** Changed in: glibc (Ubuntu Xenial)
Assignee: Adam Conrad (adconrad) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1812313
Title:
SKX Gold 6129,Platinum 8168 cpu frequency thr
** Changed in: dpkg (Ubuntu Xenial)
Assignee: Adam Conrad (adconrad) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856369
Title:
[SRU] Add riscv64 support to cputable for xenia
One already exists for that, it was pointed out in #17 - LP:1186793
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1464064
Title:
Ubuntu apt repos are not available via HTTPS
To manage notifications
For those following at home, per LP:1464064, the Ubuntu Archive, Ports,
and Security updates are now available via HTTPS. It is opt-in and not
enabled by default.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.n
Also, for those interested, there has been work involved in splitting
off Ubuntu Archive and Security updates so that they're on their own
dedicated servers/VMs. Ubuntu Ports to follow - as it is right now it is
on the same set of servers hosting cdimage, releases, old-releases, and
various other U
** Changed in: ubuntu
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1186793
Title:
Updating is over insecure connection
To manage notifications about this b
The changes made were enabling HTTPS for the main Ubuntu Archive
(archive.ubuntu.com, us.archive.ubuntu.com, {gb,uk}.archive.ubuntu.com),
Ubuntu Ports (ports.ubuntu.com, {gb,uk}.ports.ubuntu.com), and Security
updates (security.ubuntu.com). These are operated by Canonical.
We still have some commu
** Changed in: ubumirror (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1776546
Title:
Yakkety packages are missing from old-releases.ubuntu.com
To manage
** Changed in: ubumirror (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1838526
Title:
old-releases.ubuntu.com unreachable via IPv6
To manage notification
** Changed in: ubuntu
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1186793
Title:
Updating is over insecure connection
To manage notifications about this b
** Changed in: ubuntu-geoip (Ubuntu Trusty)
Status: Triaged => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1617535
Title:
geoip.ubuntu.com does not utilize HTTPS
To manage notifi
** Changed in: ubuntu
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1464064
Title:
Ubuntu apt repos are not available via HTTPS
To manage notifications abou
| $ ls /etc/update-motd.d/50-landscape-sysinfo -la
| lrwxrwxrwx 1 root root 46 Jul 16 15:49
/etc/update-motd.d/50-landscape-sysinfo ->
/usr/share/landscape/landscape-sysinfo.wrapper
| $ dpkg-query -S /usr/share/landscape/landscape-sysinfo.wrapper
| landscape-common: /usr/share/landscape/landscap
** Changed in: lldpd (Ubuntu Focal)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1954721
Title:
no LLDP on Intel X710 NICs
To manage notifications about this bug go
** Changed in: bash-completion (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1030025
Title:
Missing programmable bash completions for host and ping com
** No longer affects: pollen
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1259014
Title:
check_pollen uses ent but ent package is only recommended
To manage notifications about this bug go to:
htt
** Changed in: linux (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: linux-meta-lts-vivid (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/150
** Changed in: konsole (Ubuntu)
Status: Incomplete => Won't Fix
** Changed in: qtbase-opensource-src-gles (Ubuntu)
Status: Incomplete => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
** Changed in: zeitgeist (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: zeitgeist-datahub (Ubuntu)
Status: Confirmed => Won't Fix
** Changed in: zeitgeist-datahub
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: snapd (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1699986
Title:
snapd fails to install on Trusty (wants systemd even though available
** Changed in: openvpn (Ubuntu Trusty)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1385851
Title:
OpenVPN only supports TLS v1.0
To manage notifications abou
** Changed in: tomboy (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/834247
Title:
tomboy crashes with sharing violation
To manage notifications about
** Changed in: linux (Ubuntu Trusty)
Status: Incomplete => Won't Fix
** Changed in: linux (Ubuntu)
Status: Incomplete => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/837076
T
*** This bug is a duplicate of bug 2069401 ***
https://bugs.launchpad.net/bugs/2069401
** This bug has been marked a duplicate of bug 2069401
mtr crashes when using -r option
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
Looks good to me:
Current:
| ubuntu@prod-ntp-nts-ps5-1:~$ apt-cache policy mtr-tiny
| mtr-tiny:
| Installed: 0.95-1.1build2
| Candidate: 0.95-1.1build2
| Version table:
| *** 0.95-1.1build2 500
| 500 http://archive.ubuntu.com/ubuntu noble/main amd64 Packages
| 100 /var/lib/
Filed LP:2085058 to have Launchpad warn about this, as seen elsewhere
(LP:2085057)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1860500
Title:
consider disabling apt-secure's Label check in Ubuntu
Oh, changing `Pin-Priority` to 500 did it:
| [hloeung@dharkan etc]$ sudo apt install systemd/oracular-proposed
systemd-sysv/oracular-proposed
| Selected version '256.5-2ubuntu3.1' (Ubuntu:24.10/oracular-proposed [amd64])
for 'systemd'
| Selected version '256.5-2ubuntu3.1' (Ubuntu:24.10/oracular-
I've tried even with `-APT::Install-Recommends "true";`. My pinning is
left over from prior SRU testing:
| [hloeung@dharkan etc]$ cat apt/preferences.d/proposed-updates
| # Configure apt to allow selective installs of packages from proposed
| Package: *
| Pin: release a=oracular-proposed
| Pin-Pri
This doesn't seem to work for me?
Removal of `systemd-cryptsetup` first:
| [hloeung@dharkan apt]$ sudo apt-get purge systemd-cryptsetup
| [sudo] password for hloeung:
| Sorry, try again.
| [sudo] password for hloeung:
| Reading package lists... Done
| Building dependency tree... Done
| Reading st
** Tags added: dist-upgrade oracular
** Tags added: canonical-is
** Summary changed:
- Could not switch the monitor configuration
+ Flashing "Could not switch the monitor configuration" on GUI start
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
** Tags added: dist-upgrade oracular
** Tags added: canonical-is
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2084251
Title:
Only single LUKS device unlocked on boot
To manage notifications about
** Also affects: bash (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: bash (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: bash (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: bash (Ubuntu Oracular)
Importance
Public bug reported:
Hi,
Since upgrading from Noble to Oracular, I'm seeing a bunch of "Could not
switch the monitor configuration" before the login / greeter screen.
I'm not sure if this is with lightdm, xorg-server, or unity-greeter
itself.
In `/var/log/lightdm/seat0-greeter.log`, I see this:
I can confirm that installing the `systemd-cryptsetup` packages fixes
this. Thanks @jahu.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2084251
Title:
Only single LUKS device unlocked on boot
To ma
Public bug reported:
Hi,
I just upgraded from Noble to Oracular. It seems post-upgrade, only a
single LUKS device is decrypted on boot.
My `/etc/crypttab` is as follows:
| nvme0n1p3_crypt UUID=c82c8c6c-e363-473f-a655-a325d4e6cf3b none luks,discard
| nvme0n1p4_crypt UUID=3de219b7-3e0c-437b-a0eb-
Sorry, done. "Where problems could occur" updated. Also, MP created:
|
https://code.launchpad.net/~hloeung/ubuntu/+source/mtr/+git/mtr/+merge/474508
** Description changed:
[ Impact ]
- * mtr crashes with `*** buffer overflow detected ***: terminated` when
+ * mtr crashes with `*** buffer
@ahasenack, okay, original bug reported updated using the SRU template.
Here's the git repo for noble with the patches you applied:
https://code.launchpad.net/~hloeung/ubuntu/+source/mtr/+git/mtr/+ref/noble-
mtr-crash-2069401
Anything else required to get this morning?
Thanks,
Haw
--
You rec
** Description changed:
+ [ Impact ]
+
+ * mtr crashes with `*** buffer overflow detected ***: terminated` when
+ using any report mode option: `-r`, `--report`, or `--report-wide`
+
+ [ Test Plan ]
+
+ * `mtr --report archive.ubuntu.com`
+
+ [ Where problems could occur ]
+
+
+ * None th
Okay, let me try this adding the dep3 headers.
The patch was from upstream, see:
https://github.com/traviscross/mtr/pull/468
https://github.com/traviscross/mtr/commit/5908af4c19188cb17b62f23368b6ef462831a0cb
** Patch added: "5908af4c19188cb17b62f23368b6ef462831a0cb.patch"
https://bugs.launc
Yep, got it. Thanks for explaining, appreciate it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1893753
Title:
libnginx-mod-http-lua 0.10.11 not compatible with NGINX 1.18/1.17
To manage notificat
FWIW, this is back from Mantic onwards:
https://bugs.launchpad.net/ubuntu/+source/libnginx-mod-http-
lua/+bug/2035387
Sadly, not in Jammy, which is an LTS.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
** Patch added: "5908af4c19188cb17b62f23368b6ef462831a0cb.patch"
https://bugs.launchpad.net/ubuntu/+source/mtr/+bug/2069401/+attachment/5805506/+files/5908af4c19188cb17b62f23368b6ef462831a0cb.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
*** This bug is a duplicate of bug 2069401 ***
https://bugs.launchpad.net/bugs/2069401
** This bug has been marked a duplicate of bug 2069401
mtr on ubuntu 24.04 is broken when using -r option
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
... and can confirm. Looking at my most recently send emails, `Message-
ID`'s don't have `+` nor `/`. Or at least I can't find any so far :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2016245
Title
Ah no, it's included in 2.2.10.
** Changed in: mutt (Ubuntu Noble)
Status: New => Invalid
** Changed in: mutt (Ubuntu Oracular)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
These patches are released in mutt 2.2.13, both Noble and Oracular ship
with Mutt 2.2.12-0.1build4 so targetting these instead.
** Also affects: mutt (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: mutt (Ubuntu Oracular)
Importance: Undecided
Status: New
--
** Patch added: "5908af4c19188cb17b62f23368b6ef462831a0cb.patch"
https://bugs.launchpad.net/ubuntu/+source/mtr/+bug/2071890/+attachment/5799168/+files/5908af4c19188cb17b62f23368b6ef462831a0cb.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
FWIW, commit to cherry pick
https://github.com/traviscross/mtr/commit/5908af4c19188cb17b62f23368b6ef462831a0cb
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071890
Title:
mtr --report crashes with
Looks good to me. Installed the latest kernel this morning, rebooted
into it, and confirmed that the Touchpad works out of the box without
having to remove and reloading the `i2c_hid_acpi` module.
| [hloeung@dharkan tmp]$ dmesg -T | grep -E 'hid|input' | grep -Ev
'hda|Button|Switch|Video'
| [Tue
** Changed in: linux (Ubuntu)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Noble)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061040
Tit
Can confirm:
[hloeung@dharkan tmp]$ ls /usr/share/doc/openssl -la
total 120
drwxr-xr-x3 root root 4096 Apr 4 18:43 .
drwxr-xr-x 1469 root root 61440 Apr 26 19:28 ..
lrwxrwxrwx1 root root30 Mar 31 17:42 changelog.Debian.gz ->
../libssl3/changelog.Debian.gz
lrwxrwxrwx1 root root
Public bug reported:
Hi,
Touchpad on my new Lenovo X1 Carbon (Gen12) with the Sensel haptic pad
doesn't work on boot. I see this:
| [Thu Apr 11 13:57:26 2024] i2c_hid_acpi i2c-SNSL0028:00: device did not ack
reset within 1000 ms
| [Thu Apr 11 13:57:26 2024] hid-generic 0018:2C2F:0028.0001: unkn
Confirmed the latest gnome-session fixes this.
| [hloeung@dharkan tmp]$ apt-cache policy unity-session gnome-session-bin
| unity-session:
| Installed: 46.0-1ubuntu3
| Candidate: 46.0-1ubuntu3
| Version table:
| *** 46.0-1ubuntu3 500
| 500 http://haw-test.archive.ubuntu.com/ubuntu no
** Tags added: noble
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060426
Title:
DeprecationWarning: datetime.datetime.utcfromtimestamp() is deprecated
and scheduled for removal in a future versi
@vanvugt, it's `unity-session` shipping out
`/usr/lib/systemd/user/gnome-session.service` which is part of `gnome-
session`:
| $ dpkg-query -S /usr/lib/systemd/user/gnome-session.service
| unity-session: /usr/lib/systemd/user/gnome-session.service
$ chdist apt-get noble source unity-session
Read
Public bug reported:
Hi,
Seeing this:
| /usr/lib/python3/dist-packages/dateutil/tz/tz.py:37: DeprecationWarning:
datetime.datetime.utcfromtimestamp() is deprecated and scheduled for removal in
a future version. Use timezone-aware objects to represent datetimes in UTC:
datetime.datetime.from
Public bug reported:
Hi,
`gnome-session.service` has the following:
| [Service]
| ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export |
GNOME_SHELL_SESSION_MODE=classic; \
| export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
| [ "$DESKTOP_SESSION" = gno
** Tags added: noble
** Also affects: gnome-session (Ubuntu Noble)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060266
Title:
gnome-session no longer s
** Description changed:
Hi,
`gnome-session.service` has the following:
| [Service]
| ExecStart=/bin/sh -exc '[ "$DESKTOP_SESSION" != "gnome-classic" ] || export
| GNOME_SHELL_SESSION_MODE=classic; \
| export GNOME_SESSION_XDG_SESSION_PATH=${XDG_SESSION_PATH}; \
| [ "$DES
I've not observed any problems or hindrance as a result of these
denials, no.
Just more noise and thought maybe Chromium was going to use the pressure
stall information for something useful like for the selection of which
tabs/process to kill off when the system is experiencing pressure in
either
It's used here:
|
https://github.com/chromium/chromium/blob/123.0.6312.58/chrome/browser/metrics/pressure/pressure_metrics_reporter.cc#L19
From this commit:
|
https://github.com/chromium/chromium/commit/dace5562b1d56bf2d2e5b2de6f4518c44844be9f
References this bug:
| https://issues.chromium.org
Sorry, I should have mentioned the version. I'm using the chromium from
the candidate channel:
| $ snap info chromium | grep installed
| installed: 123.0.6312.58 (2795) 168MB -
Seems to be happening every 10 mins.
--
You received this bug notification because you are a memb
Public bug reported:
Hi,
Currently seeing this:
| Mar 25 16:12:23 dharkan.local kernel: audit: type=1400
audit(1711343543.539:657): apparmor="DENIED" operation="open" class="file"
profile="snap.chromium.chromium" name="/proc/pressure/cpu" pid=63335
comm="ThreadPoolForeg" requested_mask="r" de
Seeing this myself:
| $ sudo apt-get update
| Warning: The unit file, source configuration file or drop-ins of
apt-news.service changed on disk. Run 'systemctl daemon-reload' to reload units.
| Warning: The unit file, source configuration file or drop-ins of
esm-cache.service changed on disk. Ru
For debugging, I provisioned VMs in Azure for each of the releases and
they all have this disabled:
| $ juju run --application
ubuntu-jammy-test,ubuntu-focal-test,ubuntu-bionic-test,ubuntu-xenial-test,ubuntu-trusty-test
"grep APT::Periodic::Download-Upgradeable-Packages
/etc/apt/apt.conf.d/10pe
Maybe it is this as Grant (orndorffgrant) mentioned earlier?
| APT::Periodic::Download-Upgradeable-Packages "0";
During the time of a surge, we saw this:
| Hits h% Vis. v% Bandwidth Mtd ProtoData
| - -- - -- ---
| 3772 0.82% 2461 0.
Public bug reported:
Hi,
Running `flake8` `5.0.4-4` included with Noble, I'm getting the
following errors:
| ]$ flake8 pe.py
| Traceback (most recent call last):
| File "/usr/lib/python3/dist-packages/flake8/plugins/finder.py", line 296,
in _load_plugin
| obj = plugin.entry_point.load()
|
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
** Changed in: etckeeper (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1598304
T
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1986739
Title:
etckeeper cron spam => please pass --quiet to `bzr commit`
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1922960
Title:
ieee-data monthly cron job in Xenial probably DDoSes ieee.o
** Also affects: breezy (Ubuntu Mantic)
Importance: Undecided
Status: New
** Also affects: breezy (Ubuntu Noble)
Importance: Undecided
Status: Confirmed
** Summary changed:
- Unable to get a copy of private bzr repositories using 'bzr branch' on mantic
+ Unable to get a copy
The workaround doesn't work for me?
| [hloeung@dharkan tmp]$ bzr branch lp+bzr:canonical-sshebang
| ...
|
| lazr.restfulclient.errors.ServerError: HTTP Error 500: Internal Server Error
| Response headers:
| ---
| connection: close
| content-length: 14
| content-type: text/plain;charset=utf-8
| dat
** Changed in: fontconfig (Ubuntu)
Status: Triaged => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924
Title:
color emoji are broken with fontconfig 2.15
To manage notificatio
The workaround detailed upstream works for me - removing
/etc/fonts/conf.d/70-no-bitmaps.conf and re-generating your fonts cache.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054924
Title:
color e
> From debugging sshd, I can see the override file is indeed being read,
and the option is supposedly set. But after testing, the options are not
taking effect.
From debugging, do you see /etc/ssh/sshd_config being read first?
For OpenSSH, at least with the client side, the first defined value is
Public bug reported:
Hi,
The current logrotate config is as follows:
===
/var/log/conntrackd-stats.log {
weekly
rotate 2
missingok
postrotate
invoke-rc.d conntrackd restart > /dev/null
endscript
}
===
This causes weekly restarts of conntrackd. Can we switch to using
I think you want package updates from Ubuntu ESM, in particular ca-
certificates 20190110~14.04.1~esm2.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928989
Title:
expiring trust anchor compatibili
Looks fixed in more recent versions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957128
Title:
ifenslave fails to detach slave from bonded interface
To manage notifications about this bug go to:
Public bug reported:
Hi,
When I try to detach a slave from a bonded interface, it fails as
follows:
| [hloeung@myhost etc]$ sudo ifenslave -v -d bond0 ens2f1
| ens2f1: is not enslaved to bond0
It's definitely part of the bond:
| [hloeung@myhost etc]$ ls /sys/class/net/bond0/ -la | grep ens
| l
Public bug reported:
Hi,
Per the Intel community [1], for Intel X710 controllers, the NIC is
meant to handle LLDP directly. Unfortunately, this doesn't play well
with lldpd:
| hloeung@cumulus:mgmt:~$ net show lldp | grep swp24
| swp24 10GTrunk/L237383638-3530-5A43-3238-30423954
Hirsute verified - https://paste.ubuntu.com/p/Zs6vG7M6Jf/
| real1m46.509s
vs.
| real0m43.891s
Impish verified - https://paste.ubuntu.com/p/yWW4k8Jy79/
| real1m14.348s
vs.
| real0m27.687s
** Tags removed: verification-needed verification-needed-hirsute
verification-needed-im
Tested on a Focal VM in Canonistack.
Using current ipset:
| ubuntu@juju-87625f-hloeung-110:~$ sudo apt-get install ipset
| ...
| Get:1 http://us.archive.ubuntu.com/ubuntu focal/main amd64 libipset13 amd64
7.5-1~exp1 [53.4 kB]
| Get:2 http://us.archive.ubuntu.com/ubuntu focal/main amd64 ipset amd
Public bug reported:
Hi,
Is there a way to list the previous revisions of a snap in a specific
channel and then allow the snap client to revert or install specific
revisions?
I understand `snap revert` exists, but it only allows to revert to the
last installed and that's it.
My use case is this
On Thu, Sep 02, 2021 at 05:39:23PM -, Brian Murray wrote:
> I think part of the point of having the cronjob is to mail the system
> administrator and let them know that a new release of Ubuntu is
> available. That being said I do feel like sending the email every week
> until the system upgrade
** Description changed:
Hi,
The bundled nmap-mac-prefixes dates back to 2019:
| # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated
with make-mac-prefixes.pl
| # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
| # These values are known a
Public bug reported:
Hi,
The bundled nmap-mac-prefixes dates back to 2019:
| # $Id: nmap-mac-prefixes 37638 2019-05-28 21:35:45Z dmiller $ generated with
make-mac-prefixes.pl
| # Original data comes from http://standards.ieee.org/regauth/oui/oui.txt
| # These values are known as Organizationall
LGTM, thanks!
| ubuntu@juju-87625f-hloeung-66:~$ cp /etc/cron.weekly/update-notifier-common ~/
| ubuntu@juju-87625f-hloeung-66:~$ sudo apt-get update
| ...
| Get:8 http://us.archive.ubuntu.com/ubuntu bionic-proposed/main amd64 Packages
[104 kB]
| ...
| ubuntu@juju-87625f-hloeung-66:~$ sudo apt-ge
** Changed in: ipset (Ubuntu Focal)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936
Title:
ipset does NSS lookups even if ports are numeric
To manage notificat
Public bug reported:
Hi,
We get these cron spam weekly:
| Received: by mysystem.mydomain.local (Postfix)
| id B19E32E806B; Sun, 15 Aug 2021 06:47:03 + (UTC)
| Delivered-To: root@mysystem.mydomain.local
| Received: by mysystem.mydomain.local (Postfix, from userid 0)
| id 9DD00
Thanks Brian (brian-murray) for sponsoring this change.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the same time for
all comp
Looks good to me:
| ubuntu@juju-87625f-hloeung-100:/etc/apt$ sudo apt-get install
update-notifier-common
| Reading package lists... Done
| Building dependency tree
| Reading state information... Done
| The following packages were automatically installed and are no longer
required:
| dnsmasq-ba
@waveform, perfect, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1836475
Title:
[SRU] update-notifier-common weekly cron job runs at the same time for
all computers across the globe
To m
Something similar was done for checking for the latest Ubuntu release
and updating the MOTD in LP:1836475. It switches the download part into
a systemd timer
(https://launchpadlibrarian.net/505544658/lp1836475-focal.debdiff). So
maybe something similar here where the timer job checks existence and
Sorry for the noise, this is my dpkg-divert to disable git support per
LP:1868200.
** Changed in: breezy (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935731
T
Public bug reported:
Hi,
Install brz from Hirsute fails:
| Selecting previously unselected package python3-breezy.
| Preparing to unpack .../4-python3-breezy_3.1.0-8_amd64.deb ...
| Unpacking python3-breezy (3.1.0-8) ...
| Selecting previously unselected package brz.
| Preparing to unpack .../5-
** Patch added: "ipset.patch"
https://bugs.launchpad.net/ubuntu/+source/ipset/+bug/1918936/+attachment/5507474/+files/ipset.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1918936
Title:
ips
Apologies, can we update it to using the attached patch?
It includes the fix by Jozsef from upstream:
"""
Fix patch "Parse port before trying by service name"
The patch broke parsing service names: number parsing failures
are hard errors which erase data, thus making impossible to
parse input as
Per discussion on Mattermost, the original behavior was to try
string_to_u16() before parse_portname(). This was switched in upstream
commit
https://git.netfilter.org/ipset/tree/lib/parse.c?id=516600858cb54906fb728d04e5edf1131ee7b3b2
and released with ipset v6.37.
--
You received this bug notific
On Mon, Jun 14, 2021 at 04:16:28PM -, Robie Basak wrote:
> > I'm keen to try and avoid handling any more complex (arbitrary)
> customisations
>
> I agree! I think I prefer adding a random sleep for the SRU for this
> reason, even if the appropriate fix for the development release that
> landed
** Branch linked: lp:~hloeung/ubuntu-repository-cache/squid-logging-
human-sensible-timestamps
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780341
Title:
squid should default to more human friendl
1 - 100 of 659 matches
Mail list logo