The default NFSv4 acls may be a poor choice on ZOL. This keeps biting
people unexpectedly, I wonder how many people this has affected and they
never spot it?
Thanks
** Also affects: zfs-linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you
I picked the last dataset given in the command output from an earlier,
but not the most recent, comment:
$ sudo zdb - srv/backups/millbarge/rpool/var/log 529
Dataset srv/backups/millbarge/rpool/var/log [ZPL], ID 39694, cr_txg 23197757,
554M, 274 objects, rootbp DVA[0]=<1:1d000d42000:1000>
** Changed in: dbus (Ubuntu)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1854314
Title:
Legacy directory /var/run in /lib/systemd/system/dbus.socket
Richard, I suggest going to https://askubuntu.com/ or #ubuntu on
irc.freenode.net for interactive help.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1804847
Title:
systemd=229-4ubuntu21.8
On Wed, May 27, 2020 at 04:22:03PM -, Tim Ritberg wrote:
> Or delete this insecure systemd config and use Xinetd direct.
The uucp-supplied xinetd configuration and systemd socket file are
identical: both bind to all addresses on the system.
If you want to run your uucp services on a specific
This may be the same issue as
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/1877504
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877183
Title:
segfault in mysql_server_end() from
** Changed in: openscap (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877696
Title:
[MIR] openscap
To manage notifications about this bug go to:
Thanks Tim for the extra details.
A quick summary:
- There's no systemd xinetd generator to create .socket and .service
files involved
- The uucp package provides both a .socket and .service file for uucp
with defaults that match the xinetd configuration.
- Indeed, the systemd unit file
** Information type changed from Private Security to Public Security
** Package changed: systemd (Ubuntu) => uucp (Ubuntu)
** Summary changed:
- Systemd xinetd generator forgets ip-binding
+ systemd uucp.socket listens to all addresses
** Changed in: uucp (Ubuntu)
Status: Confirmed =>
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880454
Title:
Google
To manage notifications about this bug go to:
On Sun, May 24, 2020 at 03:06:48PM -, Nik DuVall wrote:
> While working to set up an additional IP Address on the server from
> VMWare, somehow the MOTD is coming up with an extra IP Address that
> doesn't exist on the interface (172.16.50.7).
>
> MOTD + ifconfig output below demonstrating
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1155963
Title:
su crashed with SIGSEGV
To manage notifications about this bug go to:
Are you still having trouble with this file?
If you still have this file:
/var/lib/apt/lists/partial/us.archive.ubuntu.com_ubuntu_dists_bionic-backports_Contents-i386.gz
can you determine from looking at it if it looks remotely close to what was
expected?
The usual cause of this problem is
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1880168
Title:
Versions prior to 1.10.1 are susceptible to NXNSAttack
Joshua, it's not a typo, and not a missing dependency:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=674857#25
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1860826
Title:
On Sat, May 16, 2020 at 01:56:08AM -, Seth Arnold wrote:
> Sadly, journalctl doesn't have the dmesg from the previous boot:
I meant to say, journalctl's copy of dmesg from the previous boot doesn't
have the new debug output. Sorry.
Thanks
--
You received this bug notification because
Hello Colin, trying the zfs recv operation on the .3 dkms eventually
kills my system dead. There was nothing on the console. The cursor on
the console stopped blinking; I couldn't switch VTs. My ssh sessions
were hung. ping reported destination host unreachable.
It ran for about two and a half
This is my laptop; I followed Richard Laager's ZFS Root on Ubuntu
installation guide a year ago, which starts with using debootstrap, and
then installing what you want by hand after that. So, while this system
is used as a desktop, it doesn't have many of the usual tasksets
installed:
$ tasksel
Hello Michał, thanks for the bug report.
Canonical is a CNA that can assign CVEs, but we are limited in which
programs and which conditions we can assign numbers. For this issue,
please request a CVE from https://cveform.mitre.org/ .
Typically, command line parameters are assumed to be trusted
Hello Michał, thanks for the bug report.
Canonical is a CNA that can assign CVEs, but we are limited in which
programs and which conditions we can assign numbers. For this issue,
please request a CVE from https://cveform.mitre.org/ .
Thanks
--
You received this bug notification because you are
Hello Michał, thanks for the bug report.
Canonical is a CNA that can assign CVEs, but we are limited in which
programs and which conditions we can assign numbers. For this issue,
please request a CVE from https://cveform.mitre.org/ .
Thanks
--
You received this bug notification because you are
Hello Michał, thanks for the bug report.
Canonical is a CNA that can assign CVEs, but we are limited in which
programs and which conditions we can assign numbers. For this issue,
please request a CVE from https://cveform.mitre.org/ .
Thanks
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Hello Michał, thanks for the bug report.
Canonical is a CNA that can assign CVEs, but we are limited in which
programs and which conditions we can assign numbers. For this issue,
please request a CVE from https://cveform.mitre.org/ .
Typically, configuration files are assumed to be trusted
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Hello Colin, this looks promising for my arc_prune spinlock contention
problems:
https://github.com/openzfs/zfs/pull/10331
with some background here:
https://github.com/openzfs/zfs/issues/7559
This might have a simple ~dozen line fix! It's not yet reviewed by the
openzfs gurus but it sure
On Fri, May 15, 2020 at 12:41:37AM -, Brian Murray wrote:
> Use the "MY_MIRROR" environmental variable and you'll be happier with
> the output.
Oh that is a lot better:
$ MY_MIRROR=http://wopr/ubuntu/ ubuntu-security-status
1666 packages installed, of which:
1378 receive package updates with
Public bug reported:
Hello, while reporting a bug on focal against the update-manager source
package, I got an error:
$ ubuntu-bug update-manager-core
*** Collecting problem information
The collected information can be sent to the developers to improve the
application. This might take a few
Public bug reported:
Hello, on my focal machine, ubuntu-security-status reports that I'm
mostly unsupported.
sbeattie hypothesized this may be due to my use of a local mirror rather
than an official archive mirror.
$ ubuntu-security-status
1657 packages installed, of which:
26 receive package
** Description changed:
Hello, the Ubuntu Security Team would like the libopenscap8 binary
package from openscap promoted to main. libopenscap8 is incorporated
into the CVEscan snap: https://github.com/canonical/sec-
cvescan/blob/master/snapcraft.yaml
One wrinkle is that we'd like
Thanks Colin!
[ 271.628232] dnone_free_ramge: nblks = 0, trunc = 1, len =
18446744073709551615, blkshift = 0
[ 271.628297] dnode_free_range: nblks == 0, len == 18446744073709551615
, off=0
[ 271.628298] range_tree_clear: size == 0
[ 271.628375] range_tree_find_impl: size == 0
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878178
Title:
EPSON WF 3520 driver problem - PpdFiles: Error
To manage notifications
Here's the part that looks important; the whole dmesg is in the
attachment.
Thanks
[ 761.730488] dnone_free_ramge: nblks = 0, trunc = 1, len =
18446744073709551615, blkshift = 0
[ 761.730542] dnode_free_range: nblks == 0, len == 18446744073709551615
, off=0
[ 761.730543]
*** This bug is a duplicate of bug 1877821 ***
https://bugs.launchpad.net/bugs/1877821
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 1877821
xorg (Ubuntu) bug reporting guidelines:
--
You received this bug notification because
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878115
Title:
logged luks passwords
To manage notifications about this bug go
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877821
Title:
xorg (Ubuntu) bug reporting guidelines:
To manage notifications about this
** Information type changed from Private Security to Public Security
** Package changed: xorg (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877746
Title:
Lock
*** This bug is a duplicate of bug 1611737 ***
https://bugs.launchpad.net/bugs/1611737
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Hello, the Ubuntu Security Team would like the libopenscap8 binary
package from openscap promoted to main. libopenscap8 is incorporated
into the CVEscan snap: https://github.com/canonical/sec-
cvescan/blob/master/snapcraft.yaml
One wrinkle is that we'd like libopenscap8 from
Because the focal change wasn't picked up before 20.04 LTS's release,
groovy will probably need a fix, too, before these packages can be
released.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1877504
Title:
new version of libmysqlclient21 8.0.20-0ubuntu0.20.04.1 causes
This feels related to
https://bugs.launchpad.net/ubuntu/+source/rtkit/+bug/1875665 which was
filed by amd64 users.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876697
Title:
Yay, this appears to have been fixed in focal:
$ namei -l /etc/ssl/private/ssl-cert-snakeoil.key
f: /etc/ssl/private/ssl-cert-snakeoil.key
drwxr-xr-x root root /
drwxr-xr-x root root etc
drwxr-xr-x root root ssl
drwx--x--- root ssl-cert private
*** This bug is a duplicate of bug 1852747 ***
https://bugs.launchpad.net/bugs/1852747
** This bug has been marked a duplicate of bug 1852747
mdcheck_start.service trying to start unexisting file
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876928
Title:
no lock screen and no password prompt when laptop lid is opened.
** Tags added: focal
** Tags added: groovy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1852747
Title:
mdcheck_start.service trying to start unexisting file
To manage notifications about this
Hmm it doesn't look like it's packaged in another package, either:
$ apt-file search /usr/share/mdadm/mdcheck
$
And it doesn't appear to have just been moved out of /usr/share/:
$ apt-file search mdcheck | grep -v r-cran-rcmdcheck
mdadm: /lib/systemd/system/mdcheck_continue.service
mdadm:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876335
Title:
package lvm2 2.03.02-2ubuntu6 failed to install/upgrade: podproces
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876305
Title:
Open Gl error
To manage notifications about this bug go to:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876304
Title:
package libvdpau1 (not installed) failed to install/upgrade: dpkg-deb
Check also `systemctl cat ssh.service` and `systemctl cat
secondssh.service` -- sshd also accepts parameters on the commandline,
perhaps the port is being specified outside of the configuration files.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Hello Marc, interesting discovery. I can't figure out why the liquidwar
authors chose to package an exploit against an older version of their
game in their newer tarballs, but there it is.
It looks like a real exploit against 2003 slackware and gentoo builds of
the game; it's not really a false
** Information type changed from Private Security to Public Security
** Changed in: liquidwar (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1876121
Title:
On Wed, Apr 29, 2020 at 10:37:17PM -, Brian Murray wrote:
> the upgrade process for us. Subsequently, while the definition of the
> '-d' switch is incorrect for a short period of time I think its best
> that the '-d' switch is scary as setting the meta-release file's
> 'Supported' filed is an
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875521
Title:
kscreenlocker shows user applications when external display is
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875513
Title:
wifi is not showing in select networks
To manage notifications about this
Public bug reported:
Hello, I'd like to suggest that the do-release-upgrade -d command line
parameter should behave differently than it does.
At the moment, we aren't promoting focal upgrades to our existing bionic
and eoan users. This makes sense.
However, we have many enthusiast users who
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875299
Title:
Apache's mod_remoteip: IP address spoofing via X-Forwarded-For when
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875212
Title:
package shim-signed 1.40.3+15+1533136590.3beb971-0ubuntu1 failed to
** Package changed: shadow (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875034
Title:
login screen will put a character in the password box when pressing
key to
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875186
Title:
Booting continues despite three failed attempts if the root
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875038
Title:
Lock screen not really functioning - Gnome Shell extensions visible
On Fri, Apr 24, 2020 at 01:16:31PM -, Dimitri John Ledkov wrote:
> Include /run/ssh/sshd_config.d/*conf
> Include /etc/ssh/sshd_config.d/*conf
> Include /lib/ssh/sshd_config.d/*conf
> It would be nice if /etc/ssh only had the host keys, and no other
> default options.
This feels like it'd
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1874558
Title:
executing grub-install/dev/sda failed
To manage notifications about this
Use CVE-2020-12135.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12135
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
integer overflow in whoopsie 0.2.69
** Summary changed:
- flash end of life soon, suggest remove from focal
+ flash end of life soon, suggest remove from ganimal
** Description changed:
Hello, Adobe has said they will not be supporting Flash beyond 2020:
https://helpx.adobe.com/acrobat/kb/flash-format-support-in-pdf.html
Hello Colin, yes, this is still an open issue:
Linux wopr 4.15.0-91-generic #92-Ubuntu SMP Fri Feb 28 11:09:48 UTC 2020
x86_64 x86_64 x86_64 GNU/Linux
Apr 22 19:10:03 wopr zed[12576]: eid=8352 class=history_event
pool_guid=0xB3B099B638F02EEF
Apr 22 19:10:03 wopr kernel: VERIFY(size != 0)
Public bug reported:
Hello, it appears there's a syntax error in zsnapd:
Setting up python3 (3.8.2-0ubuntu2) ...
running python rtupdate hooks for python3.8...
/usr/share/zsnapd/scripts/zsnapd.py:116: SyntaxWarning: "is" with a literal.
Did you mean "=="?
if (__name__ is "__main__"):
running
Public bug reported:
I have been running focal out of date for a few weeks; today I upgraded
everything, and had trouble while doing the update. Hopefully this is
helpful:
sarnold@millbarge:~$ sudo apt upgrade
Reading package lists... Done
Building dependency tree
Reading state
Public bug reported:
Hello, there's currently three golang-n.nn packages in focal:
https://launchpad.net/ubuntu/+source/golang-1.12
https://launchpad.net/ubuntu/+source/golang-1.13
https://launchpad.net/ubuntu/+source/golang-1.14
Can we remove 1.12?
Tue 21 05:09:33 < vorlon> sarnold:
Frank, Michael made available a private build of the installer in a
separate snap channel, and it worked perfectly.
I don't know if this has made it into the 'release' channel of the
installer snap, but it's very promising.
Thanks
--
You received this bug notification because you are a member
Running under strace may change the execution environment enough that
it's not reflective of the actual error, but it's still worth a shot --
can you pastebin the whole auditd strace logs? That openat() line is
actually a success -- the error we're looking for will come from the
audit_set_pid(3)
I forgot to mention, my l2arc is used on the second pool on this system:
$ zpool iostat -v
capacity operations
bandwidth
pool alloc free read write read
write
Colin, thanks for the link to https://github.com/openzfs/zfs/issues/9966
; unfortunately I think that's a different problem, my meta use seems
less drastic than the github issue
arc_prune 41859269059
arc_meta_used 43590932168
arc_meta_limit
Andreas, this system is running 18.04 LTS, 0.7.5-1ubuntu16.8,
4.15.0-91-generic.
It has 128 gigs of ram; the workload is running ripgrep on an entire
unpacked Ubuntu source archive, roughly 193 million files, 3.8 TB of
data, on a single raidz1 ssd vdev.
So I have no illusions that this workload
Andrea, I've been running the v1 kernel for a day or so now:
[0.00] Linux version 5.4.0-24-generic (arighi@sita) (gcc version
9.3.0 (Ubuntu 9.3.0-10ubuntu1)) #28+lp1861359v1 SMP Wed Apr 15 14:49:33
UTC 2020 (Ubuntu 5.4.0-24.28+lp1861359v1-generic 5.4.30)
$ uptime
02:21:45 up 1 day, 9
Writing 8589934592 (eight gigs) into the zfs_arc_dnode_limit seemed to
make an improvement: the arc_prune threads would periodically spike
above 20% CPU use, but would return to 2-5% CPU use quickly; it worked
well for a long time, perhaps even hours, before all the arc_prune
threads returned to
Thanks Colin,
I believe that bountysource.com url is a scrape of
https://github.com/openzfs/zfs/issues/6223
I hadn't seen much of this information before.
Sadly my machine doesn't have enough memory to just keep turning up the
knobs -- the working set far exceeds the memory of my computer.
A
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873308
Title:
ssl error :ssl_choose_client_version:unsupported protocol
To manage
I had success with https://launchpad.net/~mwhudson/+snap/subiquity-
hack/+build/908976
Thanks Michael!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861369
Title:
install failed crashed with
Funny, our tooling also collected these lintian messages, in a different
spot:
python3-rtslib-fb_2.1.71-0ubuntu1_all.deb:
W: python3-rtslib-fb: binary-without-manpage usr/bin/targetctl
W: python3-rtslib-fb:
maintainer-script-should-not-use-update-alternatives-remove postrm:6
Thanks
--
You
Two .crash files, one trying to configure LVM, one not trying to
configure LVM.
** Attachment added: "sarnold-power9.tar.gz"
https://bugs.launchpad.net/subiquity/+bug/1861369/+attachment/5354279/+files/sarnold-power9.tar.gz
--
You received this bug notification because you are a member of
I'm starting to look at python-rstlib-fb and lintian (from bionic)
reported:
Output of lintian:
W: python-rtslib-fb source: debhelper-compat-file-is-missing
W: python-rtslib-fb source: package-uses-deprecated-debhelper-compat-version 1
E: python-rtslib-fb source:
Frank, I'm sorry to say that bug 1872783 'masked' this bug for me. I
couldn't reproduce 1872783 to get logs, but at the same time, found that
this one is still happening.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "IMG_20200413_221013.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353991/+files/IMG_20200413_221013.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "IMG_20200413_221000.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353990/+files/IMG_20200413_221000.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Hello, I believe my previous bug may have been addressed:
https://bugs.launchpad.net/subiquity/+bug/1861369
However, the installer now appears to be stuck trying to remove LVM
configs left over from previous installs. The python portions are just
stuck doing repeated epolls,
** Attachment added: "IMG_20200413_221035.jpg"
https://bugs.launchpad.net/ubuntu/+source/subiquity/+bug/1872783/+attachment/5353992/+files/IMG_20200413_221035.jpg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This is an awkward case, I'm not sure we've got a perfect plan here.
u-boot has been in main for a while; a previous release did need to go
through -security but it appears it wasn't for security reasons:
https://launchpad.net/ubuntu/+source/u-boot/2016.01+dfsg1-2ubuntu3
The rpi family does not
Wonderful, thanks Jamie.
** Changed in: grub2-signed (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872045
Title:
package grub-efi-amd64-signed
Thanks Balint! I gave a very quick read to the 2.2 debdiff and couldn't
spot the fix, though -- I'd just like to double-check that the fix made
it to the packaging.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
/var/lib/dpkg/info/grub-efi-amd64-signed.postinst: 23: Syntax error:
word unexpected (expecting ")")
Michael, could you attach your /var/lib/dpkg/info/grub-efi-
amd64-signed.postinst to this bug report? I'm curious what happened
here.
Thanks
** Information type changed from Private Security to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
701 - 800 of 6636 matches
Mail list logo