** Package changed: apparmor (Ubuntu) => policykit-1 (Ubuntu)
** Bug watch added: Debian Bug tracker #1093276
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093276
** Also affects: policykit-1 (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1093276
Importance: Unknown
** Changed in: rsync (Ubuntu Trusty)
Status: New => In Progress
** Changed in: rsync (Ubuntu Xenial)
Status: New => In Progress
** Changed in: rsync (Ubuntu Bionic)
Status: New => In Progress
** Changed in: rsync (Ubuntu Focal)
Status: New => In Progress
** Changed i
Thanks for taking the time to report this bug and helping to make Ubuntu better.
I'm sorry for the inconvenience and as my colleague above mentioned we are
monitoring the issue and working on getting the fix for it into the affected
Ubuntu releases asap.
Feel free to report any other issues you m
Hi Tobias,
Thanks for reporting it! Indeed there seems some service was stuck and
not syncing some dbgsym. Some hours ago the service was restarted and it
started syncing the missing files. Could you confirm that you can now
get the debug symbols you need?
--
You received this bug notification b
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/2076129
Title:
apt-get crashed with SIGBUS in XXH3_64bits_update()
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
i got an additional error right here. Some syntax error:
==> root@eduapps:/home/eduardo# software-properties-gtk --open-tab=4
/usr/lib/python3/dist-packages/softwareproperties/gtk/DialogMirror.py:197:
SyntaxWarning: invalid escape sequence '\.'
elif
re.match("^((ftp)|(h
** Changed in: systemd (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/2055270
Title:
Buy Tramadol Online At Lowest Prices
Status in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python-apt in Ubuntu.
https://bugs.launchpad.net/bugs/2039217
Title:
python apt Cache(memonly=True) does n
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Both CVEs are already in our tracker[1][2]. We don't consider this
issue to be a critical and have rated it to medium Priority [3]. Currently
there are no fix available on upstream for those CVEs, see [4].
Since th
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: gst-plugins-bad1.0 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net/bugs/2035585
Title:
Versions in Ubuntu 20.0
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This is now released with usg 20.04.17
** Changed in: usg
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1989731
Title:
Non-root
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1842320 ***
https://bugs.launchpad.net/bugs/1842320
I had the same issue
Trip Ericson (rovfan) tutorial solved it.
Thank you so much;
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to init
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better.
This is low priority CVE for us, it will only get patched if a higher
priority CVE for sqlite3 in 22.04 shows up. Right now there are none,
therefore no ETA.
** Description changed:
I have ubuntu 22.04 on my syste
** Project changed: ubuntu-security-certifications => usg
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1989731
Title:
Non-root user unable to change own password if pam_pwhi
** Changed in: libxml2 (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
https://bugs.launchpad.ne
** Information type changed from Private Security to Public Security
** Changed in: cups (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi Joshua and Pedro,
Have you reported the side effects of the fix to those projects you mentioned?
If yes could you add the bug reports here?
thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gdk-pixbuf in Ubuntu.
http
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
In case anyone rebooted (like me) and ended up with a message like:
"Kernel Panic - not syncing: VFS: Unable to mount root fs on unknown-
block(0,0)"
Just go to the grub menu, select Advanced Options > pick a previous
kernel and boot, once you get the terminal, type:
sudo dpkg --configure -a
Or
@iogui, every system I've tried works well with that workaround (4
installations with Ubuntu 20.04). Please reinstall language-pack-pt-base
an try again.
Yes, it is a binary file, a gettext .po compiled into a .mo. The sed is a quick
workaround that works fine for me even with the binary. If you
** Changed in: language-pack-pt-base (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to language-pack-pt-base in
Ubuntu.
https://bugs.launchpad.net/bugs/1932579
Title:
snap pt_BR locale
** Also affects: language-pack-pt-base (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to language-pack-pt-base in
Ubuntu.
https://bugs.launchpad.net/bugs/1932579
Title:
sna
** Changed in: ntp (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1891953
Title:
CVE-2019-8936
Status in ntp package in Ubun
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
muito obrigado do fundo do <3
Best Regards,
Eduardo Barbosa
eduardo.cm...@gmail.com
ProblemType: Bug
DistroRelease: Ubuntu 20.10
Package: xorg 1:7.7+19ubuntu15
ProcVersionSignature: Ubuntu 5.8.0-41.46-generic 5.8.18
Uname: Linux 5.8.0-41-generic x86_64
.tmp.unity_support_test.0:
Appo
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: libxml2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
https://bugs.launchpad.net/bugs/1895839
Title:
CVE-2020-24977
Status in libxml2 package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
No fan detected
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: xorg 1:7.7+19ubuntu14
ProcVersionSignature: Ubuntu 5.4.0-48.52-generic 5.4.60
Uname: Linux 5.4.0-48-generic x86_64
.tmp.unity_support_test.0:
ApportVersion: 2.20.11-0ubuntu27.9
Architecture: amd64
BootLog
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiquity (not installed)
ProcVersionSignature: Ubuntu 5.4.0-42.46-generic 5.4.44
Uname: Linux 5.4.0-42-generic x86_64
NonfreeKernelModules: nvidia_modeset nvidia
ApportVersion
ug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubu
ernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroReleas
these ones:
https://bugzilla.kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Edu
bugzilla.kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType:
206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Pac
bugzilla.kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
these ones:
https://bugzilla.kernel.org/show_bug.cgi?id=206873
https://bugzilla.kernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the
solution for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ernel.org/show_bug.cgi?id=206543
Since it should be fixed in recent kernel versions, I guess the solution
for Ubuntu 20.04 using 5.4 kernel is backporting the fixes.
Is Ubuntu planning to do this?
Thanks
Eduardo
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: ubiq
** Summary changed:
- Will not logout or shutdown form guest-session
+ Will not logout or shutdown from guest-session
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1855350
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1885496
Title:
Bluetooth is disabled in gui, but audio re
I can confirm that the error persist on Ubuntu 20.04 LTS with headphones
LE-Bose AE2 SoundLink.
Disabling voice prompts (as Daniel van Vugt mentioned in comment #8)
helps a lot, but still there is a whistle but no "call from" voice
anymore.
--
You received this bug notification because you are a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Original fix suggestion came from
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860697/comments/6
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1866890
Title:
I added `options snd-hda-intel dmic_detect=0`
at the end of /etc/modprobe.d/alsa-base.conf
and after restarting the laptop I can now use the headphones and speakers.
Although I managed to fix this,
- could this be resolved for other users?
Many thanks!
Eduardo
--
You received this bug
Seems similar to
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860697
** Package changed: ubuntu => alsa-driver (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.ne
This is the same as bug #1862364
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1862770
Title:
MySQL autopkgtest regressed in Focal release pocket
Status in mysql-8.0 pack
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1799215 ***
https://bugs.launchpad.net/bugs/1799215
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
** Also affects: cups (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1850032
Title:
scanbd prevents HP printers to work c
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1814596
Title:
DynamicUser can create setuid binaries when a
** Changed in: jackd2 (Ubuntu)
Status: New => Confirmed
** Changed in: jackd2 (Debian)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to jackd2 in Ubuntu.
https://bugs.launchpad.net/bugs/1
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks Luca for all the help and contribution, the fix is released. Feel
free to contact us in case of new issues.
** Changed in: zeromq3 (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is s
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1806961 ***
https://bugs.launchpad.net/bugs/1806961
** This bug has been marked a duplicate of bug 1806961
Lock can be circumvented by switching tty when using lightdm
** Information type changed from Private Security to Public Security
--
You received
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: krb5 (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to krb5 in Ubuntu.
https://bugs.launchpad.net/bugs/1814501
Title:
pack
Thanks Luca,
The packages are being uploaded and should be available in the archive in a few
minutes.
Thanks
** Changed in: zeromq3 (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is sub
** Changed in: zeromq3 (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
Status in
Thanks for opening the ticket and attaching the patch.
I've generated a new version for bionic and cosmic, both can be found here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=zeromq3
Would anyone mind testing it before we release it?
Thanks
-
Thanks for opening the ticket and attaching the patch.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
Status in zeromq3 pack
** Changed in: zeromq3 (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to zeromq3 in Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Ti
** Tags added: community-security
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1806961
Title:
Lock
Hi smurfendrek,
Please check jarnos comment #89, you need to use light-locker, using dm-tool
for lock is not recommended.
You could also try with other screen lockers program.
Also this is an old bug, if you are still experiencing the problem, please open
a new bug.
I am unsubscribing the securi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This started happening after installing lubuntu-desktop. Even after
removing it, it is still failing to mount. After running "keyctl link @u
@s", it works.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
htt
Note: I'm using 18.04
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1718658
Title:
ecryptfs-mount-private fails to initialize ecryptfs keys
Status in ecryptfs-utils pack
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
Message error
ProblemType: Package
DistroRelease: Ubuntu 18.04
Package: libgmp10 2:6.1.2+dfsg-2
ProcVersionSignature: Ubuntu 4.15.0-36.39-generic 4.15.18
Uname: Linux 4.15.0-36-generic x86_64
ApportVersion: 2.20.9-0ubuntu7.4
Architecture: amd64
Date: Wed Oct 3 09:05:41 2018
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1789630
Title:
package systemd-sysv 237-3ubuntu10.3 failed to in
*** This bug is a duplicate of bug 1652282 ***
https://bugs.launchpad.net/bugs/1652282
I have a similar problem not using Wayland. Ubuntu 18.04.1
eduardo@MiPcLinux:~$ sudo gparted
[sudo] contraseña para eduardo:
Unit -.mount does not exist, proceeding anyway
it was resolved, the problem resolved remove teamviewer package, that
package blocks after that update (and teamviewer update also).
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/
Public bug reported:
Description:Ubuntu 14.04.5 LTS
Release:14.04
libc-bin:i386 2.19-0ubuntu6.14
after update libc-bin any usb dont work preperly, (usb storage dont
automount, wifi usb dont work (term and networkmanager), bt dongle too),
usb modem (dont connect)
before update all wo
** Changed in: kolla
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dh-python in Ubuntu.
https://bugs.launchpad.net/bugs/1759796
Title:
Ubuntu images fail to build due to broken dh-python
1 - 100 of 181 matches
Mail list logo