[Bug 1221704] [NEW] package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2013-09-06 Thread Patrick
Public bug reported:

installArchives() failed: Preconfiguring packages ...
Preconfiguring packages ...
Preconfiguring packages ...
Preconfiguring packages ...
(Reading database ... 
(Reading database ... 5%%
(Reading database ... 10%%
(Reading database ... 15%%
(Reading database ... 20%%
(Reading database ... 25%%
(Reading database ... 30%%
(Reading database ... 35%%
(Reading database ... 40%%
(Reading database ... 45%%
(Reading database ... 50%%
(Reading database ... 55%%
(Reading database ... 60%%
(Reading database ... 65%%
(Reading database ... 70%%
(Reading database ... 75%%
(Reading database ... 80%%
(Reading database ... 85%%
(Reading database ... 90%%
(Reading database ... 95%%
(Reading database ... 100%%
(Reading database ... 263932 files and directories currently installed.)
Preparing to replace php5-cli 5.3.10-1ubuntu3.7 (using 
.../php5-cli_5.3.10-1ubuntu3.8_amd64.deb) ...
Unpacking replacement php5-cli ...
Preparing to replace libapache2-mod-php5 5.3.10-1ubuntu3.7 (using 
.../libapache2-mod-php5_5.3.10-1ubuntu3.8_amd64.deb) ...
Unpacking replacement libapache2-mod-php5 ...
Preparing to replace php5-common 5.3.10-1ubuntu3.7 (using 
.../php5-common_5.3.10-1ubuntu3.8_amd64.deb) ...
Unpacking replacement php5-common ...
Preparing to replace initramfs-tools 0.99ubuntu13.1 (using 
.../initramfs-tools_0.99ubuntu13.2_all.deb) ...
Unpacking replacement initramfs-tools ...
Preparing to replace initramfs-tools-bin 0.99ubuntu13.1 (using 
.../initramfs-tools-bin_0.99ubuntu13.2_amd64.deb) ...
Unpacking replacement initramfs-tools-bin ...
Preparing to replace apparmor 2.7.102-0ubuntu3.8 (using 
.../apparmor_2.7.102-0ubuntu3.9_amd64.deb) ...
Unpacking replacement apparmor ...
Preparing to replace libroken18-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libroken18-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libroken18-heimdal ...
Preparing to replace libasn1-8-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libasn1-8-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libasn1-8-heimdal ...
Preparing to replace libhcrypto4-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libhcrypto4-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libhcrypto4-heimdal ...
Preparing to replace libheimbase1-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libheimbase1-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libheimbase1-heimdal ...
Preparing to replace libwind0-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libwind0-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libwind0-heimdal ...
Preparing to replace libhx509-5-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libhx509-5-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libhx509-5-heimdal ...
Preparing to replace libkrb5-26-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libkrb5-26-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libkrb5-26-heimdal ...
Preparing to replace libheimntlm0-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libheimntlm0-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libheimntlm0-heimdal ...
Preparing to replace libgssapi3-heimdal 1.6~git20120311.dfsg.1-2 (using 
.../libgssapi3-heimdal_1.6~git20120311.dfsg.1-2ubuntu0.1_amd64.deb) ...
Unpacking replacement libgssapi3-heimdal ...
Selecting previously unselected package linux-image-3.5.0-40-generic.
Unpacking linux-image-3.5.0-40-generic (from 
.../linux-image-3.5.0-40-generic_3.5.0-40.62~precise1_amd64.deb) ...
Done.
Preparing to replace libnm-util2 0.9.4.0-0ubuntu4.2 (using 
.../libnm-util2_0.9.4.0-0ubuntu4.3_amd64.deb) ...
Unpacking replacement libnm-util2 ...
Preparing to replace libnm-glib4 0.9.4.0-0ubuntu4.2 (using 
.../libnm-glib4_0.9.4.0-0ubuntu4.3_amd64.deb) ...
Unpacking replacement libnm-glib4 ...
Preparing to replace network-manager 0.9.4.0-0ubuntu4.2 (using 
.../network-manager_0.9.4.0-0ubuntu4.3_amd64.deb) ...
Unpacking replacement network-manager ...
Preparing to replace duplicity 0.6.18-0ubuntu3.1 (using 
.../duplicity_0.6.18-0ubuntu3.2_amd64.deb) ...
Unpacking replacement duplicity ...
Preparing to replace libnm-glib-vpn1 0.9.4.0-0ubuntu4.2 (using 
.../libnm-glib-vpn1_0.9.4.0-0ubuntu4.3_amd64.deb) ...
Unpacking replacement libnm-glib-vpn1 ...
Preparing to replace linux-image-generic-lts-quantal 3.5.0.39.45 (using 
.../linux-image-generic-lts-quantal_3.5.0.40.46_amd64.deb) ...
Unpacking replacement linux-image-generic-lts-quantal ...
Selecting previously unselected package linux-headers-3.5.0-40.
Unpacking linux-headers-3.5.0-40 (from 
.../linux-headers-3.5.0-40_3.5.0-40.62~precise1_all.deb) ...
Selecting previously unselected package linux-headers-3.5.0-40-generic.
Unpacking linux-headers-3.5.0-40-generic (from 
.../linux-headers-3.5.0-40-generic_3.5.0-40.62~precise1_amd64.deb) ...
Preparing to replace linux-headers-generic-lts-quantal 3.5.0.39.45 (using 

[Bug 1221704] Re: package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1

2013-09-06 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to nagios3 in Ubuntu.
https://bugs.launchpad.net/bugs/1221704

Title:
  package nagios3-common 3.2.3-3ubuntu1 failed to install/upgrade:
  subprocess installed post-installation script returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nagios3/+bug/1221704/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1196218] Re: setting at event causes root partition to fill

2013-09-06 Thread Marcello Romani
While in my home dir, I typed
at 19:00
(the exact time is not important).
The at console appeared.
I then typed
myplayer song.mp3
(song.mp3 is in my home dir)
Then pressed CTRL+D

That's all.

Did a test a few minutes ago: / usage starts to grow as soon as the scheduled 
action starts.
It keeps growning even after the action is complete, until / is full.

A sudo /etc/init.d/atd restart is enough to stop the growth and bring
the / usage back to its previous level.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to at in Ubuntu.
https://bugs.launchpad.net/bugs/1196218

Title:
  setting at event causes root partition to fill

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/at/+bug/1196218/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1025051] Re: package fetchmail 6.3.21-2 failed to install/upgrade: subprocess installed pre-removal script returned error exit status 6

2013-09-06 Thread Thomas Azar
I guess my point is that I can no longer give information about this
particular bug. I don't use fetchmail anymore, and I certainly can't
remember my circumstances around it from over a year ago.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to fetchmail in Ubuntu.
https://bugs.launchpad.net/bugs/1025051

Title:
  package fetchmail 6.3.21-2 failed to install/upgrade: subprocess
  installed pre-removal script returned error exit status 6

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/fetchmail/+bug/1025051/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy

2013-09-06 Thread Serge Hallyn
Blueprint changed by Serge Hallyn:

Work items changed:
  Work items:
  [serge-hallyn] (Dwight is pushing this, but has no lp id) Push fix for XFS 
and user namespaces: DONE
  [serge-hallyn] Fix lxc-net to be nestable with no user interaction: DONE
  [serge-hallyn] Write sysctl to disable unprivileged CLONE_NEWUSER: DONE
  [serge-hallyn] Exploit stacked apparmor profiles for container nesting: 
BLOCKED
  [serge-hallyn] Ask jjohansen about any apparmor kernel/userspace packages we 
can put in ubuntu-lxc ppa for testing stacked (0.5): DONE
  [serge-hallyn] Bisect kernel signal delivery bug affecting lxc: DONE
  [serge-hallyn] Improve cgroup support in nested case: DONE
  [serge-hallyn] write POC of nestable cgroup manager: POSTPONED
  [serge-hallyn] Pursue subuid patchset for shadow: DONE
  [serge-hallyn] Enable unprivileged container creation: DONE
  [serge-hallyn] Write a privileged helper to facilitate unprivileged networked 
container: DONE
  [serge-hallyn] Enable unprivileged container starting (network): POSTPONED
  [serge-hallyn] Enable unprivileged container starting (cgroups): DONE
  [serge-hallyn] Enable unprivileged container starting (complete): POSTPONED
  [serge-hallyn] Add console support to API (Dwight): DONE
  [serge-hallyn] Add attach support to API (Christian): DONE
  [serge-hallyn] Convert create to API: DONE
  [serge-hallyn] Convert stop to API: DONE
  [serge-hallyn] Convert destroy to API: DONE
  [serge-hallyn] List lxc programs to be converted to API 
(https://wiki.ubuntu.com/LxcAPIConversion): DONE
  [serge-hallyn] Update locking in API to handle killed programs: DONE
  [serge-hallyn] Update container creation to handle SIGKILL (using 'partial' 
file): DONE
  [serge-hallyn] Improve thread safety in API: DONE
  [serge-hallyn] Discuss upstream stable branches with upstream (sent email to 
list): DONE
  [serge-hallyn] Get CONFIG_USER_NS=y into kernel (as soon as saucy+1 opens): 
POSTPONED
  [serge-hallyn] Merge qemu 1.5.0: DONE
  [serge-hallyn] Write loopback backingstore driver: DONE
  [serge-hallyn] Write qemu-nbd backingstore driver: POSTPONED
  [serge-hallyn] Investigate openvswitch bridges by default in libvirt (1): DONE
  [serge-hallyn] Merge cgroup-lite into libcgroup (depends on libcgroup 
sysvinit scripts): POSTPONED
  [serge-hallyn] Default-off support for per-user cgroup configuration at 
boot/login: POSTPONED
  [smoser] Ensure that lxc-ubuntu-cloud can be used with cloudinit for 
openstack: DONE
  [serge-hallyn] start live block migration testing using juju of libvirt+kvm 
with local storage (1): DONE
  [smoser] use simplestreams to provide secure ubuntu-cloud deliver to lxc: 
POSTPONED
  [zulcss] Merge libvirt 1.0.6: DONE
  [serge-hallyn] no-change libvirt push to pick up new xen libraries (0): 
BLOCKED
  [smb] Pick up upstream Xen-4.3 release: DONE
  [smb] Refresh Debian/Ubuntu patches against Xen: DONE
  [smb] Decide how to include qemu-upstream: DONE
  [smb] Update packaging to allow libvirt to build the libxl driver: DONE
  [smb] Unit testing with xm and xl stack (native and libvirt): DONE
  [smb] Enable Xen compile for armhf: DONE
  [smb] Merge xen 4.3: DONE
  [zulcss] Write a nova using the lxc API: INPROGRESS
  
  Work items for ubuntu-13.09:
  [serge-hallyn] Work distro lxc tests upstream (2): TODO
- [serge-hallyn] Solve monitor versioning in lxc (1): TODO
  [zulcss] Push nova-lxc driver upstream: TODO
- [serge-hallyn] Add snapshot support to API (3): TODO
+ [serge-hallyn] Add snapshot support to API (3): INPROGRESS
  [serge-hallyn] Discuss API versioning of library and (python, lua, etc) hooks 
at plumbers: TODO
  [serge-hallyn] complete live block migration testing (using juju?) of 
libvirt+kvm with local storage (1): TODO
  [zulcss] Follow up with Citrix's plans for xcp: TODO
  [smb] PUsh xen 4.3 to archive: TODO
  
  Work items for ubuntu-13.10:
  [serge-hallyn] Pursue patch for ovmf to provide save/restore of nvvars to 
support boot variables (3): TODO
  [serge-hallyn] live block migration testing using juju of libvirt+kvm with 
ceph (2): TODO
  [zulcss] Fix apparmor bug preventing libvirt-lxc from mounting blockdevs: TODO

-- 
Virtualization Stack Work for Saucy
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1183135] Re: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg

2013-09-06 Thread Samantha Jian-Pielak
NIC: Intel 82540EM Gigabit Ethernet Controller

e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI (from
attached dmesg)

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to irqbalance in Ubuntu.
https://bugs.launchpad.net/bugs/1183135

Title:
  On running network and I/O traffic on SM15000-XE, BUG: soft lockup --
  CPU#0 stuck for 22s! seen on dmesg

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/irqbalance/+bug/1183135/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy

2013-09-06 Thread Serge Hallyn
Blueprint changed by Serge Hallyn:

Whiteboard changed:
  [USER STORIES]
  
  Abe would like to run untrusted workloads in a container.
  
  Billy would like for his users to be able to use containers without
  giving them root access.
  
  Charlie would like to confine users with flexible cgroups.
  
  Denise is writing an application using containers, and wants to re-use
  the tested core lxc API.
  
  Erica would like openstack-lxc users to have all the advanced features
  of lxc (apparmor protection, nesting, etc).
  
  [ASSUMPTIONS]
  
  A fix is accepted upstream to allow user namespaces to be used alongside
  XFS.
  
  [USER ACCEPTANCE]
  
  Set up a user with subuids and use it to create and run a container.
  
  [RELEASE NOTE/BLOG]
  
  User namespaces, apparmor, and seccomp are now leveraged to provide a
  secure container environment.
  
  Containers can now be created and used by unprivileged users.
  
  There is built-in support for boot-time configuration of control
  groups.
+ 
+ [NOTES]
+ 
+ Note that work items targetd to ubuntu-13.09 and ubuntu-13.10 are
+ targeted for completion upstream during saucy cycle, but not to
+ hit saucy.  Note that ovmf work will not be complete upstream,
+ this item is to investigate and organize (pursue).

-- 
Virtualization Stack Work for Saucy
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Blueprint servercloud-s-virtstack] Virtualization Stack Work for Saucy

2013-09-06 Thread Serge Hallyn
Blueprint changed by Serge Hallyn:

Work items changed:
  Work items:
  [serge-hallyn] (Dwight is pushing this, but has no lp id) Push fix for XFS 
and user namespaces: DONE
  [serge-hallyn] Fix lxc-net to be nestable with no user interaction: DONE
  [serge-hallyn] Write sysctl to disable unprivileged CLONE_NEWUSER: DONE
  [serge-hallyn] Exploit stacked apparmor profiles for container nesting: 
BLOCKED
  [serge-hallyn] Ask jjohansen about any apparmor kernel/userspace packages we 
can put in ubuntu-lxc ppa for testing stacked (0.5): DONE
  [serge-hallyn] Bisect kernel signal delivery bug affecting lxc: DONE
  [serge-hallyn] Improve cgroup support in nested case: DONE
  [serge-hallyn] write POC of nestable cgroup manager: POSTPONED
  [serge-hallyn] Pursue subuid patchset for shadow: DONE
  [serge-hallyn] Enable unprivileged container creation: DONE
  [serge-hallyn] Write a privileged helper to facilitate unprivileged networked 
container: DONE
  [serge-hallyn] Enable unprivileged container starting (network): POSTPONED
  [serge-hallyn] Enable unprivileged container starting (cgroups): DONE
  [serge-hallyn] Enable unprivileged container starting (complete): POSTPONED
  [serge-hallyn] Add console support to API (Dwight): DONE
  [serge-hallyn] Add attach support to API (Christian): DONE
  [serge-hallyn] Convert create to API: DONE
  [serge-hallyn] Convert stop to API: DONE
  [serge-hallyn] Convert destroy to API: DONE
  [serge-hallyn] List lxc programs to be converted to API 
(https://wiki.ubuntu.com/LxcAPIConversion): DONE
  [serge-hallyn] Update locking in API to handle killed programs: DONE
  [serge-hallyn] Update container creation to handle SIGKILL (using 'partial' 
file): DONE
  [serge-hallyn] Improve thread safety in API: DONE
  [serge-hallyn] Discuss upstream stable branches with upstream (sent email to 
list): DONE
  [serge-hallyn] Get CONFIG_USER_NS=y into kernel (as soon as saucy+1 opens): 
POSTPONED
  [serge-hallyn] Merge qemu 1.5.0: DONE
  [serge-hallyn] Write loopback backingstore driver: DONE
  [serge-hallyn] Write qemu-nbd backingstore driver: POSTPONED
  [serge-hallyn] Investigate openvswitch bridges by default in libvirt (1): DONE
  [serge-hallyn] Merge cgroup-lite into libcgroup (depends on libcgroup 
sysvinit scripts): POSTPONED
  [serge-hallyn] Default-off support for per-user cgroup configuration at 
boot/login: POSTPONED
  [smoser] Ensure that lxc-ubuntu-cloud can be used with cloudinit for 
openstack: DONE
  [serge-hallyn] start live block migration testing using juju of libvirt+kvm 
with local storage (1): DONE
  [smoser] use simplestreams to provide secure ubuntu-cloud deliver to lxc: 
POSTPONED
  [zulcss] Merge libvirt 1.0.6: DONE
  [serge-hallyn] no-change libvirt push to pick up new xen libraries (0): 
BLOCKED
  [smb] Pick up upstream Xen-4.3 release: DONE
  [smb] Refresh Debian/Ubuntu patches against Xen: DONE
  [smb] Decide how to include qemu-upstream: DONE
  [smb] Update packaging to allow libvirt to build the libxl driver: DONE
  [smb] Unit testing with xm and xl stack (native and libvirt): DONE
  [smb] Enable Xen compile for armhf: DONE
  [smb] Merge xen 4.3: DONE
  [zulcss] Write a nova using the lxc API: INPROGRESS
  
  Work items for ubuntu-13.09:
- [serge-hallyn] Work distro lxc tests upstream (2): TODO
  [serge-hallyn] Address monitor versioning in lxc (1): DONE
  [zulcss] Push nova-lxc driver upstream: TODO
  [serge-hallyn] Add snapshot support to API (3): INPROGRESS
- [serge-hallyn] Discuss API versioning of library and (python, lua, etc) hooks 
at plumbers: TODO
- [serge-hallyn] complete live block migration testing (using juju?) of 
libvirt+kvm with local storage (1): TODO
  [zulcss] Follow up with Citrix's plans for xcp: TODO
  [smb] PUsh xen 4.3 to archive: TODO
  
  Work items for ubuntu-13.10:
- [serge-hallyn] Pursue patch for ovmf to provide save/restore of nvvars to 
support boot variables (3): TODO
- [serge-hallyn] live block migration testing using juju of libvirt+kvm with 
ceph (2): TODO
  [zulcss] Fix apparmor bug preventing libvirt-lxc from mounting blockdevs: TODO

-- 
Virtualization Stack Work for Saucy
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-s-virtstack

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1218817] Re: [FFE] Update to Xen-4.3 in Saucy

2013-09-06 Thread Chuck Short
+1 from me, it has features that users want, more specifacally arm
support.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to xen in Ubuntu.
https://bugs.launchpad.net/bugs/1218817

Title:
  [FFE] Update to Xen-4.3 in Saucy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1218817/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1216019] Re: Horizon default config assumes www-data has R/w on /usr/share... directory

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package horizon - 1:2013.2~b2-0ubuntu6

---
horizon (1:2013.2~b2-0ubuntu6) saucy; urgency=low

  * debian/patches/ubuntu_local_settings.py: Set flexible
default for ALLOWED_HOSTS that should be changed for production
deployments (LP: #1214982).
  * Fix (LP: #1216019):
- debian/openstack-dashboard.{postinst, postrm}: Add/remove horizon
  user.  Ensure /etc/openstack-dashbard ownership.
- debian/openstack-dashboard.conf: Run WSGIDaemonProcess as user
  horizon, set WSGIProcessGroup to horizon.
- debian/patches/ubuntu_local_settings.py: Generate and load secret
  key from /etc/openstack-dashboard/secret_key.
 -- Adam Gandelman ad...@ubuntu.com   Fri, 06 Sep 2013 10:33:18 -0700

** Branch linked: lp:ubuntu/saucy-proposed/horizon

** Changed in: horizon (Ubuntu Saucy)
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1216019

Title:
  Horizon default config assumes www-data has R/w on /usr/share...
  directory

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1216019/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1218817] Re: [FFE] Update to Xen-4.3 in Saucy

2013-09-06 Thread Scott Kitterman
Ack.  Approved.

** Changed in: xen (Ubuntu)
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to xen in Ubuntu.
https://bugs.launchpad.net/bugs/1218817

Title:
  [FFE] Update to Xen-4.3 in Saucy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xen/+bug/1218817/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1159748] Re: Ramdom apache2 crash in Ubuntu 12.04 (libpthread-2.15.so)

2013-09-06 Thread Dave Pooser
I'm still seeing it after running apt-get upgrade this morning.
Upgrading Plack::Handler to 1.0029 (using CPAN) does not resolve the
issue either.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1159748

Title:
  Ramdom apache2 crash in Ubuntu 12.04 (libpthread-2.15.so)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1159748/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1221906] [NEW] Havana-3 Dependency missing: python-troveclient

2013-09-06 Thread Adam Gandelman
Public bug reported:

This is blocking Havana-3 release of Horizon into Ubuntu.  Since H2,
python-troveclient was introduced as a dependency of Horizon and the
application will not function without it.  Currently it is not available
in Ubuntu.

[Fri Sep 06 19:44:01 2013] [notice] Apache/2.2.22 (Ubuntu) mod_wsgi/3.3 
Python/2.7.3 configured -- resuming normal operations
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] mod_wsgi (pid=6347): 
Exception occurred processing WSGI script 
'/usr/share/openstack-dashboard/openstack_dashboard/wsgi/django.wsgi'.
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] Traceback (most 
recent call last):
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/wsgi.py, line 236, in 
__call__
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] 
self.load_middleware()
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30]   File 
/usr/lib/python2.7/dist-packages/django/core/handlers/base.py, line 45, in 
load_middleware
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] for 
middleware_path in settings.MIDDLEWARE_CLASSES:
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30]   File 
/usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 53, in 
__getattr__
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] self._setup(name)
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30]   File 
/usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 48, in _setup
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] self._wrapped = 
Settings(settings_module)
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30]   File 
/usr/lib/python2.7/dist-packages/django/conf/__init__.py, line 134, in 
__init__
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] raise 
ImportError(Could not import settings '%s' (Is it on sys.path?): %s % 
(self.SETTINGS_MODULE, e))
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] ImportError: Could 
not import settings 'openstack_dashboard.settings' (Is it on sys.path?): No 
module named troveclient
[Fri Sep 06 19:44:53 2013] [error] [client 192.168.25.30] File does not exist: 
/var/www/favicon.ico

** Affects: horizon (Ubuntu)
 Importance: Critical
 Status: New

** Affects: horizon (Ubuntu Saucy)
 Importance: Critical
 Status: New

** Changed in: horizon (Ubuntu)
   Importance: Undecided = Critical

** Also affects: horizon (Ubuntu Saucy)
   Importance: Critical
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1221906

Title:
  Havana-3 Dependency missing: python-troveclient

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1221906/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1214982] Re: STATIC_URL is missing in context if ALLOWED_HOSTS not set.

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package horizon - 1:2013.2~b2-0ubuntu6

---
horizon (1:2013.2~b2-0ubuntu6) saucy; urgency=low

  * debian/patches/ubuntu_local_settings.py: Set flexible
default for ALLOWED_HOSTS that should be changed for production
deployments (LP: #1214982).
  * Fix (LP: #1216019):
- debian/openstack-dashboard.{postinst, postrm}: Add/remove horizon
  user.  Ensure /etc/openstack-dashbard ownership.
- debian/openstack-dashboard.conf: Run WSGIDaemonProcess as user
  horizon, set WSGIProcessGroup to horizon.
- debian/patches/ubuntu_local_settings.py: Generate and load secret
  key from /etc/openstack-dashboard/secret_key.
 -- Adam Gandelman ad...@ubuntu.com   Fri, 06 Sep 2013 10:33:18 -0700

** Branch linked: lp:ubuntu/saucy-proposed/horizon

** Changed in: horizon (Ubuntu Saucy)
   Status: Triaged = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1214982

Title:
  STATIC_URL is missing in context if ALLOWED_HOSTS not set.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1214982/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1183135] Re: On running network and I/O traffic on SM15000-XE, BUG: soft lockup -- CPU#0 stuck for 22s! seen on dmesg

2013-09-06 Thread Samantha Jian-Pielak
Hi Vikrant,

Please let us know if you can reproduce the issue with irqbalance
1.0.3-1ubuntu2 in the 12.10 (quantal) repo.

Thanks,
Samantha

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to irqbalance in Ubuntu.
https://bugs.launchpad.net/bugs/1183135

Title:
  On running network and I/O traffic on SM15000-XE, BUG: soft lockup --
  CPU#0 stuck for 22s! seen on dmesg

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/irqbalance/+bug/1183135/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1221906] Re: Havana-3 Dependency missing: python-troveclient

2013-09-06 Thread Adam Gandelman
FFe Bug #1221981

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1221906

Title:
  Havana-3 Dependency missing: python-troveclient

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/horizon/+bug/1221906/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker

2013-09-06 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215279

Title:
  linux-lowlatency: 3.5.0-40.41  -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-lts-raring -
3.8.0-30.44~precise1

---
linux-lts-raring (3.8.0-30.44~precise1) precise; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1215677

  [ Upstream Kernel Changes ]

  * Don't attempt to send extended INQUIRY command if skip_vpd_pages is set
- LP: #1215155

linux (3.8.0-30.43) raring; urgency=low

  [Steve Conklin]

  * Release Tracking Bug
- LP: #1215095

  [ Andy Whitcroft ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060

  [ Brad Figg ]

  * Start new release

  [ John Johansen ]

  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161

  [ Joseph Salisbury ]

  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848

  [ Kamal Mostafa ]

  * SAUCE: (no-up) Revert SAUCE: (no-up) drm/i915: quirk no PCH_PWM_ENABLE
for Dell XPS13 backlight

  [ Tim Gardner ]

  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961

  [ Upstream Kernel Changes ]

  * Revert drm/i915: Workaround incoherence between fences and LLC across
multiple CPUs
- LP: #1207977
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1207977
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1207977
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1207977
  * drm/i915: Correct obj-mm_list link to
dev_priv-dev_priv-mm.inactive_list
- LP: #1207977
  * drm/i915: fix up ring cleanup for the i830/i845 CS tlb w/a
- LP: #1207977
  * Partially revert drm/i915: unconditionally use mt forcewake on
hsw/ivb
- LP: #1207977
  * drm/i915: Fix write-read race with multiple rings
- LP: #1207977
  * drm/i915: merge {i965, sandybridge}_write_fence_reg()
- LP: #1207977
  * drm/i915: Fix incoherence with fence updates on Sandybridge+
- LP: #1207977
  * drm/i915: rename sdvox_reg to hdmi_reg on HDMI context
- LP: #1207977
  * drm/i915: don't setup hdmi for port D edp in ddi_init
- LP: #1207977
  * drm/i915: Preserve the DDI_A_4_LANES bit from the bios
- LP: #1207977
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1207977
  * drm/radeon: allocate SA bo in the requested domain
- LP: #1207977
  * drm/radeon: allow selection of alignment in the sub-allocator
- LP: #1207977
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1207977
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1207977
  * ext4: fix error handling in ext4_ext_truncate()
- LP: #1207977
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1207977
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ASoC: atmel: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1207977
  * x86, suspend: Handle CPUs which fail to #GP on RDMSR
- LP: #1207977
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1207977
  * drm/i915: fix long-standing SNB regression in power consumption after
resume v2
- LP: #1207977
  * ACPI / video: ignore BIOS initial backlight value for Fujitsu E753
- LP: #1207977
  * arm64: mm: don't treat user cache maintenance faults as writes
- LP: #1207977
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1207977
  * Btrfs: re-add root to dead root list if we stop dropping it
- LP: #1207977
  * drm/i915: inverted brightness quirk for Acer Aspire 4736Z
- LP: #1207977
  * drm/i915: quirk no PCH_PWM_ENABLE for Dell XPS13 backlight
- LP: #1162026, #1163720, #1207977
  * drm/i915: Serialize almost all register access
- LP: #1207977
  * drm/i915: fix up gt init sequence fallout
- LP: #1207977
  * powerpc/modules: Module CRC relocation fix causes perf issues
- LP: #1207977
  * sparc32: vm_area_struct access for old Sun SPARCs.
- LP: #1207977
  * sparc64 address-congruence property
- LP: #1207977
  * sparc: tsb must be flushed before tlb
- LP: #1207977
  * bridge: fix switched interval for MLD Query types
- LP: #1207977
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1207977
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1207977
  * macvtap: fix recovery from gup errors
- LP: #1207977
  * ipv6: 

[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

2013-09-06 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215677

Title:
  linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker

2013-09-06 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215129

Title:
  linux: 3.5.0-40.62 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker

2013-09-06 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215276

Title:
  linux-ti-omap4: 3.5.0-232.48 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29

---
linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1215278
  * [Config] Enable CONFIG_KUSER_HELPERS
  * Rebase onto Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * 

[Bug 1091188] Re: CVE-2012-5375

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1091188] Re: CVE-2012-5375

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-40.62

---
linux (3.5.0-40.62) quantal; urgency=low

  [ Brad Figg ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

linux (3.5.0-40.61) quantal; urgency=low

  [ Andy Whitcroft ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060

  [ John Johansen ]

  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161

  [ Joseph Salisbury ]

  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848

  [ Stefan Bader ]

  * (debian) Abort build on unresolved symbols
- LP: #1166197

  [ Tim Gardner ]

  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961

  [ Upstream Kernel Changes ]

  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * ipv6: 

[Bug 1091188] Re: CVE-2012-5375

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29

---
linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1215278
  * [Config] Enable CONFIG_KUSER_HELPERS
  * Rebase onto Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * 

[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker

2013-09-06 Thread Adam Conrad
** Changed in: kernel-sru-workflow/promote-to-security
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-security
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

** Changed in: kernel-sru-workflow/promote-to-updates
   Status: Confirmed = Fix Released

** Changed in: kernel-sru-workflow/promote-to-updates
 Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad 
(adconrad)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215278

Title:
  linux-armadaxp: 3.5.0-1621.29 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-40.62

---
linux (3.5.0-40.62) quantal; urgency=low

  [ Brad Figg ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

linux (3.5.0-40.61) quantal; urgency=low

  [ Andy Whitcroft ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060

  [ John Johansen ]

  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161

  [ Joseph Salisbury ]

  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848

  [ Stefan Bader ]

  * (debian) Abort build on unresolved symbols
- LP: #1166197

  [ Tim Gardner ]

  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961

  [ Upstream Kernel Changes ]

  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * ipv6: 

[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 3.5.0-40.62

---
linux (3.5.0-40.62) quantal; urgency=low

  [ Brad Figg ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

linux (3.5.0-40.61) quantal; urgency=low

  [ Andy Whitcroft ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060

  [ John Johansen ]

  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161

  [ Joseph Salisbury ]

  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848

  [ Stefan Bader ]

  * (debian) Abort build on unresolved symbols
- LP: #1166197

  [ Tim Gardner ]

  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961

  [ Upstream Kernel Changes ]

  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * ipv6: 

[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-armadaxp - 3.5.0-1621.29

---
linux-armadaxp (3.5.0-1621.29) quantal-proposed; urgency=low

  [ Ike Panhc ]

  * Release Tracking Bug
- LP: #1215278
  * [Config] Enable CONFIG_KUSER_HELPERS
  * Rebase onto Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  * 

[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1221536] [NEW] FFe: Sync xbae 4.60.4-5 (universe) from Debian unstable (main)

2013-09-06 Thread Graham Inggs
Public bug reported:

Please sync xbae 4.60.4-5 (universe) from Debian unstable (main)

Explanation of FeatureFreeze exception:
Part of the lesstif2motif transition [1] in Debian.
The following packages also need to be synced and built in the following order:

xbae 4.60.4-5
grace 1:5.1.23-2
cernlib 20061220+dfsg3-4
paw 1:2.14.04.dfsg.2-9
geant321 1:3.21.14.dfsg-11
mclibs 20061220+dfsg3-3

[1] https://wiki.debian.org/lesstif2motifTransition

Changelog entries since current saucy version 4.60.4-3:

xbae (4.60.4-5) unstable; urgency=low

  * Upload to unstable, no other changes.

 -- Nicholas Breen nbr...@debian.org  Sat, 24 Aug 2013 10:01:22 -0700

xbae (4.60.4-4) experimental; urgency=low

  * Upload to experimental.
  * Switch Build-Depends from lesstif to openmotif.  This change is ABI-
incompatible; the runtime package has been changed to libxbae4m and
is not co-installable with the older, lesstif-based libxbae4 to
reflect this incompatibility and prevent mixed dependencies.
(Closes: #366193)
  * Update LDFLAGS invocation for proper passing of hardening flags.

 -- Nicholas Breen nbr...@debian.org  Sun, 21 Jul 2013 16:07:45 -0700

** Affects: xbae (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221536

Title:
  FFe: Sync xbae 4.60.4-5 (universe) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xbae/+bug/1221536/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1091188] Re: CVE-2012-5375

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1221534] Status changed to Confirmed

2013-09-06 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221534

Title:
  [LENOVO 7453W75] suspend/resume failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221534/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 945749] Re: Mouse pointer jerky on login screen

2013-09-06 Thread Jeb E.
A fix was never released... This is just ridiculous how AMD can't get
the proper open source hardware support that Intel devices do on Ubuntu.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/945749

Title:
  Mouse pointer jerky on login screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-themes-standard/+bug/945749/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1091187] Re: CVE-2012-5374

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1202161] Re: seccomp filter: execve(): Operation not permitted

2013-09-06 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-ti-omap4 - 3.5.0-232.48

---
linux-ti-omap4 (3.5.0-232.48) quantal; urgency=low

  * Release Tracking Bug
- LP: #1215276

  [ Paolo Pisati ]

  * SAUCE: fixup between 6288223947 and db7981259
  * rebased on Ubuntu-3.5.0-40.62

  [ Ubuntu: 3.5.0-40.62 ]

  * [Config] KUSER_HELPERS = Y
  * Release Tracking Bug
- LP: #1215129

  [ Ubuntu: 3.5.0-40.61 ]

  * [Packaging] supply perf with appropriate prefix to ensure use of local
config
- LP: #1206200
- CVE-2013-1060
  * Revert SAUCE: (no-up) AppArmor: Disable Add PR_{GET,SET}_NO_NEW_PRIVS
to prevent execve from granting privs
- LP: #1202161
  * SAUCE: (no-up) intel_ips: blacklist ASUSTek G60JX laptops
- LP: #1210848
  * (debian) Abort build on unresolved symbols
- LP: #1166197
  * [Config] Include rbd and kvm in the virtual inclusion list
- LP: #1206961
  * ALSA: usb: Parse UAC2 extension unit like for UAC1
- LP: #1212430
  * Btrfs: fix hash overflow handling
- LP: #1091187, #1091188
- CVE-2012-5375
  * [media] media: dmxdev: remove dvb_ringbuffer_flush() on writer side
- LP: #1214956
  * writeback: Fix periodic writeback after fs mount
- LP: #1214956
  * nfsd4: fix decoding of compounds across page boundaries
- LP: #1214956
  * ARM: shmobile: emev2 GIO3 resource fix
- LP: #1214956
  * uprobes: Fix return value in error handling path
- LP: #1214956
  * tracing: Fix irqs-off tag display in syscall tracing
- LP: #1214956
  * [CIFS] use sensible file nlink values if unprovided
- LP: #1214956
  * ASoC: sglt5000: Fix the default value of CHIP_SSS_CTRL
- LP: #1214956
  * ASoC: sglt5000: Fix SGTL5000_PLL_FRAC_DIV_MASK
- LP: #1214956
  * [SCSI] megaraid_sas: fix memory leak if SGL has zero length entries
- LP: #1214956
  * iscsi-target: Fix tfc_tpg_nacl_auth_cit configfs length overflow
- LP: #1214956
  * dm mpath: fix ioctl deadlock when no paths
- LP: #1214956
  * dm verity: fix inability to use a few specific devices sizes
- LP: #1214956
  * lockd: protect nlm_blocked access in nlmsvc_retry_blocked
- LP: #1214956
  * ext4: don't show usrquota/grpquota twice in /proc/mounts
- LP: #1214956
  * perf: Clone child context from parent context pmu
- LP: #1214956
  * perf: Remove WARN_ON_ONCE() check in __perf_event_enable() for valid
scenario
- LP: #1214956
  * perf: Fix perf_lock_task_context() vs RCU
- LP: #1214956
  * ext4: don't allow ext4_free_blocks() to fail due to ENOMEM
- LP: #1214956
  * drm/radeon/hdmi: make sure we have an afmt block assigned
- LP: #1214956
  * ACPI / memhotplug: Fix a stale pointer in error path
- LP: #1214956
  * PM / Sleep: avoid 'autosleep' in shutdown progress
- LP: #1214956
  * radeon kms: do not flush uninitialized hotplug work
- LP: #1214956
  * svcrdma: underflow issue in decode_write_list()
- LP: #1214956
  * ALSA: asihpi: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: atiixp: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: 6fire: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: ua101: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: usx2y: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: pxa2xx: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ASoC: s6000: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * [media] saa7134: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * staging: line6: Fix unlocked snd_pcm_stop() call
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * ALSA: hda - Add new GPU codec ID to snd-hda
- LP: #1214956
  * Btrfs: fix lock leak when resuming snapshot deletion
- LP: #1214956
  * xen/blkback: Check device permissions before allowing OP_DISCARD
- LP: #1214956
  * [SCSI] Fix incorrect memset in bnx2fc_parse_fcp_rsp
- LP: #1214956
  * MAINTAINERS: add stable_kernel_rules.txt to stable maintainer
information
- LP: #1214956
  * bridge: fix switched interval for MLD Query types
- LP: #1214956
  * ipv4: Fixed MD5 key lookups when adding/ removing MD5 to/ from TCP
sockets.
- LP: #1214956
  * ipv6: don't call addrconf_dst_alloc again when enable lo
- LP: #1214956
  * macvtap: fix recovery from gup errors
- LP: #1214956
  * ipv6: ip6_sk_dst_check() must not assume ipv6 dst
- LP: #1214956
  * af_key: fix info leaks in notify messages
- LP: #1214956
  * sh_eth: fix unhandled RFE interrupt
- LP: #1214956
  * neighbour: fix a race in neigh_destroy()
- LP: #1214956
  * x25: Fix broken locking in ioctl error paths.
- LP: #1214956
  * net: Swap ver and type in pppoe_hdr
- LP: #1214956
  * ipv6,mcast: always hold idev-lock before mca_lock
- LP: #1214956
  * l2tp: add missing .owner to struct pppox_proto
- LP: #1214956
  * ipv6: call udp_push_pending_frames when uncorking a socket with AF_INET
pending data
- LP: #1214956
  

[Bug 1221075] Re: Waking from Hibernate results in soft lockup - CPU# stuck for x seconds

2013-09-06 Thread Whoopie
Do you use zram? Did you install the zram-config package? If yes, remove
it. This was the issue on my Dell laptop.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221075

Title:
  Waking from Hibernate results in soft lockup - CPU# stuck for x
  seconds

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221075/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1219669] Re: [Dell Latitude 3330] fwts high failure: \_SB_.PCI0:_OSC invalid UUID

2013-09-06 Thread Po-Hsu Lin
Hello Anthony,
This issue still exist with BIOS version A01.

Please find attachment for fwts result.

** Attachment added: fwts_results.log
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219669/+attachment/3805135/+files/fwts_results.log

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219669

Title:
  [Dell Latitude 3330] fwts high failure: \_SB_.PCI0:_OSC invalid UUID

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219669/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1220458] Re: Mir fails to start

2013-09-06 Thread Daniel van Vugt
Chris,

Can you elaborate on what the problem is? Those kernel messages look
purely informational (and indecipherable) to mere mortals.

** Also affects: mir
   Importance: Undecided
   Status: New

** Changed in: mir
   Status: New = Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1220458

Title:
  Mir fails to start

To manage notifications about this bug go to:
https://bugs.launchpad.net/mir/+bug/1220458/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215239] Re: linux-ec2: 2.6.32-356.69 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 03:01 UTC
  kernel-stable-master-bug:1215005
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 04:02 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 18:32 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 18:32 UTC
  kernel-stable-Promote-to-proposed-end:Monday, 26. August 2013 19:02 UTC
  kernel-stable-Verification-testing-start:Monday, 26. August 2013 20:03 UTC
  kernel-stable-Security-signoff-start:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Verification-testing-end:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Regression-testing-start:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 21:03 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:03 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215239

Title:
  linux-ec2: 2.6.32-356.69 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.5.0-1621.29 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:35 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 09:02 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 09:03 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:02 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:03 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:03 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:03 UTC
  kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215278

Title:
  linux-armadaxp: 3.5.0-1621.29 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:34 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 29. August 2013 03:03 UTC
  kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Regression-testing-end:Friday, 30. August 2013 09:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:03 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 19:03 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:03 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215276

Title:
  linux-ti-omap4: 3.5.0-232.48 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:37 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:06 UTC
  kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:06 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:53 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:53 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:03 UTC
  kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:04 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:04 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:04 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:04 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:05 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215279

Title:
  linux-lowlatency: 3.5.0-40.41  -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215005] Re: linux: 2.6.32-51.113 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 2.6.32-51.113 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 16:16 UTC
  kernel-stable-Prepare-package-end:Thursday, 22. August 2013 03:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 03:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 05:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 22. August 2013 06:03 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Regression-testing-end:Monday, 02. September 2013 19:01 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 12:01 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:01 UTC
  kernel-stable-phase-changed:Thursday, 05. September 2013 21:01 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 21:01 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:01 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215005

Title:
  linux: 2.6.32-51.113 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215005/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215173] Re: linux: 3.2.0-53.81 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-53.81 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 22:16 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 01:08 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 01:08 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 02:02 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 03:03 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 14:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:02 UTC
  kernel-stable-phase-changed:Thursday, 05. September 2013 20:02 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 20:02 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215173

Title:
  linux: 3.2.0-53.81 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215173/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.5.0-40.62 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 20:25 UTC
  kernel-stable-Prepare-package-end:Thursday, 22. August 2013 05:41 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 05:41 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 06:04 UTC
  kernel-stable-Verification-testing-start:Thursday, 22. August 2013 07:09 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 09:01 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:02 UTC
  kernel-stable-phase-changed:Thursday, 05. September 2013 19:02 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:01 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:02 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215129

Title:
  linux: 3.5.0-40.62 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215692] Re: linux-lowlatency: 3.2.0-53.55 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:06 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:56 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:56 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:05 UTC
  kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:07 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:06 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:06 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:07 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 20:06 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:06 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:08 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215692

Title:
  linux-lowlatency: 3.2.0-53.55 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.8.0-30.44~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 00:07 UTC
  kernel-stable-master-bug:1215596
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 20:02 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 20:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 21:04 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 22:04 UTC
  kernel-stable-Verification-testing-end:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Certification-testing-start:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Security-signoff-start:Sunday, 01. September 2013 15:06 UTC
  kernel-stable-Regression-testing-start:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 13:06 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:05 UTC
  kernel-stable-phase-changed:Thursday, 05. September 2013 19:05 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:05 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:06 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215677

Title:
  linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215690] Re: linux-armadaxp: 3.2.0-1624.36 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the 3.2.0-1624.36 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:04 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 15:04 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 15:04 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:04 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:06 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:05 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:05 UTC
  kernel-stable-Regression-testing-end:Tuesday, 27. August 2013 16:06 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215690

Title:
  linux-armadaxp: 3.2.0-1624.36 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1098011] Re: atop unusable in Quantal: trap divide error

2013-09-06 Thread Adam Porter
This bug no longer occurs in Raring.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1098011

Title:
  atop unusable in Quantal: trap divide error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/atop/+bug/1098011/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215689] Re: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker

2013-09-06 Thread Brad Figg
** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:02 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:06 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:06 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 29. August 2013 02:05 UTC
  kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Regression-testing-end:Monday, 02. September 2013 09:05 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:07 UTC
  kernel-stable-phase:CopyToUpdates
  kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC
+ kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215689

Title:
  linux-ti-omap4: 3.2.0-1437.56 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215689/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1192460] Re: kscreen does not apply saved settings on start-up

2013-09-06 Thread Rafael Jesus Alcantara Perez
Same behaviour with 1.0.1-0ubuntu1~ubuntu1.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1192460

Title:
  kscreen does not apply saved settings on start-up

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kscreen/+bug/1192460/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1205097] Re: HUD isn't working

2013-09-06 Thread PS Jenkins bot
Fix committed into lp:hud at revision 319, scheduled for release in hud,
milestone Unknown

** Changed in: hud
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1205097

Title:
  HUD isn't working

To manage notifications about this bug go to:
https://bugs.launchpad.net/hud/+bug/1205097/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1219652] Re: [Dell Latitude 3330] Wireless key does not work.

2013-09-06 Thread Po-Hsu Lin
Hello,
With v3.11 kernel, the wireless key still behave like v3.8 kernel.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219652

Title:
  [Dell Latitude 3330] Wireless key does not work.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219652/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221514] Re: Hot Keys and Abbreviations have Stopped Working

2013-09-06 Thread Lonnie Lee Best
I just reinstalled Ubuntu 13.10 from the daily build:
http://cdimage.ubuntu.com/daily-live/current/

This did NOT resolve my issue with AutoKey-GTK.

Without hotkeys or abbreviations functioning, autokey is practically
useless.

Please confirm this bug and deem it critical.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221514

Title:
  Hot Keys and Abbreviations have Stopped Working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221514/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1160558] Re: AutoKey-QT Missing Indicator After Launched as Startup Application

2013-09-06 Thread Lonnie Lee Best
I just reinstalled Ubuntu 13.10 from the daily build:
http://cdimage.ubuntu.com/daily-live/current/

This did NOT resolved the missing-indicator issue.

Please confirm this bug, and deem it critical.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1160558

Title:
  AutoKey-QT Missing Indicator After Launched as Startup Application

To manage notifications about this bug go to:
https://bugs.launchpad.net/unity/+bug/1160558/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1197316] Re: GPU hang with Haswell GT3

2013-09-06 Thread Timo Aaltonen
marking as verified on raring, since the 9.1.4 update is already on
precise as lts backport, and seemingly working fine there

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1197316

Title:
  GPU hang with Haswell GT3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mesa/+bug/1197316/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 966839] Re: Top bar still shows in fullscreen wine games

2013-09-06 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: wine1.4 (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/966839

Title:
  Top bar still shows in fullscreen wine games

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wine1.4/+bug/966839/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221544] [NEW] Choice of destination folder for Screenshot lost

2013-09-06 Thread Rowan Berkeley
Public bug reported:

Screenshot destination folder now defaults to Pictures, was previously
user-selectable in Screenshot GUI. I realise this probably reflects a
conscious decision rather than an unintentional omission: someone just
said to themselves: The user may previously have been able to select
the destination folder for Screenshots, but now I shall discontinue that
option, because I can't be bothered to include it. Someone on AskUbuntu
com a href=http://askubuntu.com/questions/114429/default-save-
directory-for-gnome-screenshottimidly asks/a: Is this a bug? As
far as I'm concerned it is, and you ought to restore the user option to
select the destination folder. I shall take this opportunity to remind
you that a month ago I a
href=https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1208719;reported
another lost function/a, namely the progress bar across the
Thunderbird launcher indicating unread mail, and no-one has even
bothered to notice this report, assess it, or allocate it to a bug
category. That report itself was a follow-up to a previous bug fix that
purported to restore the lost function but failed to do so. Hopefully
these facts speak for themselves, so I shall refrain from making
disparaging remarks about them.

** Affects: thunderbird (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221544

Title:
  Choice of destination folder for Screenshot lost

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1221544/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1217189] Re: Buffer I/O error on device zram0 (possibly causing complete machine lockup)

2013-09-06 Thread Dan Muresan
@damian-sawicki: a lot of people have zram due to the zram-config
package, which you must remove with dpkg --purge zram-config (otherwise
it won't go away completely). But in my case zram *still* starts up, and
I can't track what sets it up. I think the easy solution is to break the
zram modules (e.g. rename zram.ko to zram.ko.save in the appropriate
/lib/modules directory)

Of course, it would be great to get working zram again.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1217189

Title:
  Buffer I/O error on device zram0 (possibly causing complete machine
  lockup)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-raring/+bug/1217189/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1084378] Re: [Feature] RDRAND enabling for rngd

2013-09-06 Thread XiongZhang
This can actually be done using command line options in the official 
(git://git.kernel.org/pub/scm/utils/kernel/rng-tools
 /rng-tools.git) rng-tools, but not the version in this Ubuntu package.

From commend #4,  the rng-tools in Ubuntu 13.10  is the same as
official upstream.  Does rng-tools in ubuntu 13.10 still have the
issue your mentioned ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1084378

Title:
  [Feature] RDRAND enabling for rngd

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1084378/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1218753] Re: [HP 4520S, 3.11 regression] Keyboard stops working after S3

2013-09-06 Thread David Henningsson
@Joseph,

I was running 3.10.10 yesterday and didn't experience the bug, so I
*think* it's safe. Btw, do you have any script or documentation on how
to do a git bisect (in combination with Ubuntu packaging)? If so I can
probably do the bisect myself.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1218753

Title:
  [HP 4520S, 3.11 regression] Keyboard stops working after S3

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218753/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215630] Re: [Alt-Tab] Hover on alt-tab easily bumped

2013-09-06 Thread PS Jenkins bot
Fix committed into lp:unity at revision None, scheduled for release in
unity, milestone 7.1.1

** Changed in: unity
   Status: In Progress = Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215630

Title:
  [Alt-Tab] Hover on alt-tab easily bumped

To manage notifications about this bug go to:
https://bugs.launchpad.net/ayatana-design/+bug/1215630/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1218815] Re: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only

2013-09-06 Thread Daniel van Vugt
It's been suggested we have an incorrect stride value for scanout
buffers (even when they're not being scanned out). That would certainly
agree with the screenshot in comment #5. So I think a fix is required
via mir_surface_get_current_buffer() ?...

_X_EXPORT int32_t
xmir_window_get_stride(xmir_window *xmir_win)
{
MirBufferPackage *package;

mir_surface_get_current_buffer(xmir_win-surface, package);

return package-stride;
}

** Also affects: mir
   Importance: Undecided
   Status: New

** Changed in: mir
   Status: New = Triaged

** Changed in: mir
   Importance: Undecided = Critical

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1218815

Title:
  [radeon] Graphic glitches and screen corruption (vertical lines) on
  XMir surfaces only

To manage notifications about this bug go to:
https://bugs.launchpad.net/mir/+bug/1218815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221548] [NEW] Can't Create HotKeys for Phrases or Scripts

2013-09-06 Thread Lonnie Lee Best
Public bug reported:

I attempted create a hotkey for one of the default phrases that comes
with autokey. I was unable to achieve this; I was able to select the
control keys I wanted (using the mouse), but upon hitting a particular
key (on the keyboard), it would not register that key.

ProblemType: Bug
DistroRelease: Ubuntu 13.10
Package: autokey-gtk 0.90.1-1.1
ProcVersionSignature: Ubuntu 3.11.0-4.9-generic 3.11.0-rc7
Uname: Linux 3.11.0-4-generic x86_64
NonfreeKernelModules: wl
ApportVersion: 2.12.1-0ubuntu3
Architecture: amd64
Date: Fri Sep  6 01:42:11 2013
InstallationDate: Installed on 2013-09-06 (0 days ago)
InstallationMedia: Ubuntu 13.10 Saucy Salamander - Alpha amd64 (20130905)
MarkForUpload: True
PackageArchitecture: all
SourcePackage: autokey
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: autokey (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug saucy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221548

Title:
  Can't Create HotKeys for Phrases or Scripts

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221548/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221547] [NEW] nvidia-173

2013-09-06 Thread Ian Moir
Public bug reported:

System crashed while doing update.

ProblemType: Package
DistroRelease: Ubuntu 12.04
Package: virtualbox-dkms 4.1.12-dfsg-2ubuntu0.3
ProcVersionSignature: Ubuntu 3.8.0-29.42~precise1-generic 3.8.13.5
Uname: Linux 3.8.0-29-generic x86_64
ApportVersion: 2.0.1-0ubuntu17.4
Architecture: amd64
DKMSKernelVersion: 3.8.0-30-generic
Date: Fri Sep  6 07:35:09 2013
InstallationMedia: Ubuntu 12.04.3 LTS Precise Pangolin - Release amd64 
(20130820.1)
MarkForUpload: True
PackageArchitecture: all
PackageVersion: 4.1.12-dfsg-2ubuntu0.3
SourcePackage: virtualbox
Title: virtualbox-dkms 4.1.12-dfsg-2ubuntu0.3: virtualbox kernel module failed 
to build
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: virtualbox (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package precise

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221547

Title:
   nvidia-173

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1221547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1218278] Re: When creating a swap device using zram I get Buffer I/O errors

2013-09-06 Thread Dan Muresan
Changed to Confirmed as per @jsalisbury's instructions, since
@konrad.hofer forgot to. In any case, I doubt raring (and thus linux-
lts-raring on precise) will upgrade to 3.11.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1218278

Title:
  When creating a swap device using zram I get Buffer I/O errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1217189] Re: Buffer I/O error on device zram0 (possibly causing complete machine lockup)

2013-09-06 Thread Dan Muresan
Bug #1218278 might be a duplicate (though it doesn't talk about lock-
ups). Apparently this is fixed in 3.11, though I don't see how this
helps with raring and linux-lts-raring.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1217189

Title:
  Buffer I/O error on device zram0 (possibly causing complete machine
  lockup)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-lts-raring/+bug/1217189/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221547] Re: nvidia-173

2013-09-06 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221547

Title:
   nvidia-173

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1221547/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1218278] Re: When creating a swap device using zram I get Buffer I/O errors

2013-09-06 Thread Dan Muresan
might be related to bug #1217189 which raises the possibility of hard
machine LOCK-UPS due to zram errors. I've had several such lock-ups on
precise after the most recent linux-lts-raring updates (and none before
that) that seemed to go away after disabling zram.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1218278

Title:
  When creating a swap device using zram I get Buffer I/O errors

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1218278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215826] Re: Lost ability to remap Caps Lock to Ctrl

2013-09-06 Thread Chris Morgan
My experience after the first few minutes, where it was in flux,
sometimes operating as Caps_Lock and sometimes as BackSpace, was that it
settled down to acting as BackSpace (as configured) but would not
repeat—viz., holding backspace deleted many characters, while holding
caps lock deleted only one character.

I've found that using xmodmap to remap the caps lock key's keycode to
BackSpace works to make it repeat correctly.

For me, the Caps Lock key is keycode 66; I believe this may vary from
machine to machine. If that be so, you can find out what it is for you
with ``xev`` (run it, press the caps lock key, look for the keycode
part).

xmodmap -e 'keycode 66 = BackSpace'

I believe that putting the keycode 66 = BackSpace line in ~/.Xmodmap
is supposed to fix it automatically on login; I don't know as I haven't
closed my session since applying this fix. If not, I guess it could go
somewhere else. (Something which would be executed at X startup time?)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215826

Title:
  Lost ability to remap Caps Lock to Ctrl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/indicator-keyboard/+bug/1215826/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1221514] Re: Hot Keys and Abbreviations have Stopped Working

2013-09-06 Thread Lonnie Lee Best
In an attempt to see if my own configuration was corrupted, I backup my autokey 
configuration at:
/home/user/.config/autokey

Then I deleted it, and launched autokey. It created a brand new folder
at that same location.

I then attempted create a hotkey for one of the default phrases that comes with 
autokey. I was unable to achieve this; I was able to select the control keys I 
wanted (using the mouse), but upon hitting a particular key (on the keyboard), 
it would not register that key:
https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221548

Unfortunately, this ends my testing of Ubuntu 13.10 alpha. I'm was fine
with running this alpha (for 8 days) until AutoKey stopped working. I'm
going back to 13.04, and I'll upgrade again in a couple of week if these
autokey issues are resolved.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221514

Title:
  Hot Keys and Abbreviations have Stopped Working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/autokey/+bug/1221514/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221549] [NEW] Unable to set a hotkey for keyboard layout switching

2013-09-06 Thread jan2ary
Public bug reported:

As for now it's impossible to switch keyboard layout via hotkey. And also 
impossible to set such hotkey.
An Regional  Langiage window has field Switch to next source using and 
Switch to previous source using but those fields stay empty.
The same thing is for Keyboard - Typing: similar settings stay Disabled 
whatever I do.
The only hotkey could be set is Ctrl + Space but I don't like it and want to 
set CapsLock as I used to use.

** Affects: ubuntu
 Importance: Undecided
 Status: New

** Package changed: network-manager-vpnc (Ubuntu) = ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221549

Title:
  Unable to set a hotkey for keyboard layout switching

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1221549/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell

2013-09-06 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: udev (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1212977

Title:
  saucy daily-live images are unbootable on Dell Optiplex 990; stuck in
  BusyBox shell

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell

2013-09-06 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: casper (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1212977

Title:
  saucy daily-live images are unbootable on Dell Optiplex 990; stuck in
  BusyBox shell

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221551] [NEW] Network-manager 0.9.8.0/0.9.8.0-1 can not be connected to the network via 3G modems. Please replace it with network-manager 0.9.8-2.

2013-09-06 Thread cybercop
Public bug reported:

This error occurs only netvork-manager 0.9.8.0/0.9.8-1. In network-
manager 0.9.8-2 is resolved.

** Affects: network-manager (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221551

Title:
  Network-manager 0.9.8.0/0.9.8.0-1 can not be connected to the network
  via 3G modems. Please replace it with network-manager 0.9.8-2.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/network-manager/+bug/1221551/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1219789] Re: [Toshiba NB100-11J] 3.2.0-52-generic freezes

2013-09-06 Thread Gerard van Drielen
Yesterday evening I flashed the BIOS of my NB100-11J (thanks to a utility 
called Rufus (http://rufus.akeo.ie/)).
It wasn't easy, I had to strip the flash utility (flashit.exe) and the new 
ROM-image from iso and floppy images.

The BIOS was upgraded from version 1.20 to version 2.10.
(I could not find a newer version.)

Anyway, after reboot the system halted within the hour.
So the new BIOS had no affect.
Afterwards I rebooted from the previous kernel version.

The answer on your request :

gerard@NB100:~$ sudo dmidecode -s bios-version  sudo dmidecode -s 
bios-release-date
[sudo] password for gerard: 
2.10
07/29/2009

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219789

Title:
  [Toshiba NB100-11J] 3.2.0-52-generic freezes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219789/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell

2013-09-06 Thread Phil Wyett
I have this issue too. I have had no issues with live iso images up
until saucy.

Booting and after leaving and doing CTRL+D. I get a lovely kernel panic
with the message:

/init: line 352: can't open /root/dev/console: no such file

Kernel panic - not syncing: Attempted to kill init! exitcode
0x0200

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1212977

Title:
  saucy daily-live images are unbootable on Dell Optiplex 990; stuck in
  BusyBox shell

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215005] Re: linux: 2.6.32-51.113 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 2.6.32-51.113 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 16:16 UTC
  kernel-stable-Prepare-package-end:Thursday, 22. August 2013 03:03 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 03:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 05:01 UTC
  kernel-stable-Verification-testing-start:Thursday, 22. August 2013 06:03 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:29 UTC
  kernel-stable-Regression-testing-end:Monday, 02. September 2013 19:01 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 12:01 UTC
- kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:01 UTC
- kernel-stable-phase-changed:Thursday, 05. September 2013 21:01 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 21:01 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:01 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:04 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215005

Title:
  linux: 2.6.32-51.113 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215005/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1212977] Re: saucy daily-live images are unbootable on Dell Optiplex 990; stuck in BusyBox shell

2013-09-06 Thread Phil Wyett
From #39 also Q3.

Doing a dist-upgrade from 13.04 is fine. There are no issuesas I have
seen on the  20 times I have done it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1212977

Title:
  saucy daily-live images are unbootable on Dell Optiplex 990; stuck in
  BusyBox shell

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1212977/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1221556] [NEW] i3lock fails to authentificate and unlock screen sometimes

2013-09-06 Thread Mike A. Kuznetsov
Public bug reported:

Description:Ubuntu Saucy Salamander (development branch)
Release:13.10

i3lock:
  Installed: 2.5-1
  Candidate: 2.5-1
  Version table:
 *** 2.5-1 0
500 http://ru.archive.ubuntu.com/ubuntu/ saucy/universe amd64 Packages
100 /var/lib/dpkg/status

Sometimes i can't get my screen unlocked back and i had to switch to the
text console by Ctrl-Alt-F2, log in there and kill the locker. There are
auth error messages in /var/log/auth.log appear on unlock attempt:

Sep  6 09:19:34 zimbabve unix_chkpwd[28581]: password check failed for user 
(mike)
Sep  6 09:19:34 zimbabve i3lock: pam_unix(i3lock:auth): authentication failure; 
logname= uid=1000 euid=1000 tty= ruser= rhost=  user=mike

Googling discovers only the fact that this behavior is common for some
other lockers like Xlock and so on.

Maybe systemd-logind related bug

** Affects: i3lock (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221556

Title:
  i3lock fails to authentificate and unlock screen sometimes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/i3lock/+bug/1221556/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215173] Re: linux: 3.2.0-53.81 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-53.81 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 22:16 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 01:08 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 01:08 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 02:02 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 03:03 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:31 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 14:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
- kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:02 UTC
- kernel-stable-phase-changed:Thursday, 05. September 2013 20:02 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 20:02 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:08 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215173

Title:
  linux: 3.2.0-53.81 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215173/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1171435] Re: [AV200 - Xonar STX, recording] Microphone is not working on frontpanel

2013-09-06 Thread Dmitriy Simplehuman Fedorov
Raymond, I tried every 4 options in Sound settings in input tab

Each option does not work.

It is actual on Ubuntu 13.10 x64, 3.11 kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1171435

Title:
  [AV200 - Xonar STX, recording] Microphone is not working on frontpanel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1171435/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215239] Re: linux-ec2: 2.6.32-356.69 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 03:01 UTC
  kernel-stable-master-bug:1215005
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 04:02 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 18:32 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 18:32 UTC
  kernel-stable-Promote-to-proposed-end:Monday, 26. August 2013 19:02 UTC
  kernel-stable-Verification-testing-start:Monday, 26. August 2013 20:03 UTC
  kernel-stable-Security-signoff-start:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Verification-testing-end:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Regression-testing-start:Monday, 26. August 2013 22:04 UTC
  kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 21:03 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 21:03 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:03 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:09 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215239

Title:
  linux-ec2: 2.6.32-356.69 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215239/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215276] Re: linux-ti-omap4: 3.5.0-232.48 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:34 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:03 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:03 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:03 UTC
  kernel-stable-Verification-testing-start:Thursday, 29. August 2013 03:03 UTC
  kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:02 UTC
  kernel-stable-Regression-testing-end:Friday, 30. August 2013 09:02 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:03 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 19:03 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:03 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:09 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215276

Title:
  linux-ti-omap4: 3.5.0-232.48 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215276/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215129] Re: linux: 3.5.0-40.62 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.5.0-40.62 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Wednesday, 21. August 2013 20:25 UTC
  kernel-stable-Prepare-package-end:Thursday, 22. August 2013 05:41 UTC
  kernel-stable-Promote-to-proposed-start:Thursday, 22. August 2013 05:41 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 22. August 2013 06:04 UTC
  kernel-stable-Verification-testing-start:Thursday, 22. August 2013 07:09 UTC
  kernel-stable-Verification-testing-end:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Certification-testing-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Security-signoff-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-start:Friday, 30. August 2013 15:30 UTC
  kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 09:01 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:02 UTC
- kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:02 UTC
- kernel-stable-phase-changed:Thursday, 05. September 2013 19:02 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:01 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:02 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:06 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215129

Title:
  linux: 3.5.0-40.62 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215129/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215279] Re: linux-lowlatency: 3.5.0-40.41 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:37 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:06 UTC
  kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:06 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:53 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:53 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:03 UTC
  kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:04 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:04 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:04 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:04 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:05 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:11 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215279

Title:
  linux-lowlatency: 3.5.0-40.41  -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215279/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215677] Re: linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.8.0-30.44~precise1 upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 00:07 UTC
  kernel-stable-master-bug:1215596
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 20:02 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 20:02 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 21:04 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 22:04 UTC
  kernel-stable-Verification-testing-end:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Certification-testing-start:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Security-signoff-start:Sunday, 01. September 2013 15:06 UTC
  kernel-stable-Regression-testing-start:Sunday, 01. September 2013 15:05 UTC
  kernel-stable-Regression-testing-end:Wednesday, 04. September 2013 13:06 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:06 UTC
- kernel-stable-phase:CopyToUpdates
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:05 UTC
- kernel-stable-phase-changed:Thursday, 05. September 2013 19:05 UTC
  kernel-stable-Certification-testing-end:Thursday, 05. September 2013 19:05 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:06 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:13 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215677

Title:
  linux-lts-raring: 3.8.0-30.44~precise1 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215677/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215690] Re: linux-armadaxp: 3.2.0-1624.36 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.2.0-1624.36 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:04 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 15:04 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 15:04 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:04 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:06 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:05 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:05 UTC
  kernel-stable-Regression-testing-end:Tuesday, 27. August 2013 16:06 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:14 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215690

Title:
  linux-armadaxp: 3.2.0-1624.36 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215690/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215689] Re: linux-ti-omap4: 3.2.0-1437.56 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:02 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Wednesday, 28. August 2013 21:06 UTC
  kernel-stable-Promote-to-proposed-start:Wednesday, 28. August 2013 21:06 UTC
  kernel-stable-Promote-to-proposed-end:Thursday, 29. August 2013 01:05 UTC
  kernel-stable-Verification-testing-start:Thursday, 29. August 2013 02:05 UTC
  kernel-stable-Security-signoff-start:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Verification-testing-end:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Regression-testing-start:Thursday, 29. August 2013 04:05 UTC
  kernel-stable-Regression-testing-end:Monday, 02. September 2013 09:05 UTC
  kernel-stable-Security-signoff-end:Wednesday, 04. September 2013 13:07 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:05 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:07 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:14 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215689

Title:
  linux-ti-omap4: 3.2.0-1437.56 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215689/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1218815] Re: [radeon] Graphic glitches and screen corruption (vertical lines) on XMir surfaces only

2013-09-06 Thread Chris Halse Rogers
So, this might be due to differing radeon_surface layouts based on the
RADEON_SURF_SCANOUT flag.

tvoss can apparently reproduce this, and it goes away when he *doesn't*
add the SCANOUT flag to the gbm bo in Mir¹. XMir never sets
RADEON_SURF_SCANOUT, so it's plausible that this is the issue.

¹: Luckily, it appears that this buffer still happens to be scanoutable
☺

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1218815

Title:
  [radeon] Graphic glitches and screen corruption (vertical lines) on
  XMir surfaces only

To manage notifications about this bug go to:
https://bugs.launchpad.net/mir/+bug/1218815/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1215278] Re: linux-armadaxp: 3.5.0-1621.29 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the 3.5.0-1621.29 upload package. This bug will
  contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Thursday, 22. August 2013 05:35 UTC
  kernel-stable-master-bug:1215129
  kernel-stable-Certification-testing-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Security-signoff-end:Thursday, 22. August 2013 06:05 UTC
  kernel-stable-Prepare-package-end:Friday, 23. August 2013 09:02 UTC
  kernel-stable-Promote-to-proposed-start:Friday, 23. August 2013 09:03 UTC
  kernel-stable-Promote-to-proposed-end:Friday, 23. August 2013 18:02 UTC
  kernel-stable-Verification-testing-start:Friday, 23. August 2013 19:03 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 07:03 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 07:03 UTC
  kernel-stable-Regression-testing-end:Wednesday, 28. August 2013 09:02 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 19:04 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:04 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:10 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215278

Title:
  linux-armadaxp: 3.5.0-1621.29 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1215692] Re: linux-lowlatency: 3.2.0-53.55 -proposed tracker

2013-09-06 Thread Brad Figg
The package has been published and the bug is being set to Fix Released


** Changed in: kernel-sru-workflow
   Status: In Progress = Fix Released

** Description changed:

  This bug is for tracking the version to be filled upload package. This
  bug will contain status and testing results related to that upload.
  
  For an explanation of the tasks and the associated workflow see: 
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
  kernel-stable-Prepare-package-start:Friday, 23. August 2013 01:06 UTC
  kernel-stable-master-bug:1215173
  kernel-stable-Certification-testing-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Security-signoff-end:Friday, 23. August 2013 02:04 UTC
  kernel-stable-Prepare-package-end:Monday, 26. August 2013 23:56 UTC
  kernel-stable-Promote-to-proposed-start:Monday, 26. August 2013 23:56 UTC
  kernel-stable-Promote-to-proposed-end:Tuesday, 27. August 2013 00:05 UTC
  kernel-stable-Verification-testing-start:Tuesday, 27. August 2013 01:07 UTC
  kernel-stable-Verification-testing-end:Tuesday, 27. August 2013 04:06 UTC
  kernel-stable-Regression-testing-start:Tuesday, 27. August 2013 04:06 UTC
  kernel-stable-Regression-testing-end:Tuesday, 03. September 2013 15:07 UTC
- kernel-stable-phase:CopyToUpdates
- kernel-stable-phase-changed:Thursday, 05. September 2013 20:06 UTC
  kernel-stable-Promote-to-updates-start:Thursday, 05. September 2013 20:06 UTC
  kernel-stable-Promote-to-updates-end:Friday, 06. September 2013 06:08 UTC
+ kernel-stable-phase:Released
+ kernel-stable-phase-changed:Friday, 06. September 2013 07:15 UTC

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215692

Title:
  linux-lowlatency: 3.2.0-53.55 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1215692/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 862430] Re: window flicker for a short time after switching workspaces

2013-09-06 Thread Ben
Thanks for posting back Gregory.  It looks like my earlier problems with
Doug's fix had to do with having a second monitor connected.  Now that
I'm home with just the laptop screen there's no flicker.  I'll confirm
this tomorrow when I reconnect the second monitor, in the mean time I'm
really enjoying the lack of flicker, it's like 10.04 all over again!
Thanks Doug!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/862430

Title:
  window flicker for a short time after switching workspaces

To manage notifications about this bug go to:
https://bugs.launchpad.net/compiz/+bug/862430/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1219212] Re: USB Keyboard and Mouse stop working after update to 3.5.0-39

2013-09-06 Thread Julian Wiedmann
3.5.0-40.62 is in -updates now.

** Changed in: linux (Ubuntu)
   Status: Fix Committed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1219212

Title:
  USB Keyboard and Mouse stop working after update to 3.5.0-39

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1219212/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1214956] Re: Quantal update to 3.5.7.20 stable release

2013-09-06 Thread Julian Wiedmann
** Changed in: linux (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214956

Title:
  Quantal update to 3.5.7.20 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1214956/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1200277] Re: [LibreOffice] - libreoffice-writer.desktop when drag/drop to desktop, 100% broken.

2013-09-06 Thread Ritesh Khadgaray
** Project changed: df-libreoffice = gnome-panel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1200277

Title:
  [LibreOffice] - libreoffice-writer.desktop when drag/drop to desktop,
  100% broken.

To manage notifications about this bug go to:
https://bugs.launchpad.net/gnome-panel/+bug/1200277/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 748850] Re: Can't middle or right click on bookmarks to open in new tab

2013-09-06 Thread John Rose
I'm using Precise 64 bit with Firefox 23.0. I've also tried the nightly
build of firefox-trunk (version 26.0a1) but the bug wasn't fixed in
that. I'm baffled by how the status of this bug against Global Menubar
Extension is 'Fix committed' when that addon seems now to have been
withdrawn for Ubuntu.

I've reported this bug as bug 913556 against Firefox in Bugzilla.
Judging by the number of bugs in Firefox which are not allocated, I
wonder if it will ever be fixed!

Re David Marzal's suggestion of using the addon bug582139: I've
installed it  restarted Firefox, clicked ViewToolbarsCustomise but I
don't see any Bookmarks icon with an arrow by it in the popup containing
icons. Nor do I see it anywhere else. If I use the standard Bookmarks
icon, I still get the same incorrect behaviour.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/748850

Title:
  Can't middle or right click on bookmarks to open in new tab

To manage notifications about this bug go to:
https://bugs.launchpad.net/globalmenu-extension/+bug/748850/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   3   4   5   6   7   8   9   10   >