sto caricando ubuntukylin 14.10.posso continuare?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1265192
Title:
Install/reinstall wipes out all/other partitions
To manage notifications about this
corrego,sto salvando file,sono in download.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1265192
Title:
Install/reinstall wipes out all/other partitions
To manage notifications about this bug go
** Changed in: lxkeymap
Status: Fix Committed = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/945603
Title:
lxkeymap crashed with IndexError in finish_initializing(): list index
..
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839798
Title:
package libdrm-radeon1:i386 2.4.97-1ubuntu1~18.04.1 failed to
install/upgrade: package libdrm-radeon1:i386 2.4.97-1ubuntu1~18.04.1
Public bug reported:
..
ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: libdrm-radeon1:i386 2.4.97-1ubuntu1~18.04.1
ProcVersionSignature: Ubuntu 4.15.0-20.21-generic 4.15.17
Uname: Linux 4.15.0-20-generic x86_64
NonfreeKernelModules: wl
ApportVersion: 2.20.9-0ubuntu7
Architecture:
*** This bug is a security vulnerability ***
Public security bug reported:
Ubuntu implements so much security one way or another. So much defenses
against network level man in the middle or malicious proxies or wifi
hotspots. Cryptographic verification generally works well but there is
one big
No need to keep this private. Has been publicly discussed but without
proper bug report and the discussion felt into oblivion.
http://ubuntu.5.n6.nabble.com/authenticated-NTP-td4486136.html
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
I have some ideas ideas...
There is already ntp.ubuntu.com, can you add authentication?
Ubuntu has importance. Can you officially ask the NTP pool if they could
add authentication?
Can you publicly the problem somewhere? A blog post?
I am sure some NTP server volunteers would like to add
NTP has public and private keys. http://doc.ntp.org/4.1.0/genkeys.htm
Just like SSL, gpg, etc.
Of course ntp.ubuntu.com and other server owners keep their private key
secure.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to ntp in
I also like to appeal this decision.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/390508
Title:
notifyOSD ignores the expire timeout parameter
To manage notifications about this bug go to:
I have some ideas ideas...
There is already ntp.ubuntu.com, can you add authentication?
Ubuntu has importance. Can you officially ask the NTP pool if they could
add authentication?
Can you publicly the problem somewhere? A blog post?
I am sure some NTP server volunteers would like to add
NTP has public and private keys. http://doc.ntp.org/4.1.0/genkeys.htm
Just like SSL, gpg, etc.
Of course ntp.ubuntu.com and other server owners keep their private key
secure.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
Version: Ubuntu Server 12.04 CD
Test 1:
d-i netcfg/enable boolean false
Test 2:
d-i netcfg/enable boolean false
d-i netcfg/dhcp_options select \Do not configure the network at this time\
Test 3:
d-i netcfg/enable boolean false
d-i netcfg/dhcp_options select \Do not
Whats the status of this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/53887
Title:
[patch] Command completion should be enhanced
To manage notifications about this bug go to:
Public bug reported:
Hello,
two-line summary:
I propose to create a /etc/bash.d/ directory for files that need to be read
when starting a non-login shell.
longer version:
Files in /etc/profile.d/ are sourced for _login shells_ (in other words:
whenever /etc/profile is read). That works fine
Still interested...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/296800
Title:
[needs-packaging] Netactview
To manage notifications about this bug go to:
Public bug reported:
Tor Browser is an anonymity, security and privacy oriented browser based
on Mozilla Firefox from torproject.org. https://www.torproject.org/
Tor is the last serious anonymity network. Tor is the only option for
non-criminals to speak freely and anonymously. All other
https://bugzilla.icculus.org/show_bug.cgi?id=5460 says it's fixed
upstream. Any updates here?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/997212
Title:
Openbox crashing X.org, running GTK 3.4
*** This bug is a security vulnerability ***
Public security bug reported:
Ubuntu implements so much security one way or another. So much defenses
against network level man in the middle or malicious proxies or wifi
hotspots. Cryptographic verification generally works well but there is
one big
No need to keep this private. Has been publicly discussed but without
proper bug report and the discussion felt into oblivion.
http://ubuntu.5.n6.nabble.com/authenticated-NTP-td4486136.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I had the same problem in a fresh copy of Ubuntu 16.04 running as a
VMWare Guest.
I followed the instructions as #24. Everything works now. Thanks a lot
for the instructions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
@You-Sheng Yang
Is this bug a duplicate/related to these?
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1855637
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1858077
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I have a Lenovo Yoga S730 (marketed as Lenovo ideapad 730s in the US,
mine is European) with the 9260 card and I can confirm that the same
issue affects me.
The wifi works fine in Windows 10. The only way I've managed to resolve
the issue is by adding 11n_disable=1, but this caps my speed to 54mb
Public bug reported:
My Ubuntu version: 20.04.3 LTS
Package version: 0.188
According to the manpages, "pull-lp-source" script should parse environment
variables or devscripts file to override package-wide variables.
However, this is not working for me. For instance, when I set the
environment
** Changed in: openssl (Ubuntu)
Status: Incomplete => Won't Fix
** Changed in: apache (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to a duplicate bug report (857636).
Old bug...
I think the error comes from
base-passwd függőségek: libc6 (>= 2.8); ám:
libc6 rendszeren lévő verziója 2.8~20080505-0ubuntu9
which translates to
base-passwd függőségek: libc6 (>= 2.8); ám:
libc6 rendszeren lévő verziója 2.8~20080505-0ubuntu9
And then bash pre-depends on libc6 >=
I'm not seeing that behaviour on a 23.04 system and I expect it to be
the same since 22.04 at least. As such I'm going to mark this as Fix
Released.
** Changed in: openssl (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
** Changed in: openssl (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to a duplicate bug report (857636).
https://bugs.launchpad.net/bugs/795355
Title:
Intermittent SSL connection faults when
Thanks for the report. I am reluctant to backport this as I'm not sure
it makes a lot of sense system-wide. Curl upstream didn't seem happy
with enabling this work-around even in 2021. It seems the reason to
integrate this would be to be able to ignore this despite curl not
ignoring it nor
There are several reasons a program can skip loading the openssl
configuration unfortunately: env vars pointing to another file, apparmor
preventing loading, library initilization skipping it, ...
Is the program that ignores the openssl configuration file in the Ubuntu
archive? Or public?
--
Graham pointed out that the upload was actually to unstable and
therefore autosync'ed already!
I'm going to keep the bug open until it migrates due to the possibility
of some testsuite failures.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Public bug reported:
Xz-utils 5.6.0 was released last Friday. It features a much faster
decompression code on all platforms but on x86_64 in particular, it is
60% faster in my testing. It also aligns better current practices of
enabling multi-threading by default (always with a default memory
Thanks for continued investigation.
A reproducer would be valuable as it would allow me to verify
independently the patch is effective, within the limits of the
understanding of the situation of course and that can be especially
time-consuming when not having access to the remote server. :/
A
** Changed in: openssl (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058017
Title:
openssl is not LTO-safe
To manage notifications about this
** Changed in: openssl (Ubuntu)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056593
Title:
[FFE] FIPS compatibility patches
To manage notifications about
** Summary changed:
- [FFe] openssl is not LTO-safe
+ openssl is not LTO-safe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058017
Title:
openssl is not LTO-safe
To manage notifications about
I did some additional tests too in a noble container.
With/without the env var to set the file location, including with the
file missing, with/without the env var to force FIPS mode, and using
values 0, 1, 42, -42, a.
By the way, note that access to these environment variables uses
** Description changed:
tl;dr: since it's too much work to make openssl LTO-safe, upstream
doesn't see it as a goal and doesn't test it, and there are probably no
performance gains to LTO for this package.
Openssl is an old project and the codebase wasn't written with aliasing
rules
** Description changed:
tl;dr: since it's too much work to make openssl LTO-safe, upstream
doesn't see it as a goal and doesn't test it, and there are probably no
performance gains to LTO for this package.
Openssl is an old project and the codebase wasn't written with aliasing
rules
Thanks a lot for looking at this. The issue seems fixed on my machine.
There are currently several changes being prepared for openssl and I
think I'd rather batch them considering the state of the CI queue but
this will definitely go into Noble. Thanks again.
--
You received this bug
Public bug reported:
tl;dr: since it's too much work to make openssl LTO-safe, upstream
doesn't see it as a goal and doesn't test it, and there are probably no
performance gains to LTO for this package.
Openssl is an old project and the codebase wasn't written with aliasing
rules in mind. There
** Changed in: openssl (Ubuntu)
Milestone: None => ubuntu-24.04
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Adrien Nader (adrien-n)
** Changed in: openssl (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member
** Description changed:
tl;dr: since it's too much work to make openssl LTO-safe, upstream
doesn't see it as a goal and doesn't test it, and there are probably no
performance gains to LTO for this package.
Openssl is an old project and the codebase wasn't written with aliasing
rules
** Summary changed:
- openssl is not LTO-safe
+ [FFe] openssl is not LTO-safe
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058017
Title:
[FFe] openssl is not LTO-safe
To manage notifications
** Description changed:
We have an open MR with a handful of FIPS compatibilty changes we wore hoping
to get into 24.04. The main purpose of the changes is to detect whether the
kernel is running in FIPS mode and adjust the behavior of the library
accordingly by loading the correct
Hey,
I think everything in the gnutls/ directory should be allowed: there can
be profiles with arbitrary names (or at least alnum I guess) which
define priority/configuration strings that can be used by gnutls
applications. I'm not aware of anything else that typically goes there
but I haven't
Public bug reported:
eso-midas fails to build from source on all architectures at the moment,
and the issue is reproducible locally.
The failure looks like:
# of pixels used = 843920 from 1,1 to 880,959 (in pixels)
FITS file newVIMOS.fits will have 4 extensions
*** buffer overflow
This is currently blocking texlive-bin, fftw3, python3-defaults,
readline, ghostscript; all on armhf only. I think the previous build
(before a no-change rebuild against cfitsio) was passing on other
arches.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Public bug reported:
pyxplot fails to build from source on all architectures at the moment,
and the issue is reproducible locally.
The failure looks like:
python3 makeFigureEps.py ../bin/pyxplot
# Best fit parameters were:
# -
a1 = -1.2602846
a3 =
I had forgotten about this bug. Thanks for bringing this up and let me
close this.
** Changed in: xz-utils (Ubuntu)
Status: New => Invalid
** Description changed:
+ NOTE: THE VERSION MENTIONED HERE HAS BEEN BACKDOORED.
+ I am keeping the text below unchanged due to its possible
** Description changed:
+ NOTE: THIS IS AN ATTEMPT AT INCLUDING A BACKDOOR. THIS IS LEFT FOR
+ HISTORICAL PURPOSES ONLY AND MUST NOT BE DONE.
+
+
Please sync xz-utils 5.6.1-1 (main) from Debian unstable (main)
Hello! I am one of the upstream maintainers for XZ Utils. Version 5.6.1
was
Due to openssl's release schedule, 24.04 Noble Numbat will still use
3.0. It will be 3.0.13 unless a 3.0.14 is released very soon.
After Noble Numbat is released, I will work on openssl 3.3 for the
subsequent Ubuntu release. It is not yet released but will be soon so I
might start with beta/RC.
I'm going to target this to 24.10 as it's the first time it will be
possible to "solve" it. As far as I understand, there will probably be
performance loss with 3.3 compared to 1.1 but it's going to be a long
tail rather than a few big changes which have been included in 3.1, 3.2
and 3.3.
Btw,
** Changed in: libtracefs (Ubuntu)
Assignee: (unassigned) => Adrien Nader (adrien-n)
** Changed in: libtracefs (Ubuntu)
Status: New => In Progress
** Changed in: libtracefs (Ubuntu)
Milestone: None => ubuntu-24.04
--
You received this bug notification because you are
I'm working on this and mostly finishing the changes. I think all
comments in Christian's messages are addressed.
Tests work. Valgrind tests are used and not too slow. Tests and build
must run in VMs and not containers. I have published the changes in a
PPA (
Public bug reported:
Autopkgtests for request-tracker4 (and 5 it seems) fail on all arches
and due to the recent changes around test environments and the use of
all-proposed, it's difficult to identify which package change is
responsible.
I actually see some passes on amd64 and arm64 but due to
I'll dive deeper into this. The timing collides with the t64 transition
so that makes me curious. Moreover, Debian reverted to 5.4.5 so the
situation where we're on 5.6.0 doesn't match Debian either.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I carried this forward.
In a Noble LXD container, the test setup doesn't work.
In a Noble LXD VM, three tests fail: tracefs_iterate_snapshot_events, ,
and uprobes.
The first and second tests fail because they try to sched_setaffinity()
across 8 cores which the VM host has but the VM itself has
** Also affects: openssl (Ubuntu Noble)
Importance: Undecided
Status: Confirmed
** Also affects: openssl (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Mantic)
Importance: Undecided
Status: New
** Changed in: openssl (Ubuntu
** Changed in: libtracefs (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055309
Title:
No test suite run at built time nor as autopkgtest
To manage
Matching MR is up:
https://code.launchpad.net/~adrien-n/ubuntu/+source/libtracefs/+git/libtracefs/+merge/464434
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051925
Title:
[MIR] promote libtracefs
Public bug reported:
Please allow the merge and upload of
https://code.launchpad.net/~adrien-n/ubuntu/+source/gnutls28/+git/gnutls28/+merge/464535
.
I made the commit message there quite complete so I'm basically copying
that here. In a few words, this is meant to include as many fixes as
I just got test results on amd64 and arm64.
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-adrien-n-noble-
libtracefs-mir/noble/amd64/libt/libtracefs/20240416_142558_e8175@/log.gz
https://autopkgtest.ubuntu.com/results/autopkgtest-noble-adrien-n-noble-
Still working on it. I'm only cleaning up the changes but I've been
having issues with the autopkgtest infrastructure since the beginning of
the week (if I trigger tests within "too" quickly, the testbed setup
fails).
Status is:
- amd64 and arm64 pass,
- ppc64el fails with 2, 3, or 4 failures,
-
Public bug reported:
I would like to have the most recent openssl version possible in Noble.
For that I am requesting to upload all the commits in the openssl-3.0
branch that follow 3.0.13 which is already in the archive.
I would like to include 3.0.14 afterwards if feasible. Having the most
Note that there is a CVE fix in there too. It's low-severity because
it's only unbounded memory growth but it's quite easy to trigger and I
think that anyone who has a webserver with TLS 1.3 will want it patched.
Therefore there should be an upload of this at least.
--
You received this bug
** Tags added: rls-oo-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062119
Title:
autopkgtests fail on ppc64el
To manage notifications about this bug go to:
** Tags added: rls-oo-incoming
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062118
Title:
autopkgtests fail on s390x (segfault)
To manage notifications about this bug go to:
** Changed in: gnutls28 (Ubuntu)
Status: Triaged => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062018
Title:
[FFe] gnutls28: merge 3.8.5-2 and backport RSAES-PKCS1-v1_5 fix
To
** Changed in: openssl (Ubuntu)
Status: Triaged => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062167
Title:
[FFe] openssl: post-3.0.13 changes from git
To manage notifications about
** Changed in: openssl (Ubuntu)
Milestone: None => ubuntu-24.10
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1297025
Title:
Either the changelog.gz is missing or there is an erroneous link in
AFAIU there is no issue in the package at the moment so I'll close the
report. Thanks for investigating and trying the package reinstallation.
(Also, Alex, impressive intuition!)
** Changed in: openssl (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are
*** This bug is a duplicate of bug 1297025 ***
https://bugs.launchpad.net/bugs/1297025
** This bug has been marked a duplicate of bug 1297025
Either the changelog.gz is missing or there is an erroneous link in the
libssl1.0.0 package
--
You received this bug notification because you are
I plan to work on this during the OO cycle. It's an issue inherited from
Debian AFAIU.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1297025
Title:
Either the changelog.gz is missing or there is an
Build now fails on all arches with
# of pixels used = 843920 from 1,1 to 880,959 (in pixels)
FITS file newVIMOS.fits will have 4 extensions
*** buffer overflow detected ***: terminated
This is the same issue as back in March when this bug was created (I had seen
the issue and found
Removed the request to badtest this (it was denied anyway).
** Description changed:
Autopkgtests for request-tracker4 (and 5 it seems) fail on all arches
and due to the recent changes around test environments and the use of
all-proposed, it's difficult to identify which package change is
For reference, backtrace of the issue (I've inserted a call to gdb for
"prepa.exe" in the "inmidas" shell script. There are tons of fortify
warnings during build. Also, note that the Debian maintainer disabled
implicit function declarations, citing that the code is very old, and
indeed, it started
Public bug reported:
Please remove eso-midas.
eso-midas FTBFS on all architectures due to a crash when running its
testuite (which it does during package building), this is the issue
described in https://bugs.launchpad.net/ubuntu/+source/eso-
midas/+bug/2058971 . It was first noticed with time_t
unsuscribe
On Mon, Oct 20, 2008 at 5:22 PM, fabio.oberto
[EMAIL PROTECTED]wrote:
unsuscribe
Paquito ha scritto:
unsubscribe
On Mon, Oct 20, 2008 at 10:47 AM, befamao [EMAIL PROTECTED]
wrote:
unsubscribe
2008/10/20 BUGabundo [EMAIL PROTECTED]
I've reported the
yes still i tride another linux like freespir it ok the problim on
ubuntu
On 6/6/08, Chris Cheney [EMAIL PROTECTED] wrote:
Do you still have this problem with openoffice.org 1:2.4.1~rc2-1ubuntu1
in hardy-proposed? If so can you include the file that is showing the
problem?
Thanks,
Chris
slow scroll in OPEN OFFICE CALC and it hang.
I have a table of 9 column 450 rows full with data it is vary slow to scroll in
it put whin i convaret the same table to .xls and i open it on M$office it was
fine.
My file size 49KB 150KB .xls
--
open office is very slow as hang
Public bug reported:
Binary package hint: gwibber
I added a facebook account and a twitter account but no information are
dispplayed inside gwibber. Any help will be appreciated.
Regards
** Affects: gwibber (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug
82 matches
Mail list logo