[Bug 1221704] [NEW] package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
Public bug reported: installArchives() failed: Preconfiguring packages ... Preconfiguring packages ... Preconfiguring packages ... Preconfiguring packages ... (Reading database ... (Reading database ... 5%% (Reading database ... 10%% (Reading database ... 15%% (Reading database ... 20%% (Reading database ... 25%% (Reading database ... 30%% (Reading database ... 35%% (Reading database ... 40%% (Reading database ... 45%% (Reading database ... 50%% (Reading database ... 55%% (Reading database ... 60%% (Reading database ... 65%% (Reading database ... 70%% (Reading database ... 75%% (Reading database ... 80%% (Reading database ... 85%% (Reading database ... 90%% (Reading database ... 95%% (Reading database ... 100%% (Reading database ... 263932 files and directories currently installed.) Preparing to replace php5-cli 5.3.10-1ubuntu3.7 (using .../php5-cli_5.3.10-1ubuntu3.8_amd64.deb) ... Unpacking replacement php5-cli ... Preparing to replace libapache2-mod-php5 5.3.10-1ubuntu3.7 (using .../libapache2-mod-php5_5.3.10-1ubuntu3.8_amd64.deb) ... Unpacking replacement libapache2-mod-php5 ... Preparing to replace php5-common 5.3.10-1ubuntu3.7 (using .../php5-common_5.3.10-1ubuntu3.8_amd64.deb) ... Unpacking replacement php5-common ... Preparing to replace initramfs-tools 0.99ubuntu13.1 (using .../initramfs-tools_0.99ubuntu13.2_all.deb) ... Unpacking replacement initramfs-tools ... Preparing to replace initramfs-tools-bin 0.99ubuntu13.1 (using .../initramfs-tools-bin_0.99ubuntu13.2_amd64.deb) ... Unpacking replacement initramfs-tools-bin ... Preparing to replace apparmor 2.7.102-0ubuntu3.8 (using .../apparmor_2.7.102-0ubuntu3.9_amd64.deb) ... Unpacking replacement apparmor ... Preparing to replace libroken18-heimdal 1.6~git20120311.dfsg.1-2 (using .../libroken18-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libroken18-heimdal ... Preparing to replace libasn1-8-heimdal 1.6~git20120311.dfsg.1-2 (using .../libasn1-8-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libasn1-8-heimdal ... Preparing to replace libhcrypto4-heimdal 1.6~git20120311.dfsg.1-2 (using .../libhcrypto4-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libhcrypto4-heimdal ... Preparing to replace libheimbase1-heimdal 1.6~git20120311.dfsg.1-2 (using .../libheimbase1-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libheimbase1-heimdal ... Preparing to replace libwind0-heimdal 1.6~git20120311.dfsg.1-2 (using .../libwind0-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libwind0-heimdal ... Preparing to replace libhx509-5-heimdal 1.6~git20120311.dfsg.1-2 (using .../libhx509-5-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libhx509-5-heimdal ... Preparing to replace libkrb5-26-heimdal 1.6~git20120311.dfsg.1-2 (using .../libkrb5-26-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libkrb5-26-heimdal ... Preparing to replace libheimntlm0-heimdal 1.6~git20120311.dfsg.1-2 (using .../libheimntlm0-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libheimntlm0-heimdal ... Preparing to replace libgssapi3-heimdal 1.6~git20120311.dfsg.1-2 (using .../libgssapi3-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ... Unpacking replacement libgssapi3-heimdal ... Selecting previously unselected package linux-image-3.5.0-40-generic. Unpacking linux-image-3.5.0-40-generic (from .../linux-image-3.5.0-40-generic_3.5.0-40.62~precise1_amd64.deb) ... Done. Preparing to replace libnm-util2 0.9.4.0-0ubuntu4.2 (using .../libnm-util2_0.9.4.0-0ubuntu4.3_amd64.deb) ... Unpacking replacement libnm-util2 ... Preparing to replace libnm-glib4 0.9.4.0-0ubuntu4.2 (using .../libnm-glib4_0.9.4.0-0ubuntu4.3_amd64.deb) ... Unpacking replacement libnm-glib4 ... Preparing to replace network-manager 0.9.4.0-0ubuntu4.2 (using .../network-manager_0.9.4.0-0ubuntu4.3_amd64.deb) ... Unpacking replacement network-manager ... Preparing to replace duplicity 0.6.18-0ubuntu3.1 (using .../duplicity_0.6.18-0ubuntu3.2_amd64.deb) ... Unpacking replacement duplicity ... Preparing to replace libnm-glib-vpn1 0.9.4.0-0ubuntu4.2 (using .../libnm-glib-vpn1_0.9.4.0-0ubuntu4.3_amd64.deb) ... Unpacking replacement libnm-glib-vpn1 ... Preparing to replace linux-image-generic-lts-quantal 3.5.0.39.45 (using .../linux-image-generic-lts-quantal_3.5.0.40.46_amd64.deb) ... Unpacking replacement linux-image-generic-lts-quantal ... Selecting previously unselected package linux-headers-3.5.0-40. Unpacking linux-headers-3.5.0-40 (from .../linux-headers-3.5.0-40_3.5.0-40.62~precise1_all.deb) ... Selecting previously unselected package linux-headers-3.5.0-40-generic. Unpacking linux-headers-3.5.0-40-generic (from .../linux-headers-3.5.0-40-generic_3.5.0-40.62~precise1_amd64.deb) ... Preparing to replace linux-headers-generic-lts-quantal 3.5.0.39.45 (using
[Bug 1221704] Re: package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to nagios3 in Ubuntu. https://bugs.launchpad.net/bugs/1221704 Title: package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nagios3/+bug/1221704/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1196218] Re: setting at event causes root partition to fill
While in my home dir, I typed at 19:00 (the exact time is not important). The at console appeared. I then typed myplayer song.mp3 (song.mp3 is in my home dir) Then pressed CTRL+D That's all. Did a test a few minutes ago: / usage starts to grow as soon as the scheduled action starts. It keeps growning even after the action is complete, until / is full. A sudo /etc/init.d/atd restart is enough to stop the growth and bring the / usage back to its previous level. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to at in Ubuntu. https://bugs.launchpad.net/bugs/1196218 Title: setting at event causes root partition to fill To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/at/+bug/1196218/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1025051] Re: package fetchmail 6.3.21-2 failed to install/upgrade: subprocess installed pre-removal script returned error exit status 6
I guess my point is that I can no longer give information about this particular bug. I don't use fetchmail anymore, and I certainly can't remember my circumstances around it from over a year ago. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to fetchmail in Ubuntu. https://bugs.launchpad.net/bugs/1025051 Title: package fetchmail 6.3.21-2 failed to install/upgrade: subprocess installed pre-removal script returned error exit status 6 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/fetchmail/+bug/1025051/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy
Blueprint changed by Serge Hallyn: Work items changed: Work items: [serge-hallyn] (Dwight is pushing this, but has no lp id) Push fix for XFS and user namespaces: DONE [serge-hallyn] Fix lxc-net to be nestable with no user interaction: DONE [serge-hallyn] Write sysctl to disable unprivileged CLONE_NEWUSER: DONE [serge-hallyn] Exploit stacked apparmor profiles for container nesting: BLOCKED [serge-hallyn] Ask jjohansen about any apparmor kernel/userspace packages we can put in ubuntu-lxc ppa for testing stacked (0.5): DONE [serge-hallyn] Bisect kernel signal delivery bug affecting lxc: DONE [serge-hallyn] Improve cgroup support in nested case: DONE [serge-hallyn] write POC of nestable cgroup manager: POSTPONED [serge-hallyn] Pursue subuid patchset for shadow: DONE [serge-hallyn] Enable unprivileged container creation: DONE [serge-hallyn] Write a privileged helper to facilitate unprivileged networked container: DONE [serge-hallyn] Enable unprivileged container starting (network): POSTPONED [serge-hallyn] Enable unprivileged container starting (cgroups): DONE [serge-hallyn] Enable unprivileged container starting (complete): POSTPONED [serge-hallyn] Add console support to API (Dwight): DONE [serge-hallyn] Add attach support to API (Christian): DONE [serge-hallyn] Convert create to API: DONE [serge-hallyn] Convert stop to API: DONE [serge-hallyn] Convert destroy to API: DONE [serge-hallyn] List lxc programs to be converted to API (https://wiki.ubuntu.com/LxcAPIConversion): DONE [serge-hallyn] Update locking in API to handle killed programs: DONE [serge-hallyn] Update container creation to handle SIGKILL (using 'partial' file): DONE [serge-hallyn] Improve thread safety in API: DONE [serge-hallyn] Discuss upstream stable branches with upstream (sent email to list): DONE [serge-hallyn] Get CONFIG_USER_NS=y into kernel (as soon as saucy+1 opens): POSTPONED [serge-hallyn] Merge qemu 1.5.0: DONE [serge-hallyn] Write loopback backingstore driver: DONE [serge-hallyn] Write qemu-nbd backingstore driver: POSTPONED [serge-hallyn] Investigate openvswitch bridges by default in libvirt (1): DONE [serge-hallyn] Merge cgroup-lite into libcgroup (depends on libcgroup sysvinit scripts): POSTPONED [serge-hallyn] Default-off support for per-user cgroup configuration at boot/login: POSTPONED [smoser] Ensure that lxc-ubuntu-cloud can be used with cloudinit for openstack: DONE [serge-hallyn] start live block migration testing using juju of libvirt+kvm with local storage (1): DONE [smoser] use simplestreams to provide secure ubuntu-cloud deliver to lxc: POSTPONED [zulcss] Merge libvirt 1.0.6: DONE [serge-hallyn] no-change libvirt push to pick up new xen libraries (0): BLOCKED [smb] Pick up upstream Xen-4.3 release: DONE [smb] Refresh Debian/Ubuntu patches against Xen: DONE [smb] Decide how to include qemu-upstream: DONE [smb] Update packaging to allow libvirt to build the libxl driver: DONE [smb] Unit testing with xm and xl stack (native and libvirt): DONE [smb] Enable Xen compile for armhf: DONE [smb] Merge xen 4.3: DONE [zulcss] Write a nova using the lxc API: INPROGRESS Work items for ubuntu-13.09: [serge-hallyn] Work distro lxc tests upstream (2): TODO - [serge-hallyn] Solve monitor versioning in lxc (1): TODO [zulcss] Push nova-lxc driver upstream: TODO - [serge-hallyn] Add snapshot support to API (3): TODO + [serge-hallyn] Add snapshot support to API (3): INPROGRESS [serge-hallyn] Discuss API versioning of library and (python, lua, etc) hooks at plumbers: TODO [serge-hallyn] complete live block migration testing (using juju?) of libvirt+kvm with local storage (1): TODO [zulcss] Follow up with Citrix's plans for xcp: TODO [smb] PUsh xen 4.3 to archive: TODO Work items for ubuntu-13.10: [serge-hallyn] Pursue patch for ovmf to provide save/restore of nvvars to support boot variables (3): TODO [serge-hallyn] live block migration testing using juju of libvirt+kvm with ceph (2): TODO [zulcss] Fix apparmor bug preventing libvirt-lxc from mounting blockdevs: TODO -- Virtualization Stack Work for Saucy https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1183135] Re: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg
NIC: Intel 82540EM Gigabit Ethernet Controller e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI (from attached dmesg) -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to irqbalance in Ubuntu. https://bugs.launchpad.net/bugs/1183135 Title: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/irqbalance/+bug/1183135/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy
Blueprint changed by Serge Hallyn: Whiteboard changed: [USER STORIES] Abe would like to run untrusted workloads in a container. Billy would like for his users to be able to use containers without giving them root access. Charlie would like to confine users with flexible cgroups. Denise is writing an application using containers, and wants to re-use the tested core lxc API. Erica would like openstack-lxc users to have all the advanced features of lxc (apparmor protection, nesting, etc). [ASSUMPTIONS] A fix is accepted upstream to allow user namespaces to be used alongside XFS. [USER ACCEPTANCE] Set up a user with subuids and use it to create and run a container. [RELEASE NOTE/BLOG] User namespaces, apparmor, and seccomp are now leveraged to provide a secure container environment. Containers can now be created and used by unprivileged users. There is built-in support for boot-time configuration of control groups. + + [NOTES] + + Note that work items targetd to ubuntu-13.09 and ubuntu-13.10 are + targeted for completion upstream during saucy cycle, but not to + hit saucy. Note that ovmf work will not be complete upstream, + this item is to investigate and organize (pursue). -- Virtualization Stack Work for Saucy https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy
Blueprint changed by Serge Hallyn: Work items changed: Work items: [serge-hallyn] (Dwight is pushing this, but has no lp id) Push fix for XFS and user namespaces: DONE [serge-hallyn] Fix lxc-net to be nestable with no user interaction: DONE [serge-hallyn] Write sysctl to disable unprivileged CLONE_NEWUSER: DONE [serge-hallyn] Exploit stacked apparmor profiles for container nesting: BLOCKED [serge-hallyn] Ask jjohansen about any apparmor kernel/userspace packages we can put in ubuntu-lxc ppa for testing stacked (0.5): DONE [serge-hallyn] Bisect kernel signal delivery bug affecting lxc: DONE [serge-hallyn] Improve cgroup support in nested case: DONE [serge-hallyn] write POC of nestable cgroup manager: POSTPONED [serge-hallyn] Pursue subuid patchset for shadow: DONE [serge-hallyn] Enable unprivileged container creation: DONE [serge-hallyn] Write a privileged helper to facilitate unprivileged networked container: DONE [serge-hallyn] Enable unprivileged container starting (network): POSTPONED [serge-hallyn] Enable unprivileged container starting (cgroups): DONE [serge-hallyn] Enable unprivileged container starting (complete): POSTPONED [serge-hallyn] Add console support to API (Dwight): DONE [serge-hallyn] Add attach support to API (Christian): DONE [serge-hallyn] Convert create to API: DONE [serge-hallyn] Convert stop to API: DONE [serge-hallyn] Convert destroy to API: DONE [serge-hallyn] List lxc programs to be converted to API (https://wiki.ubuntu.com/LxcAPIConversion): DONE [serge-hallyn] Update locking in API to handle killed programs: DONE [serge-hallyn] Update container creation to handle SIGKILL (using 'partial' file): DONE [serge-hallyn] Improve thread safety in API: DONE [serge-hallyn] Discuss upstream stable branches with upstream (sent email to list): DONE [serge-hallyn] Get CONFIG_USER_NS=y into kernel (as soon as saucy+1 opens): POSTPONED [serge-hallyn] Merge qemu 1.5.0: DONE [serge-hallyn] Write loopback backingstore driver: DONE [serge-hallyn] Write qemu-nbd backingstore driver: POSTPONED [serge-hallyn] Investigate openvswitch bridges by default in libvirt (1): DONE [serge-hallyn] Merge cgroup-lite into libcgroup (depends on libcgroup sysvinit scripts): POSTPONED [serge-hallyn] Default-off support for per-user cgroup configuration at boot/login: POSTPONED [smoser] Ensure that lxc-ubuntu-cloud can be used with cloudinit for openstack: DONE [serge-hallyn] start live block migration testing using juju of libvirt+kvm with local storage (1): DONE [smoser] use simplestreams to provide secure ubuntu-cloud deliver to lxc: POSTPONED [zulcss] Merge libvirt 1.0.6: DONE [serge-hallyn] no-change libvirt push to pick up new xen libraries (0): BLOCKED [smb] Pick up upstream Xen-4.3 release: DONE [smb] Refresh Debian/Ubuntu patches against Xen: DONE [smb] Decide how to include qemu-upstream: DONE [smb] Update packaging to allow libvirt to build the libxl driver: DONE [smb] Unit testing with xm and xl stack (native and libvirt): DONE [smb] Enable Xen compile for armhf: DONE [smb] Merge xen 4.3: DONE [zulcss] Write a nova using the lxc API: INPROGRESS Work items for ubuntu-13.09: - [serge-hallyn] Work distro lxc tests upstream (2): TODO [serge-hallyn] Address monitor versioning in lxc (1): DONE [zulcss] Push nova-lxc driver upstream: TODO [serge-hallyn] Add snapshot support to API (3): INPROGRESS - [serge-hallyn] Discuss API versioning of library and (python, lua, etc) hooks at plumbers: TODO - [serge-hallyn] complete live block migration testing (using juju?) of libvirt+kvm with local storage (1): TODO [zulcss] Follow up with Citrix's plans for xcp: TODO [smb] PUsh xen 4.3 to archive: TODO Work items for ubuntu-13.10: - [serge-hallyn] Pursue patch for ovmf to provide save/restore of nvvars to support boot variables (3): TODO - [serge-hallyn] live block migration testing using juju of libvirt+kvm with ceph (2): TODO [zulcss] Fix apparmor bug preventing libvirt-lxc from mounting blockdevs: TODO -- Virtualization Stack Work for Saucy https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1218817] Re: [FFE] Update to Xen-4.3 in Saucy
+1 from me, it has features that users want, more specifacally arm support. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to xen in Ubuntu. https://bugs.launchpad.net/bugs/1218817 Title: [FFE] Update to Xen-4.3 in Saucy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1218817/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1216019] Re: Horizon default config assumes www-data has R/w on /usr/share... directory
This bug was fixed in the package horizon - 1:2013.2~b2-0ubuntu6 --- horizon (1:2013.2~b2-0ubuntu6) saucy; urgency=low * debian/patches/ubuntu_local_settings.py: Set flexible default for ALLOWED_HOSTS that should be changed for production deployments (LP: #1214982). * Fix (LP: #1216019): - debian/openstack-dashboard.{postinst, postrm}: Add/remove horizon user. Ensure /etc/openstack-dashbard ownership. - debian/openstack-dashboard.conf: Run WSGIDaemonProcess as user horizon, set WSGIProcessGroup to horizon. - debian/patches/ubuntu_local_settings.py: Generate and load secret key from /etc/openstack-dashboard/secret_key. -- Adam Gandelman ad...@ubuntu.com Fri, 06 Sep 2013 10:33:18 -0700 ** Branch linked: lp:ubuntu/saucy-proposed/horizon ** Changed in: horizon (Ubuntu Saucy) Status: Triaged = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1216019 Title: Horizon default config assumes www-data has R/w on /usr/share... directory To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1216019/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1218817] Re: [FFE] Update to Xen-4.3 in Saucy
Ack. Approved. ** Changed in: xen (Ubuntu) Status: New = Triaged -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to xen in Ubuntu. https://bugs.launchpad.net/bugs/1218817 Title: [FFE] Update to Xen-4.3 in Saucy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1218817/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1159748] Re: Ramdom apache2 crash in Ubuntu 12.04 (libpthread-2.15.so)
I'm still seeing it after running apt-get upgrade this morning. Upgrading Plack::Handler to 1.0029 (using CPAN) does not resolve the issue either. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to apache2 in Ubuntu. https://bugs.launchpad.net/bugs/1159748 Title: Ramdom apache2 crash in Ubuntu 12.04 (libpthread-2.15.so) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1159748/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1221906] [NEW] Havana-3 Dependency missing: python-troveclient
Public bug reported: This is blocking Havana-3 release of Horizon into Ubuntu. Since H2, python-troveclient was introduced as a dependency of Horizon and the application will not function without it. Currently it is not available in Ubuntu. [Fri Sep 06 19:44:01 2013] [notice] Apache/2.2.22 (Ubuntu) mod_wsgi/3.3 Python/2.7.3 configured -- resuming normal operations [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] mod_wsgi (pid=6347): Exception occurred processing WSGI script '/usr/share/openstack-dashboard/openstack_dashboard/wsgi/django.wsgi'. [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] Traceback (most recent call last): [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File /usr/lib/python2.7/dist-packages/django/core/handlers/wsgi.py, line 236, in __call__ [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] self.load_middleware() [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File /usr/lib/python2.7/dist-packages/django/core/handlers/base.py, line 45, in load_middleware [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] for middleware_path in settings.MIDDLEWARE_CLASSES: [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File /usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 53, in __getattr__ [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] self._setup(name) [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File /usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 48, in _setup [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] self._wrapped = Settings(settings_module) [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File /usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 134, in __init__ [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] raise ImportError(Could not import settings '%s' (Is it on sys.path?): %s % (self.SETTINGS_MODULE, e)) [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] ImportError: Could not import settings 'openstack_dashboard.settings' (Is it on sys.path?): No module named troveclient [Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File does not exist: /var/www/favicon.ico ** Affects: horizon (Ubuntu) Importance: Critical Status: New ** Affects: horizon (Ubuntu Saucy) Importance: Critical Status: New ** Changed in: horizon (Ubuntu) Importance: Undecided = Critical ** Also affects: horizon (Ubuntu Saucy) Importance: Critical Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1221906 Title: Havana-3 Dependency missing: python-troveclient To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1221906/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1214982] Re: STATIC_URL is missing in context if ALLOWED_HOSTS not set.
This bug was fixed in the package horizon - 1:2013.2~b2-0ubuntu6 --- horizon (1:2013.2~b2-0ubuntu6) saucy; urgency=low * debian/patches/ubuntu_local_settings.py: Set flexible default for ALLOWED_HOSTS that should be changed for production deployments (LP: #1214982). * Fix (LP: #1216019): - debian/openstack-dashboard.{postinst, postrm}: Add/remove horizon user. Ensure /etc/openstack-dashbard ownership. - debian/openstack-dashboard.conf: Run WSGIDaemonProcess as user horizon, set WSGIProcessGroup to horizon. - debian/patches/ubuntu_local_settings.py: Generate and load secret key from /etc/openstack-dashboard/secret_key. -- Adam Gandelman ad...@ubuntu.com Fri, 06 Sep 2013 10:33:18 -0700 ** Branch linked: lp:ubuntu/saucy-proposed/horizon ** Changed in: horizon (Ubuntu Saucy) Status: Triaged = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1214982 Title: STATIC_URL is missing in context if ALLOWED_HOSTS not set. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1214982/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1183135] Re: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg
Hi Vikrant, Please let us know if you can reproduce the issue with irqbalance 1.0.3-1ubuntu2 in the 12.10 (quantal) repo. Thanks, Samantha -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to irqbalance in Ubuntu. https://bugs.launchpad.net/bugs/1183135 Title: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/irqbalance/+bug/1183135/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1221906] Re: Havana-3 Dependency missing: python-troveclient
FFe Bug #1221981 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1221906 Title: Havana-3 Dependency missing: python-troveclient To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1221906/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215279 Title: linux-lowlatency: 3.5.0-40.41 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker
This bug was fixed in the package linux-lts-raring - 3.8.0-30.44~precise1 --- linux-lts-raring (3.8.0-30.44~precise1) precise; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1215677 [ Upstream Kernel Changes ] * Don't attempt to send extended INQUIRY command if skip_vpd_pages is set - LP: #1215155 linux (3.8.0-30.43) raring; urgency=low [Steve Conklin] * Release Tracking Bug - LP: #1215095 [ Andy Whitcroft ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 [ Brad Figg ] * Start new release [ John Johansen ] * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 [ Joseph Salisbury ] * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 [ Kamal Mostafa ] * SAUCE: (no-up) Revert SAUCE: (no-up) drm/i915: quirk no PCH_PWM_ENABLE for Dell XPS13 backlight [ Tim Gardner ] * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 [ Upstream Kernel Changes ] * Revert drm/i915: Workaround incoherence between fences and LLC across multiple CPUs - LP: #1207977 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1207977 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1207977 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1207977 * drm/i915: Correct obj-mm_list link to dev_priv-dev_priv-mm.inactive_list - LP: #1207977 * drm/i915: fix up ring cleanup for the i830/i845 CS tlb w/a - LP: #1207977 * Partially revert drm/i915: unconditionally use mt forcewake on hsw/ivb - LP: #1207977 * drm/i915: Fix write-read race with multiple rings - LP: #1207977 * drm/i915: merge {i965, sandybridge}_write_fence_reg() - LP: #1207977 * drm/i915: Fix incoherence with fence updates on Sandybridge+ - LP: #1207977 * drm/i915: rename sdvox_reg to hdmi_reg on HDMI context - LP: #1207977 * drm/i915: don't setup hdmi for port D edp in ddi_init - LP: #1207977 * drm/i915: Preserve the DDI_A_4_LANES bit from the bios - LP: #1207977 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1207977 * drm/radeon: allocate SA bo in the requested domain - LP: #1207977 * drm/radeon: allow selection of alignment in the sub-allocator - LP: #1207977 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1207977 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1207977 * ext4: fix error handling in ext4_ext_truncate() - LP: #1207977 * radeon kms: do not flush uninitialized hotplug work - LP: #1207977 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ASoC: atmel: Fix unlocked snd_pcm_stop() call - LP: #1207977 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1207977 * saa7134: Fix unlocked snd_pcm_stop() call - LP: #1207977 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1207977 * x86, suspend: Handle CPUs which fail to #GP on RDMSR - LP: #1207977 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1207977 * drm/i915: fix long-standing SNB regression in power consumption after resume v2 - LP: #1207977 * ACPI / video: ignore BIOS initial backlight value for Fujitsu E753 - LP: #1207977 * arm64: mm: don't treat user cache maintenance faults as writes - LP: #1207977 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1207977 * Btrfs: re-add root to dead root list if we stop dropping it - LP: #1207977 * drm/i915: inverted brightness quirk for Acer Aspire 4736Z - LP: #1207977 * drm/i915: quirk no PCH_PWM_ENABLE for Dell XPS13 backlight - LP: #1162026, #1163720, #1207977 * drm/i915: Serialize almost all register access - LP: #1207977 * drm/i915: fix up gt init sequence fallout - LP: #1207977 * powerpc/modules: Module CRC relocation fix causes perf issues - LP: #1207977 * sparc32: vm_area_struct access for old Sun SPARCs. - LP: #1207977 * sparc64 address-congruence property - LP: #1207977 * sparc: tsb must be flushed before tlb - LP: #1207977 * bridge: fix switched interval for MLD Query types - LP: #1207977 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1207977 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1207977 * macvtap: fix recovery from gup errors - LP: #1207977 * ipv6:
[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215677 Title: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215129 Title: linux: 3.5.0-40.62 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215276 Title: linux-ti-omap4: 3.5.0-232.48 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29 --- linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1215278 * [Config] Enable CONFIG_KUSER_HELPERS * Rebase onto Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 *
[Bug 1091188] Re: CVE-2012-5375
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1091188] Re: CVE-2012-5375
This bug was fixed in the package linux - 3.5.0-40.62 --- linux (3.5.0-40.62) quantal; urgency=low [ Brad Figg ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 linux (3.5.0-40.61) quantal; urgency=low [ Andy Whitcroft ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 [ John Johansen ] * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 [ Joseph Salisbury ] * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 [ Stefan Bader ] * (debian) Abort build on unresolved symbols - LP: #1166197 [ Tim Gardner ] * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 [ Upstream Kernel Changes ] * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 * ipv6:
[Bug 1091188] Re: CVE-2012-5375
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29 --- linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1215278 * [Config] Enable CONFIG_KUSER_HELPERS * Rebase onto Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 *
[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker
** Changed in: kernel-sru-workflow/promote-to-security Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-security Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) ** Changed in: kernel-sru-workflow/promote-to-updates Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-updates Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215278 Title: linux-armadaxp: 3.5.0-1621.29 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux - 3.5.0-40.62 --- linux (3.5.0-40.62) quantal; urgency=low [ Brad Figg ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 linux (3.5.0-40.61) quantal; urgency=low [ Andy Whitcroft ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 [ John Johansen ] * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 [ Joseph Salisbury ] * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 [ Stefan Bader ] * (debian) Abort build on unresolved symbols - LP: #1166197 [ Tim Gardner ] * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 [ Upstream Kernel Changes ] * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 * ipv6:
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux - 3.5.0-40.62 --- linux (3.5.0-40.62) quantal; urgency=low [ Brad Figg ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 linux (3.5.0-40.61) quantal; urgency=low [ Andy Whitcroft ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 [ John Johansen ] * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 [ Joseph Salisbury ] * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 [ Stefan Bader ] * (debian) Abort build on unresolved symbols - LP: #1166197 [ Tim Gardner ] * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 [ Upstream Kernel Changes ] * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 * ipv6:
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29 --- linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low [ Ike Panhc ] * Release Tracking Bug - LP: #1215278 * [Config] Enable CONFIG_KUSER_HELPERS * Rebase onto Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956 *
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1221536] [NEW] FFe: Sync xbae 4.60.4-5 (universe) from Debian unstable (main)
Public bug reported: Please sync xbae 4.60.4-5 (universe) from Debian unstable (main) Explanation of FeatureFreeze exception: Part of the lesstif2motif transition [1] in Debian. The following packages also need to be synced and built in the following order: xbae 4.60.4-5 grace 1:5.1.23-2 cernlib 20061220+dfsg3-4 paw 1:2.14.04.dfsg.2-9 geant321 1:3.21.14.dfsg-11 mclibs 20061220+dfsg3-3 [1] https://wiki.debian.org/lesstif2motifTransition Changelog entries since current saucy version 4.60.4-3: xbae (4.60.4-5) unstable; urgency=low * Upload to unstable, no other changes. -- Nicholas Breen nbr...@debian.org Sat, 24 Aug 2013 10:01:22 -0700 xbae (4.60.4-4) experimental; urgency=low * Upload to experimental. * Switch Build-Depends from lesstif to openmotif. This change is ABI- incompatible; the runtime package has been changed to libxbae4m and is not co-installable with the older, lesstif-based libxbae4 to reflect this incompatibility and prevent mixed dependencies. (Closes: #366193) * Update LDFLAGS invocation for proper passing of hardening flags. -- Nicholas Breen nbr...@debian.org Sun, 21 Jul 2013 16:07:45 -0700 ** Affects: xbae (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221536 Title: FFe: Sync xbae 4.60.4-5 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xbae/+bug/1221536/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1091188] Re: CVE-2012-5375
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1221534] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221534 Title: [LENOVO 7453W75] suspend/resume failure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221534/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 945749] Re: Mouse pointer jerky on login screen
A fix was never released... This is just ridiculous how AMD can't get the proper open source hardware support that Intel devices do on Ubuntu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/945749 Title: Mouse pointer jerky on login screen To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-themes-standard/+bug/945749/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1091187] Re: CVE-2012-5374
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1202161] Re: seccomp filter: execve(): Operation not permitted
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48 --- linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low * Release Tracking Bug - LP: #1215276 [ Paolo Pisati ] * SAUCE: fixup between 6288223947 and db7981259 * rebased on Ubuntu-3.5.0-40.62 [ Ubuntu: 3.5.0-40.62 ] * [Config] KUSER_HELPERS = Y * Release Tracking Bug - LP: #1215129 [ Ubuntu: 3.5.0-40.61 ] * [Packaging] supply perf with appropriate prefix to ensure use of local config - LP: #1206200 - CVE-2013-1060 * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS to prevent execve from granting privs - LP: #1202161 * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops - LP: #1210848 * (debian) Abort build on unresolved symbols - LP: #1166197 * [Config] Include rbd and kvm in the virtual inclusion list - LP: #1206961 * ALSA: usb: Parse UAC2 extension unit like for UAC1 - LP: #1212430 * Btrfs: fix hash overflow handling - LP: #1091187, #1091188 - CVE-2012-5375 * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side - LP: #1214956 * writeback: Fix periodic writeback after fs mount - LP: #1214956 * nfsd4: fix decoding of compounds across page boundaries - LP: #1214956 * ARM: shmobile: emev2 GIO3 resource fix - LP: #1214956 * uprobes: Fix return value in error handling path - LP: #1214956 * tracing: Fix irqs-off tag display in syscall tracing - LP: #1214956 * [CIFS] use sensible file nlink values if unprovided - LP: #1214956 * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL - LP: #1214956 * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK - LP: #1214956 * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries - LP: #1214956 * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow - LP: #1214956 * dm mpath: fix ioctl deadlock when no paths - LP: #1214956 * dm verity: fix inability to use a few specific devices sizes - LP: #1214956 * lockd: protect nlm_blocked access in nlmsvc_retry_blocked - LP: #1214956 * ext4: don't show usrquota/grpquota twice in /proc/mounts - LP: #1214956 * perf: Clone child context from parent context pmu - LP: #1214956 * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid scenario - LP: #1214956 * perf: Fix perf_lock_task_context() vs RCU - LP: #1214956 * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM - LP: #1214956 * drm/radeon/hdmi: make sure we have an afmt block assigned - LP: #1214956 * ACPI / memhotplug: Fix a stale pointer in error path - LP: #1214956 * PM / Sleep: avoid 'autosleep' in shutdown progress - LP: #1214956 * radeon kms: do not flush uninitialized hotplug work - LP: #1214956 * svcrdma: underflow issue in decode_write_list() - LP: #1214956 * ALSA: asihpi: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: atiixp: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: 6fire: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: ua101: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: usx2y: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ASoC: s6000: Fix unlocked snd_pcm_stop() call - LP: #1214956 * [media] saa7134: Fix unlocked snd_pcm_stop() call - LP: #1214956 * staging: line6: Fix unlocked snd_pcm_stop() call - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * ALSA: hda - Add new GPU codec ID to snd-hda - LP: #1214956 * Btrfs: fix lock leak when resuming snapshot deletion - LP: #1214956 * xen/blkback: Check device permissions before allowing OP_DISCARD - LP: #1214956 * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp - LP: #1214956 * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer information - LP: #1214956 * bridge: fix switched interval for MLD Query types - LP: #1214956 * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP sockets. - LP: #1214956 * ipv6: don't call addrconf_dst_alloc again when enable lo - LP: #1214956 * macvtap: fix recovery from gup errors - LP: #1214956 * ipv6: ip6_sk_dst_check() must not assume ipv6 dst - LP: #1214956 * af_key: fix info leaks in notify messages - LP: #1214956 * sh_eth: fix unhandled RFE interrupt - LP: #1214956 * neighbour: fix a race in neigh_destroy() - LP: #1214956 * x25: Fix broken locking in ioctl error paths. - LP: #1214956 * net: Swap ver and type in pppoe_hdr - LP: #1214956 * ipv6,mcast: always hold idev-lock before mca_lock - LP: #1214956 * l2tp: add missing .owner to struct pppox_proto - LP: #1214956 * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET pending data - LP: #1214956
[Bug 1221075] Re: Waking from Hibernate results in soft lockup - CPU# stuck for x seconds
Do you use zram? Did you install the zram-config package? If yes, remove it. This was the issue on my Dell laptop. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221075 Title: Waking from Hibernate results in soft lockup - CPU# stuck for x seconds To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221075/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1219669] Re: [Dell Latitude 3330] fwts high failure: \_SB_.PCI0:_OSC invalid UUID
Hello Anthony, This issue still exist with BIOS version A01. Please find attachment for fwts result. ** Attachment added: fwts_results.log https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219669/+attachment/3805135/+files/fwts_results.log ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1219669 Title: [Dell Latitude 3330] fwts high failure: \_SB_.PCI0:_OSC invalid UUID To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219669/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1220458] Re: Mir fails to start
Chris, Can you elaborate on what the problem is? Those kernel messages look purely informational (and indecipherable) to mere mortals. ** Also affects: mir Importance: Undecided Status: New ** Changed in: mir Status: New = Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1220458 Title: Mir fails to start To manage notifications about this bug go to: https://bugs.launchpad.net/mir/+bug/1220458/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215239] Re: linux-ec2: 2.6.32-356.69 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 03:01 UTC kernel-stable-master-bug:1215005 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 04:02 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 18:32 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 18:32 UTC kernel-stable-Promote-to-proposed-end:Monday, 26. August 2013 19:02 UTC kernel-stable-Verification-testing-start:Monday, 26. August 2013 20:03 UTC kernel-stable-Security-signoff-start:Monday, 26. August 2013 22:04 UTC kernel-stable-Verification-testing-end:Monday, 26. August 2013 22:04 UTC kernel-stable-Regression-testing-start:Monday, 26. August 2013 22:04 UTC kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 21:03 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:03 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215239 Title: linux-ec2: 2.6.32-356.69 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215239/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker
** Description changed: This bug is for tracking the 3.5.0-1621.29 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:35 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 09:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 09:03 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:02 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:03 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:03 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:03 UTC kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215278 Title: linux-armadaxp: 3.5.0-1621.29 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:34 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:03 UTC kernel-stable-Verification-testing-start:Thursday, 29. August 2013 03:03 UTC kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:02 UTC kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:02 UTC kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:02 UTC kernel-stable-Regression-testing-end:Friday, 30. August 2013 09:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:03 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 19:03 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:03 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215276 Title: linux-ti-omap4: 3.5.0-232.48 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:37 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:06 UTC kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:06 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:53 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:53 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:03 UTC kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:04 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:04 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:04 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:04 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:05 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215279 Title: linux-lowlatency: 3.5.0-40.41 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215005] Re: linux: 2.6.32-51.113 -proposed tracker
** Description changed: This bug is for tracking the 2.6.32-51.113 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 16:16 UTC kernel-stable-Prepare-package-end:Thursday, 22. August 2013 03:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 03:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 05:01 UTC kernel-stable-Verification-testing-start:Thursday, 22. August 2013 06:03 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:29 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:29 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:29 UTC kernel-stable-Regression-testing-end:Monday, 02. September 2013 19:01 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 12:01 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:01 UTC kernel-stable-phase-changed:Thursday, 05. September 2013 21:01 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 21:01 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:01 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215005 Title: linux: 2.6.32-51.113 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215005/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215173] Re: linux: 3.2.0-53.81 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-53.81 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 22:16 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 01:08 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 01:08 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 02:02 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 03:03 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:31 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 14:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:02 UTC kernel-stable-phase-changed:Thursday, 05. September 2013 20:02 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 20:02 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215173 Title: linux: 3.2.0-53.81 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215173/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker
** Description changed: This bug is for tracking the 3.5.0-40.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 20:25 UTC kernel-stable-Prepare-package-end:Thursday, 22. August 2013 05:41 UTC kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 05:41 UTC kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 06:04 UTC kernel-stable-Verification-testing-start:Thursday, 22. August 2013 07:09 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:30 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 09:01 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:02 UTC kernel-stable-phase-changed:Thursday, 05. September 2013 19:02 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:01 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:02 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215129 Title: linux: 3.5.0-40.62 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215692] Re: linux-lowlatency: 3.2.0-53.55 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:06 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:56 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:56 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:05 UTC kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:07 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:06 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:06 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:07 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 20:06 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:06 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:08 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215692 Title: linux-lowlatency: 3.2.0-53.55 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker
** Description changed: This bug is for tracking the 3.8.0-30.44~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 00:07 UTC kernel-stable-master-bug:1215596 kernel-stable-Prepare-package-end:Friday, 23. August 2013 20:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 20:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 21:04 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 22:04 UTC kernel-stable-Verification-testing-end:Sunday, 01. September 2013 15:05 UTC kernel-stable-Certification-testing-start:Sunday, 01. September 2013 15:05 UTC kernel-stable-Security-signoff-start:Sunday, 01. September 2013 15:06 UTC kernel-stable-Regression-testing-start:Sunday, 01. September 2013 15:05 UTC kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 13:06 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:05 UTC kernel-stable-phase-changed:Thursday, 05. September 2013 19:05 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:05 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:06 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215677 Title: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215690] Re: linux-armadaxp: 3.2.0-1624.36 -proposed tracker
** Description changed: This bug is for tracking the 3.2.0-1624.36 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:04 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 15:04 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 15:04 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:04 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:06 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:05 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:05 UTC kernel-stable-Regression-testing-end:Tuesday, 27. August 2013 16:06 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215690 Title: linux-armadaxp: 3.2.0-1624.36 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1098011] Re: atop unusable in Quantal: trap divide error
This bug no longer occurs in Raring. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1098011 Title: atop unusable in Quantal: trap divide error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/atop/+bug/1098011/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215689] Re: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker
** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:02 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:06 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:06 UTC kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:05 UTC kernel-stable-Verification-testing-start:Thursday, 29. August 2013 02:05 UTC kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:05 UTC kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:05 UTC kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:05 UTC kernel-stable-Regression-testing-end:Monday, 02. September 2013 09:05 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:07 UTC kernel-stable-phase:CopyToUpdates kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC + kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215689 Title: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1192460] Re: kscreen does not apply saved settings on start-up
Same behaviour with 1.0.1-0ubuntu1~ubuntu1. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1192460 Title: kscreen does not apply saved settings on start-up To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kscreen/+bug/1192460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1205097] Re: HUD isn't working
Fix committed into lp:hud at revision 319, scheduled for release in hud, milestone Unknown ** Changed in: hud Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1205097 Title: HUD isn't working To manage notifications about this bug go to: https://bugs.launchpad.net/hud/+bug/1205097/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1219652] Re: [Dell Latitude 3330] Wireless key does not work.
Hello, With v3.11 kernel, the wireless key still behave like v3.8 kernel. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1219652 Title: [Dell Latitude 3330] Wireless key does not work. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219652/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221514] Re: Hot Keys and Abbreviations have Stopped Working
I just reinstalled Ubuntu 13.10 from the daily build: http://cdimage.ubuntu.com/daily-live/current/ This did NOT resolve my issue with AutoKey-GTK. Without hotkeys or abbreviations functioning, autokey is practically useless. Please confirm this bug and deem it critical. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221514 Title: Hot Keys and Abbreviations have Stopped Working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221514/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1160558] Re: AutoKey-QT Missing Indicator After Launched as Startup Application
I just reinstalled Ubuntu 13.10 from the daily build: http://cdimage.ubuntu.com/daily-live/current/ This did NOT resolved the missing-indicator issue. Please confirm this bug, and deem it critical. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1160558 Title: AutoKey-QT Missing Indicator After Launched as Startup Application To manage notifications about this bug go to: https://bugs.launchpad.net/unity/+bug/1160558/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1197316] Re: GPU hang with Haswell GT3
marking as verified on raring, since the 9.1.4 update is already on precise as lts backport, and seemingly working fine there -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1197316 Title: GPU hang with Haswell GT3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1197316/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 966839] Re: Top bar still shows in fullscreen wine games
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: wine1.4 (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/966839 Title: Top bar still shows in fullscreen wine games To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wine1.4/+bug/966839/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221544] [NEW] Choice of destination folder for Screenshot lost
Public bug reported: Screenshot destination folder now defaults to Pictures, was previously user-selectable in Screenshot GUI. I realise this probably reflects a conscious decision rather than an unintentional omission: someone just said to themselves: The user may previously have been able to select the destination folder for Screenshots, but now I shall discontinue that option, because I can't be bothered to include it. Someone on AskUbuntu com a href=http://askubuntu.com/questions/114429/default-save- directory-for-gnome-screenshottimidly asks/a: Is this a bug? As far as I'm concerned it is, and you ought to restore the user option to select the destination folder. I shall take this opportunity to remind you that a month ago I a href=https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1208719;reported another lost function/a, namely the progress bar across the Thunderbird launcher indicating unread mail, and no-one has even bothered to notice this report, assess it, or allocate it to a bug category. That report itself was a follow-up to a previous bug fix that purported to restore the lost function but failed to do so. Hopefully these facts speak for themselves, so I shall refrain from making disparaging remarks about them. ** Affects: thunderbird (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221544 Title: Choice of destination folder for Screenshot lost To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1221544/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1217189] Re: Buffer I/O error on device zram0 (possibly causing complete machine lockup)
@damian-sawicki: a lot of people have zram due to the zram-config package, which you must remove with dpkg --purge zram-config (otherwise it won't go away completely). But in my case zram *still* starts up, and I can't track what sets it up. I think the easy solution is to break the zram modules (e.g. rename zram.ko to zram.ko.save in the appropriate /lib/modules directory) Of course, it would be great to get working zram again. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1217189 Title: Buffer I/O error on device zram0 (possibly causing complete machine lockup) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-lts-raring/+bug/1217189/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1084378] Re: [Feature] RDRAND enabling for rngd
This can actually be done using command line options in the official (git://git.kernel.org/pub/scm/utils/kernel/rng-tools /rng-tools.git) rng-tools, but not the version in this Ubuntu package. From commend #4, the rng-tools in Ubuntu 13.10 is the same as official upstream. Does rng-tools in ubuntu 13.10 still have the issue your mentioned ? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1084378 Title: [Feature] RDRAND enabling for rngd To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1084378/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1218753] Re: [HP 4520S, 3.11 regression] Keyboard stops working after S3
@Joseph, I was running 3.10.10 yesterday and didn't experience the bug, so I *think* it's safe. Btw, do you have any script or documentation on how to do a git bisect (in combination with Ubuntu packaging)? If so I can probably do the bisect myself. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1218753 Title: [HP 4520S, 3.11 regression] Keyboard stops working after S3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218753/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215630] Re: [Alt-Tab] Hover on alt-tab easily bumped
Fix committed into lp:unity at revision None, scheduled for release in unity, milestone 7.1.1 ** Changed in: unity Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215630 Title: [Alt-Tab] Hover on alt-tab easily bumped To manage notifications about this bug go to: https://bugs.launchpad.net/ayatana-design/+bug/1215630/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1218815] Re: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only
It's been suggested we have an incorrect stride value for scanout buffers (even when they're not being scanned out). That would certainly agree with the screenshot in comment #5. So I think a fix is required via mir_surface_get_current_buffer() ?... _X_EXPORT int32_t xmir_window_get_stride(xmir_window *xmir_win) { MirBufferPackage *package; mir_surface_get_current_buffer(xmir_win-surface, package); return package-stride; } ** Also affects: mir Importance: Undecided Status: New ** Changed in: mir Status: New = Triaged ** Changed in: mir Importance: Undecided = Critical -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1218815 Title: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only To manage notifications about this bug go to: https://bugs.launchpad.net/mir/+bug/1218815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221548] [NEW] Can't Create HotKeys for Phrases or Scripts
Public bug reported: I attempted create a hotkey for one of the default phrases that comes with autokey. I was unable to achieve this; I was able to select the control keys I wanted (using the mouse), but upon hitting a particular key (on the keyboard), it would not register that key. ProblemType: Bug DistroRelease: Ubuntu 13.10 Package: autokey-gtk 0.90.1-1.1 ProcVersionSignature: Ubuntu 3.11.0-4.9-generic 3.11.0-rc7 Uname: Linux 3.11.0-4-generic x86_64 NonfreeKernelModules: wl ApportVersion: 2.12.1-0ubuntu3 Architecture: amd64 Date: Fri Sep 6 01:42:11 2013 InstallationDate: Installed on 2013-09-06 (0 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Alpha amd64 (20130905) MarkForUpload: True PackageArchitecture: all SourcePackage: autokey UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: autokey (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug saucy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221548 Title: Can't Create HotKeys for Phrases or Scripts To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221548/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221547] [NEW] nvidia-173
Public bug reported: System crashed while doing update. ProblemType: Package DistroRelease: Ubuntu 12.04 Package: virtualbox-dkms 4.1.12-dfsg-2ubuntu0.3 ProcVersionSignature: Ubuntu 3.8.0-29.42~precise1-generic 3.8.13.5 Uname: Linux 3.8.0-29-generic x86_64 ApportVersion: 2.0.1-0ubuntu17.4 Architecture: amd64 DKMSKernelVersion: 3.8.0-30-generic Date: Fri Sep 6 07:35:09 2013 InstallationMedia: Ubuntu 12.04.3 LTS Precise Pangolin - Release amd64 (20130820.1) MarkForUpload: True PackageArchitecture: all PackageVersion: 4.1.12-dfsg-2ubuntu0.3 SourcePackage: virtualbox Title: virtualbox-dkms 4.1.12-dfsg-2ubuntu0.3: virtualbox kernel module failed to build UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: virtualbox (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package precise -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221547 Title: nvidia-173 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1221547/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1218278] Re: When creating a swap device using zram I get Buffer I/O errors
Changed to Confirmed as per @jsalisbury's instructions, since @konrad.hofer forgot to. In any case, I doubt raring (and thus linux- lts-raring on precise) will upgrade to 3.11. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1218278 Title: When creating a swap device using zram I get Buffer I/O errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1217189] Re: Buffer I/O error on device zram0 (possibly causing complete machine lockup)
Bug #1218278 might be a duplicate (though it doesn't talk about lock- ups). Apparently this is fixed in 3.11, though I don't see how this helps with raring and linux-lts-raring. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1217189 Title: Buffer I/O error on device zram0 (possibly causing complete machine lockup) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-lts-raring/+bug/1217189/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221547] Re: nvidia-173
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221547 Title: nvidia-173 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1221547/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1218278] Re: When creating a swap device using zram I get Buffer I/O errors
might be related to bug #1217189 which raises the possibility of hard machine LOCK-UPS due to zram errors. I've had several such lock-ups on precise after the most recent linux-lts-raring updates (and none before that) that seemed to go away after disabling zram. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1218278 Title: When creating a swap device using zram I get Buffer I/O errors To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215826] Re: Lost ability to remap Caps Lock to Ctrl
My experience after the first few minutes, where it was in flux, sometimes operating as Caps_Lock and sometimes as BackSpace, was that it settled down to acting as BackSpace (as configured) but would not repeat—viz., holding backspace deleted many characters, while holding caps lock deleted only one character. I've found that using xmodmap to remap the caps lock key's keycode to BackSpace works to make it repeat correctly. For me, the Caps Lock key is keycode 66; I believe this may vary from machine to machine. If that be so, you can find out what it is for you with ``xev`` (run it, press the caps lock key, look for the keycode part). xmodmap -e 'keycode 66 = BackSpace' I believe that putting the keycode 66 = BackSpace line in ~/.Xmodmap is supposed to fix it automatically on login; I don't know as I haven't closed my session since applying this fix. If not, I guess it could go somewhere else. (Something which would be executed at X startup time?) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215826 Title: Lost ability to remap Caps Lock to Ctrl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/indicator-keyboard/+bug/1215826/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221514] Re: Hot Keys and Abbreviations have Stopped Working
In an attempt to see if my own configuration was corrupted, I backup my autokey configuration at: /home/user/.config/autokey Then I deleted it, and launched autokey. It created a brand new folder at that same location. I then attempted create a hotkey for one of the default phrases that comes with autokey. I was unable to achieve this; I was able to select the control keys I wanted (using the mouse), but upon hitting a particular key (on the keyboard), it would not register that key: https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221548 Unfortunately, this ends my testing of Ubuntu 13.10 alpha. I'm was fine with running this alpha (for 8 days) until AutoKey stopped working. I'm going back to 13.04, and I'll upgrade again in a couple of week if these autokey issues are resolved. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221514 Title: Hot Keys and Abbreviations have Stopped Working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221514/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221549] [NEW] Unable to set a hotkey for keyboard layout switching
Public bug reported: As for now it's impossible to switch keyboard layout via hotkey. And also impossible to set such hotkey. An Regional Langiage window has field Switch to next source using and Switch to previous source using but those fields stay empty. The same thing is for Keyboard - Typing: similar settings stay Disabled whatever I do. The only hotkey could be set is Ctrl + Space but I don't like it and want to set CapsLock as I used to use. ** Affects: ubuntu Importance: Undecided Status: New ** Package changed: network-manager-vpnc (Ubuntu) = ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221549 Title: Unable to set a hotkey for keyboard layout switching To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1221549/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: udev (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1212977 Title: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: casper (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1212977 Title: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221551] [NEW] Network-manager 0.9.8.0/0.9.8.0-1 can not be connected to the network via 3G modems. Please replace it with network-manager 0.9.8-2.
Public bug reported: This error occurs only netvork-manager 0.9.8.0/0.9.8-1. In network- manager 0.9.8-2 is resolved. ** Affects: network-manager (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221551 Title: Network-manager 0.9.8.0/0.9.8.0-1 can not be connected to the network via 3G modems. Please replace it with network-manager 0.9.8-2. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1221551/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1219789] Re: [Toshiba NB100-11J] 3.2.0-52-generic freezes
Yesterday evening I flashed the BIOS of my NB100-11J (thanks to a utility called Rufus (http://rufus.akeo.ie/)). It wasn't easy, I had to strip the flash utility (flashit.exe) and the new ROM-image from iso and floppy images. The BIOS was upgraded from version 1.20 to version 2.10. (I could not find a newer version.) Anyway, after reboot the system halted within the hour. So the new BIOS had no affect. Afterwards I rebooted from the previous kernel version. The answer on your request : gerard@NB100:~$ sudo dmidecode -s bios-version sudo dmidecode -s bios-release-date [sudo] password for gerard: 2.10 07/29/2009 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1219789 Title: [Toshiba NB100-11J] 3.2.0-52-generic freezes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219789/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell
I have this issue too. I have had no issues with live iso images up until saucy. Booting and after leaving and doing CTRL+D. I get a lovely kernel panic with the message: /init: line 352: can't open /root/dev/console: no such file Kernel panic - not syncing: Attempted to kill init! exitcode 0x0200 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1212977 Title: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215005] Re: linux: 2.6.32-51.113 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 2.6.32-51.113 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 16:16 UTC kernel-stable-Prepare-package-end:Thursday, 22. August 2013 03:03 UTC kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 03:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 05:01 UTC kernel-stable-Verification-testing-start:Thursday, 22. August 2013 06:03 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:29 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:29 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:29 UTC kernel-stable-Regression-testing-end:Monday, 02. September 2013 19:01 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 12:01 UTC - kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:01 UTC - kernel-stable-phase-changed:Thursday, 05. September 2013 21:01 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 21:01 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:01 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:04 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215005 Title: linux: 2.6.32-51.113 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215005/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell
From #39 also Q3. Doing a dist-upgrade from 13.04 is fine. There are no issuesas I have seen on the 20 times I have done it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1212977 Title: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221556] [NEW] i3lock fails to authentificate and unlock screen sometimes
Public bug reported: Description:Ubuntu Saucy Salamander (development branch) Release:13.10 i3lock: Installed: 2.5-1 Candidate: 2.5-1 Version table: *** 2.5-1 0 500 http://ru.archive.ubuntu.com/ubuntu/ saucy/universe amd64 Packages 100 /var/lib/dpkg/status Sometimes i can't get my screen unlocked back and i had to switch to the text console by Ctrl-Alt-F2, log in there and kill the locker. There are auth error messages in /var/log/auth.log appear on unlock attempt: Sep 6 09:19:34 zimbabve unix_chkpwd[28581]: password check failed for user (mike) Sep 6 09:19:34 zimbabve i3lock: pam_unix(i3lock:auth): authentication failure; logname= uid=1000 euid=1000 tty= ruser= rhost= user=mike Googling discovers only the fact that this behavior is common for some other lockers like Xlock and so on. Maybe systemd-logind related bug ** Affects: i3lock (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221556 Title: i3lock fails to authentificate and unlock screen sometimes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/i3lock/+bug/1221556/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215173] Re: linux: 3.2.0-53.81 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.2.0-53.81 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 22:16 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 01:08 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 01:08 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 02:02 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 03:03 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:31 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:31 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 14:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC - kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:02 UTC - kernel-stable-phase-changed:Thursday, 05. September 2013 20:02 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 20:02 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:08 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215173 Title: linux: 3.2.0-53.81 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215173/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1171435] Re: [AV200 - Xonar STX, recording] Microphone is not working on frontpanel
Raymond, I tried every 4 options in Sound settings in input tab Each option does not work. It is actual on Ubuntu 13.10 x64, 3.11 kernel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1171435 Title: [AV200 - Xonar STX, recording] Microphone is not working on frontpanel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1171435/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215239] Re: linux-ec2: 2.6.32-356.69 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 03:01 UTC kernel-stable-master-bug:1215005 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 04:02 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 18:32 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 18:32 UTC kernel-stable-Promote-to-proposed-end:Monday, 26. August 2013 19:02 UTC kernel-stable-Verification-testing-start:Monday, 26. August 2013 20:03 UTC kernel-stable-Security-signoff-start:Monday, 26. August 2013 22:04 UTC kernel-stable-Verification-testing-end:Monday, 26. August 2013 22:04 UTC kernel-stable-Regression-testing-start:Monday, 26. August 2013 22:04 UTC kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 21:03 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:03 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:09 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215239 Title: linux-ec2: 2.6.32-356.69 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215239/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:34 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:03 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:03 UTC kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:03 UTC kernel-stable-Verification-testing-start:Thursday, 29. August 2013 03:03 UTC kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:02 UTC kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:02 UTC kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:02 UTC kernel-stable-Regression-testing-end:Friday, 30. August 2013 09:02 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:03 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 19:03 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:03 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:09 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215276 Title: linux-ti-omap4: 3.5.0-232.48 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.5.0-40.62 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 20:25 UTC kernel-stable-Prepare-package-end:Thursday, 22. August 2013 05:41 UTC kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 05:41 UTC kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 06:04 UTC kernel-stable-Verification-testing-start:Thursday, 22. August 2013 07:09 UTC kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:30 UTC kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:30 UTC kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 09:01 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC - kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:02 UTC - kernel-stable-phase-changed:Thursday, 05. September 2013 19:02 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:01 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:02 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:06 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215129 Title: linux: 3.5.0-40.62 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:37 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:06 UTC kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:06 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:53 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:53 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:03 UTC kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:04 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:04 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:04 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:04 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:05 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:11 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215279 Title: linux-lowlatency: 3.5.0-40.41 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.8.0-30.44~precise1 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 00:07 UTC kernel-stable-master-bug:1215596 kernel-stable-Prepare-package-end:Friday, 23. August 2013 20:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 20:02 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 21:04 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 22:04 UTC kernel-stable-Verification-testing-end:Sunday, 01. September 2013 15:05 UTC kernel-stable-Certification-testing-start:Sunday, 01. September 2013 15:05 UTC kernel-stable-Security-signoff-start:Sunday, 01. September 2013 15:06 UTC kernel-stable-Regression-testing-start:Sunday, 01. September 2013 15:05 UTC kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 13:06 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:06 UTC - kernel-stable-phase:CopyToUpdates kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:05 UTC - kernel-stable-phase-changed:Thursday, 05. September 2013 19:05 UTC kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:05 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:06 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:13 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215677 Title: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215690] Re: linux-armadaxp: 3.2.0-1624.36 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.2.0-1624.36 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:04 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 15:04 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 15:04 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:04 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:06 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:05 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:05 UTC kernel-stable-Regression-testing-end:Tuesday, 27. August 2013 16:06 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:14 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215690 Title: linux-armadaxp: 3.2.0-1624.36 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215690/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215689] Re: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:02 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:06 UTC kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:06 UTC kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:05 UTC kernel-stable-Verification-testing-start:Thursday, 29. August 2013 02:05 UTC kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:05 UTC kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:05 UTC kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:05 UTC kernel-stable-Regression-testing-end:Monday, 02. September 2013 09:05 UTC kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:07 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:14 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215689 Title: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215689/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1218815] Re: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only
So, this might be due to differing radeon_surface layouts based on the RADEON_SURF_SCANOUT flag. tvoss can apparently reproduce this, and it goes away when he *doesn't* add the SCANOUT flag to the gbm bo in Mir¹. XMir never sets RADEON_SURF_SCANOUT, so it's plausible that this is the issue. ¹: Luckily, it appears that this buffer still happens to be scanoutable ☺ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1218815 Title: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only To manage notifications about this bug go to: https://bugs.launchpad.net/mir/+bug/1218815/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.5.0-1621.29 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:35 UTC kernel-stable-master-bug:1215129 kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:05 UTC kernel-stable-Prepare-package-end:Friday, 23. August 2013 09:02 UTC kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 09:03 UTC kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:02 UTC kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:03 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:03 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:03 UTC kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:10 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215278 Title: linux-armadaxp: 3.5.0-1621.29 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1215692] Re: linux-lowlatency: 3.2.0-53.55 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-sru-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the version to be filled upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:06 UTC kernel-stable-master-bug:1215173 kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:56 UTC kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:56 UTC kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:05 UTC kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:07 UTC kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:06 UTC kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:06 UTC kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:07 UTC - kernel-stable-phase:CopyToUpdates - kernel-stable-phase-changed:Thursday, 05. September 2013 20:06 UTC kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:06 UTC kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:08 UTC + kernel-stable-phase:Released + kernel-stable-phase-changed:Friday, 06. September 2013 07:15 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1215692 Title: linux-lowlatency: 3.2.0-53.55 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 862430] Re: window flicker for a short time after switching workspaces
Thanks for posting back Gregory. It looks like my earlier problems with Doug's fix had to do with having a second monitor connected. Now that I'm home with just the laptop screen there's no flicker. I'll confirm this tomorrow when I reconnect the second monitor, in the mean time I'm really enjoying the lack of flicker, it's like 10.04 all over again! Thanks Doug! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/862430 Title: window flicker for a short time after switching workspaces To manage notifications about this bug go to: https://bugs.launchpad.net/compiz/+bug/862430/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1219212] Re: USB Keyboard and Mouse stop working after update to 3.5.0-39
3.5.0-40.62 is in -updates now. ** Changed in: linux (Ubuntu) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1219212 Title: USB Keyboard and Mouse stop working after update to 3.5.0-39 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219212/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214956] Re: Quantal update to 3.5.7.20 stable release
** Changed in: linux (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214956 Title: Quantal update to 3.5.7.20 stable release To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1214956/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1200277] Re: [LibreOffice] - libreoffice-writer.desktop when drag/drop to desktop, 100% broken.
** Project changed: df-libreoffice = gnome-panel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1200277 Title: [LibreOffice] - libreoffice-writer.desktop when drag/drop to desktop, 100% broken. To manage notifications about this bug go to: https://bugs.launchpad.net/gnome-panel/+bug/1200277/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 748850] Re: Can't middle or right click on bookmarks to open in new tab
I'm using Precise 64 bit with Firefox 23.0. I've also tried the nightly build of firefox-trunk (version 26.0a1) but the bug wasn't fixed in that. I'm baffled by how the status of this bug against Global Menubar Extension is 'Fix committed' when that addon seems now to have been withdrawn for Ubuntu. I've reported this bug as bug 913556 against Firefox in Bugzilla. Judging by the number of bugs in Firefox which are not allocated, I wonder if it will ever be fixed! Re David Marzal's suggestion of using the addon bug582139: I've installed it restarted Firefox, clicked ViewToolbarsCustomise but I don't see any Bookmarks icon with an arrow by it in the popup containing icons. Nor do I see it anywhere else. If I use the standard Bookmarks icon, I still get the same incorrect behaviour. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/748850 Title: Can't middle or right click on bookmarks to open in new tab To manage notifications about this bug go to: https://bugs.launchpad.net/globalmenu-extension/+bug/748850/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs