034] Re: Several security issues in libpod 3.4.x
The usual approach in Ubuntu is to fix specific bugs in packages rather than perform wholesale version updates: https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions You can see that a 4.x version is currently in Debian experimental: https://packages.qa.debian.org/libp/libpod.html When the maintainers are happy with it, it'll be moved to Debian unstable, at which point it will be ingested to Ubuntu's development release. I can't give you a precise date. Thanks -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971034 Title: Several security issues in libpod 3.4.x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libpod/+bug/1971034/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
** Patch added: "spip_impish.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594134/+files/spip_impish.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976276] Re: Hello sir/mam I am getting some problem regarding my brightness control i will expllain more about it in brief below.
** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976276 Title: Hello sir/mam I am getting some problem regarding my brightness control i will expllain more about it in brief below. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1976276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
** Patch added: "spip_focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594133/+files/spip_focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1973028] Re: gnome-remote-desktop user service is always running
I installed gnome-remote-desktop 42.1.1-0ubuntu1 and verified that the Test Case completes successfully. ** Tags removed: verification-needed verification-needed-jammy ** Tags added: verification-done verification-done-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1973028 Title: gnome-remote-desktop user service is always running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
The attachment "spip_bionic.debdiff" seems to be a debdiff. The ubuntu- sponsors team has been subscribed to the bug report so that they can review and hopefully sponsor the debdiff. If the attachment isn't a patch, please remove the "patch" flag from the attachment, remove the "patch" tag, and if you are member of the ~ubuntu-sponsors, unsubscribe the team. [This is an automated message performed by a Launchpad user owned by ~brian-murray, for any issue please contact him.] ** Tags added: patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971195] Re: gnome-remote-desktop leads to a session crash inside qemu with virtio-vga
I confirmed that I am able to start the default Ubuntu (on Wayland) desktop session after installing gnome-remote-desktop 42.1.1-2ubuntu1 with the Test Case. Before installing that version, I would get a black screen when I attempted to log in using that session. Unfortunately, the particular use case won't be fully fixed until we release a new Ubuntu 22.04.1 iso since Ubuntu desktop by default doesn't install non-security updates during the install. I may be able to work around that by updating osinfo-db to do that. And then people installing using GNOME Boxes or virt-manager should be good. ** Tags removed: verification-needed verification-needed-jammy ** Tags added: verification-done verification-done-jammy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971195 Title: gnome-remote-desktop leads to a session crash inside qemu with virtio- vga To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1971195/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1968590] Re: Gnome-shell memory at 682MB
I'm also seeing a large memory leak from gnome shell in 22.04. org.gnome.shell.extensions.dash-to-dock show-trash is set to false and I've made that change already a while back. It's continuing to leak memory. I've tracked the memory consumption over the last 2 weeks and it's leaking well over a gigabyte per day. It doesn't seem to leak anything while the PC is on without being actively used but during use it's leaking memory at a rate closer to 2GB/24h. I've attached a graph of the the memory that gnome-shell is using. (In case anyone's interested, I've uploaded the code for the plot as well as the data here, but without documentation: https://github.com/Emerentius/gnome_memory_leak_ubuntu_22.04) ** Attachment added: "figure.png" https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1968590/+attachment/5594129/+files/figure.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1968590 Title: Gnome-shell memory at 682MB To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/1968590/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972866] Re: [MIR] gsasl
** Description changed: - TDB by foundations + [Summary] + * Everything seems in order with this package, but it should + be reviewed by the security team due to the nature of the package. + * Build log: https://launchpadlibrarian.net/564514219/buildlog_ubuntu-jammy-amd64.gsasl_1.10.0-5_BUILDING.txt.gz - Also, most probably needs transitive MIR for libntlm + [Availability] + * The package is already available in Ubuntu universe and builds for the required architectures + + [Rationale] + * mutt (which is in main) used to depend on cyrus-sasl. Due to a + licensing conflict between mutt and cyrus-sasl, it has been updated + to use gsasl and drop the dependency on cyrus-sasl. This change + has been made in Debian. Mutt is used by a large part of our + user base, so continuing to provide it is important. + + [Security] + * Package gsasl and associated libraries do not have any + security red-flags, but should still be reviewed by + the security team due to the nature of the package (it + authenticates users to servers) + * No CVEs/security issues in this software in the past + * No `suid` or `sgid` binaries + * No executables in `/sbin` and `/usr/sbin` + * Package does not install services, timers or recurring jobs + * Package does not open privileged ports (ports < 1024) + + [Quality assurance - function/usage] + * The package works well right after install + + [Quality assurance - maintenance] + * The package is maintained well in Debian/Ubuntu and has not too many + and long term critical bugs open + * The package does not deal with exotic hardware we cannot support + + [Quality assurance - testing] + * The package runs a test suite on build time, if it fails + it makes the build fail + * The package runs an autopkgtest, and is currently passing + + [Quality assurance - packaging] + * debian/watch is present and works + * debian/control defines a correct Maintainer field + * This package does not yield massive lintian Warnings, Errors + * Full output of `lintian --pedantic`: + ``` + P: gsasl source: update-debian-copyright 2014 vs 2021 [debian/copyright:44] + P: gsasl source: very-long-line-length-in-source-file configure line 13808 is 704 characters long (>512) + P: gsasl source: very-long-line-length-in-source-file examples/openid20/README line 92 is 807 characters long (>512) + P: gsasl source: very-long-line-length-in-source-file examples/saml20/README line 171 is 1396 characters long (>512) + P: gsasl source: very-long-line-length-in-source-file ... use --no-tag-display-limit to see all (or pipe to a file/program) + ``` + * Lintian overrides are present, but ok because upstream does + not provide source-only tarballs + * This package has no python2 or GTK2 dependencies + * Packaging and build is easy. d/rules is concise and readable + + [UI standards] + * Application is end-user facing, Translation is present, via gettext + + [Dependencies] + * libgsasl-dev depends on a package from src:libntlm. MIR for + libntlm is here: https://bugs.launchpad.net/ubuntu/+source/libntlm/+bug/1976405 + + [Standards compliance] + * This package correctly follows FHS and Debian Policy + + [Maintenance/Owner] + * Owning Team will be foundations + * Team is not yet, but will subscribe to the package before promotion + * This does not use static builds + * This does not use vendored code + * The package successfully built during the most recent test rebuild + + [Background information] + * The Package description explains the package well + * Upstream Name is GNU SASL + * Upstream Link is https://www.gnu.org/software/gsasl/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972866 Title: [MIR] gsasl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gsasl/+bug/1972866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976181] Re: CVE-2021-28711 and CVE-2021-28712
** Changed in: linux-oem-5.14 (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976181 Title: CVE-2021-28711 and CVE-2021-28712 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-oem-5.14/+bug/1976181/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976406] [NEW] f2c-compiled program produces no output
Public bug reported: $ cat hello.f print *,"Hello, world" end $ f2c hello.f hello.f: MAIN: $ cat hello.c /* hello.f -- translated by f2c (version 20160102). You must link the resulting object file with libf2c: on Microsoft Windows system, link with libf2c.lib; on Linux or Unix systems, link with .../path/to/libf2c.a -lm or, if you install libf2c.a in a standard place, with -lf2c -lm -- in that order, at the end of the command line, as in cc *.o -lf2c -lm Source for libf2c is in /netlib/f2c/libf2c.zip, e.g., http://www.netlib.org/f2c/libf2c.zip */ #include "f2c.h" /* Table of constant values */ static integer c__9 = 9; static integer c__1 = 1; /* Main program */ int MAIN__(void) { /* Builtin functions */ integer s_wsle(cilist *), do_lio(integer *, integer *, char *, ftnlen), e_wsle(void); /* Fortran I/O blocks */ static cilist io___1 = { 0, 6, 0, 0, 0 }; s_wsle(&io___1); do_lio(&c__9, &c__1, "Hello, world", (ftnlen)12); e_wsle(); return 0; } /* MAIN__ */ $ gcc hello.c -lf2c $ ./a.out $ ProblemType: Bug DistroRelease: Ubuntu 20.04 Package: f2c 20160102-1 ProcVersionSignature: Ubuntu 5.4.0-113.127-generic 5.4.181 Uname: Linux 5.4.0-113-generic x86_64 NonfreeKernelModules: nvidia_modeset nvidia ApportVersion: 2.20.11-0ubuntu27.24 Architecture: amd64 CasperMD5CheckResult: pass CurrentDesktop: KDE Date: Tue May 31 22:15:02 2022 InstallationDate: Installed on 2021-03-27 (430 days ago) InstallationMedia: Ubuntu-Server 20.04.2 LTS "Focal Fossa" - Release amd64 (20210201.2) SourcePackage: f2c UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: f2c (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug focal -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976406 Title: f2c-compiled program produces no output To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/f2c/+bug/1976406/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971621] Re: package libnih-dbus1 1.0.3-6ubuntu2 failed to install/upgrade: package libnih-dbus1:amd64 (1.0.3-12) with field 'Multi-Arch: no' is not co-installable with libnih-dbus1 which has mul
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: libnih (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971621 Title: package libnih-dbus1 1.0.3-6ubuntu2 failed to install/upgrade: package libnih-dbus1:amd64 (1.0.3-12) with field 'Multi-Arch: no' is not co- installable with libnih-dbus1 which has multiple installed instances To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libnih/+bug/1971621/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1972866] Re: [MIR] gsasl
** Changed in: gsasl (Ubuntu) Milestone: None => ubuntu-22.10 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1972866 Title: [MIR] gsasl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gsasl/+bug/1972866/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976405] [NEW] [MIR] libntlm
Public bug reported: TBD by foundations ** Affects: libntlm (Ubuntu) Importance: Undecided Status: New ** Changed in: libntlm (Ubuntu) Milestone: None => ubuntu-22.10 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976405 Title: [MIR] libntlm To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libntlm/+bug/1976405/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976339] Re: Openssl update to 1.0.2g-1ubuntu4.20+esm3 Breaks Php Openssl_get_cipher_methods Function
Hi Paulo, Thank you for the fast fix. We don't have a test system for this. I have to check on a live one (VM) after creating a snapshot. This will be done the next evening (approx 20 hours from now). I will keep you informed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976339 Title: Openssl update to 1.0.2g-1ubuntu4.20+esm3 Breaks Php Openssl_get_cipher_methods Function To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1976339/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
SPIP 3.1 is no longer maintained upstream and Debian has not released fixes for CVE-2022-28959, CVE-2022-28960 and CVE-2022-28961 in Stretch. Therefore, I am not patching these CVEs in Bionic. ** Changed in: spip (Ubuntu) Status: New => In Progress ** Changed in: spip (Ubuntu) Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara (luis220413) ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28959 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28960 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-28961 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971185] Re: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy
** Patch added: "spip_bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+attachment/5594128/+files/spip_bionic.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971185 Title: Multiple vulnerabilities in Bionic, Focal, Impish and Jammy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/spip/+bug/1971185/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs