[Bug 1374730] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that keepalived didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for keepalived: PDG]ssl_connect'1 [Found]SSL_connect() [HASH] 1598777261 [LineNo]@ 211[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/keepalived/keepalived-1.2.2/keepalived/check/check_ssl.c [Warning] SSL_new() not found! [PDG]ssl_connect [Found]SSL_connect() [HASH] 2061808858 [LineNo]@ 107[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/keepalived/keepalived-1.2.2/genhash/ssl.c [Warning] SSL_new() not found! We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: keepalived (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to keepalived in Ubuntu. https://bugs.launchpad.net/bugs/1374730 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keepalived/+bug/1374730/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1371133] Re: prep / ppc64el boot broken. tries install to prep partition
This bug was fixed in the package curtin - 0.1.0~bzr190-0ubuntu1 --- curtin (0.1.0~bzr190-0ubuntu1) utopic; urgency=medium * New upstream snapshot. * add log reporter (LP: #1369129, LP: #1371218) * allow debug messages of helper programs to be seen * fix 'make check' * handle utf-8 output correctly. (LP: #1370249) * set root device correctly on ppc64 (LP: #1371133) * call update-grub to ensure grub.cfg is written (LP: #1373137) * fix dd-tgz mode, only call partprobe on target device. -- Scott Moser smo...@ubuntu.com Fri, 26 Sep 2014 17:26:34 -0400 ** Branch linked: lp:ubuntu/utopic-proposed/curtin ** Changed in: curtin (Ubuntu) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to curtin in Ubuntu. https://bugs.launchpad.net/bugs/1371133 Title: prep / ppc64el boot broken. tries install to prep partition To manage notifications about this bug go to: https://bugs.launchpad.net/curtin/+bug/1371133/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1371218] Re: curtin output badly broken. command errors ignored.
This bug was fixed in the package curtin - 0.1.0~bzr190-0ubuntu1 --- curtin (0.1.0~bzr190-0ubuntu1) utopic; urgency=medium * New upstream snapshot. * add log reporter (LP: #1369129, LP: #1371218) * allow debug messages of helper programs to be seen * fix 'make check' * handle utf-8 output correctly. (LP: #1370249) * set root device correctly on ppc64 (LP: #1371133) * call update-grub to ensure grub.cfg is written (LP: #1373137) * fix dd-tgz mode, only call partprobe on target device. -- Scott Moser smo...@ubuntu.com Fri, 26 Sep 2014 17:26:34 -0400 ** Branch linked: lp:ubuntu/utopic-proposed/curtin ** Changed in: curtin (Ubuntu) Status: Fix Committed = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to curtin in Ubuntu. https://bugs.launchpad.net/bugs/1371218 Title: curtin output badly broken. command errors ignored. To manage notifications about this bug go to: https://bugs.launchpad.net/curtin/+bug/1371218/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1373137] Re: need to run update-grub when grub-install
This bug was fixed in the package curtin - 0.1.0~bzr190-0ubuntu1 --- curtin (0.1.0~bzr190-0ubuntu1) utopic; urgency=medium * New upstream snapshot. * add log reporter (LP: #1369129, LP: #1371218) * allow debug messages of helper programs to be seen * fix 'make check' * handle utf-8 output correctly. (LP: #1370249) * set root device correctly on ppc64 (LP: #1371133) * call update-grub to ensure grub.cfg is written (LP: #1373137) * fix dd-tgz mode, only call partprobe on target device. -- Scott Moser smo...@ubuntu.com Fri, 26 Sep 2014 17:26:34 -0400 ** Branch linked: lp:ubuntu/utopic-proposed/curtin ** Changed in: curtin (Ubuntu) Status: Triaged = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to curtin in Ubuntu. https://bugs.launchpad.net/bugs/1373137 Title: need to run update-grub when grub-install To manage notifications about this bug go to: https://bugs.launchpad.net/curtin/+bug/1373137/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1369514] Re: django-pyscss can't find bootstrap files from xstatic
** Changed in: horizon Status: In Progress = Fix Committed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-django-pyscss in Ubuntu. https://bugs.launchpad.net/bugs/1369514 Title: django-pyscss can't find bootstrap files from xstatic To manage notifications about this bug go to: https://bugs.launchpad.net/horizon/+bug/1369514/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1363519] Re: start-stop-daemon fails debsums check
Just a quick note that I've seen several bug reports filed since this one that included some Dependencies.txt files with lines like modified: sbin/start-stop-daemon -- I think this is more widespread than this bug indicates. See 1374670 for an example. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1363519 Title: start-stop-daemon fails debsums check To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dpkg/+bug/1363519/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1005334] Re: perl: warning: Setting locale failed. perl: warning: Please check that your locale settings: LANGUAGE = (unset), LC_ALL = (unset), LC_CTYPE = UTF-8, LANG = en_US.UTF-8
Probably no bug; just incorrect locale configuration. ** Changed in: langpack-locales (Ubuntu) Status: Confirmed = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1005334 Title: perl: warning: Setting locale failed. perl: warning: Please check that your locale settings:LANGUAGE = (unset), LC_ALL = (unset), LC_CTYPE = UTF-8, LANG = en_US.UTF-8 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/langpack-locales/+bug/1005334/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374676] Re: [TOSHIBA Satellite C670D] suspend/resume failure [non-free: fglrx]
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374676 Title: [TOSHIBA Satellite C670D] suspend/resume failure [non-free: fglrx] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374676/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374676] Re: [TOSHIBA Satellite C670D] suspend/resume failure [non-free: fglrx]
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a regular (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374676 Title: [TOSHIBA Satellite C670D] suspend/resume failure [non-free: fglrx] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374676/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374676] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374676 Title: [TOSHIBA Satellite C670D] suspend/resume failure [non-free: fglrx] To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374676/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374692] [NEW] package python-aptdaemon 1.1.1-1ubuntu5 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1
Public bug reported: updating the os is no more possible with aptdaemon ProblemType: Package DistroRelease: Ubuntu 14.04 Package: python-aptdaemon 1.1.1-1ubuntu5 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 Date: Sat Sep 27 08:05:46 2014 DuplicateSignature: package:python-aptdaemon:1.1.1-1ubuntu5:subprocess new pre-removal script returned error exit status 1 ErrorMessage: subprocess new pre-removal script returned error exit status 1 InstallationDate: Installed on 2014-04-20 (159 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) PackageArchitecture: all SourcePackage: aptdaemon Title: package python-aptdaemon 1.1.1-1ubuntu5 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: aptdaemon (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374692 Title: package python-aptdaemon 1.1.1-1ubuntu5 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1374692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374692] Re: package python-aptdaemon 1.1.1-1ubuntu5 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374692 Title: package python-aptdaemon 1.1.1-1ubuntu5 failed to install/upgrade: subprocess new pre-removal script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aptdaemon/+bug/1374692/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374222] Re: path for policy files changed
Looks like we may need to adjust apparmor policy lines too. I wonder what motivated the path change. ** Information type changed from Private Security to Public Security ** Also affects: apparmor (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374222 Title: path for policy files changed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1374222/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374222] Re: path for policy files changed
It's not called out specifically in the change log. The existing entries in the change log are very concerning for the 12.04 LTS update: chromium-browser (37.0.2062.120-0ubuntu0.12.04.1~pkg917) precise- security; urgency=medium * Release to stage chromium-browser (37.0.2062.120-0ubuntu1) UNRELEASED; urgency=low * Upstream release 37.0.2062.120: - CVE-2014-3178: Use-after-free in rendering. Credit to miaubiz. - CVE-2014-3179: Various fixes from internal audits, fuzzing and other initiatives. * debian/rules: Simplify and rearrange. * debian/rules, debian/known_gyp_flags: Keep better track of known GYP flags, so we can fail when something changes unexpectedly. * debian/rules: Fix up patch-translations rule. Why are changes being made to debian/rules to Simplify and rearrange in an LTS update? That's just inviting problems like this. In looking at a side-by-side diff (via meld), it appears that the removal of this line may have been of victim of the referenced rearranging. I attempted to find the packaging source repository, but the one referenced in LP appears to be out dated and did not see a reference to the current one (if there is a public one). ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3178 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3179 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374222 Title: path for policy files changed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1374222/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374222] Re: path for policy files changed
Browsers are special. We certainly don't have the resources to fix only security issues found in the browsers as we do with most other packages. We package what upstream produces and this is far from the first thing they've moved: the name of the sandbox executable has changed three or four times since I've been paying attention and I wouldn't be surprised if they change it again in the future. Overall, the benefits of shipping recent browsers with recent features and recent fixes works out for the best but it doesn't fit the traditional LTS mold well. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374222 Title: path for policy files changed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1374222/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374695] [NEW] Logitech mouse LX5 ( 046D:C50E ) not well identified
Public bug reported: I'm using a Logitech LX5 cordless optical mouse and is recognised (or seems to be) but get hard time using it: - single/double click give very erratic results - select drag is a nightmare: often lost the selected object on the way, or need several tries before being able to select it - System Settings mouse options seems really useless Pluging that mouse with its os2 adaptor or directly on usb makes no difference. These issues are observed from 12.04 with its stoc kernel to 14.10 with the latest kernel upstream. So i wonder if its only a kernel issue or a server config when compiling or the compiler itself. That said, the problem is serious and very annoying when , for example, i want to select large block of cells into libreoffice calc, as most of the time the selection is lost before having done the job. oem@u32:~$ dmesg | grep mouse [0.672053] mousedev: PS/2 mouse device common for all mice oem@u32:~$ dmesg | grep Logitech [1.339824] usb 3-2: Manufacturer: Logitech [1.389440] input: Logitech USB RECEIVER as /devices/pci:00/:00:1d.1/usb3/3-2/3-2:1.0/0003:046D:C50E.0001/input/input3 [1.389679] hid-generic 0003:046D:C50E.0001: input,hidraw0: USB HID v1.11 Mouse [Logitech USB RECEIVER] on usb-:00:1d.1-2/input0 oem@u32:~$ dmesg | grep usb [0.167202] usbcore: registered new interface driver usbfs [0.168016] usbcore: registered new interface driver hub [0.168073] usbcore: registered new device driver usb [0.668129] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 [0.668183] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.668248] usb usb1: Product: EHCI Host Controller [0.668300] usb usb1: Manufacturer: Linux 3.16.0-18-generic ehci_hcd [0.668353] usb usb1: SerialNumber: :00:1d.7 [0.669493] usb usb2: New USB device found, idVendor=1d6b, idProduct=0001 [0.669548] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.669612] usb usb2: Product: UHCI Host Controller [0.669664] usb usb2: Manufacturer: Linux 3.16.0-18-generic uhci_hcd [0.669717] usb usb2: SerialNumber: :00:1d.0 [0.670496] usb usb3: New USB device found, idVendor=1d6b, idProduct=0001 [0.670550] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.670614] usb usb3: Product: UHCI Host Controller [0.670666] usb usb3: Manufacturer: Linux 3.16.0-18-generic uhci_hcd [0.670719] usb usb3: SerialNumber: :00:1d.1 [1.164028] usb 3-2: new low-speed USB device number 2 using uhci_hcd [1.338486] usb 3-2: New USB device found, idVendor=046d, idProduct=c50e [1.338544] usb 3-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [1.339774] usb 3-2: Product: USB RECEIVER [1.339824] usb 3-2: Manufacturer: Logitech [1.384185] usbcore: registered new interface driver usbhid [1.384186] usbhid: USB HID core driver [1.389440] input: Logitech USB RECEIVER as /devices/pci:00/:00:1d.1/usb3/3-2/3-2:1.0/0003:046D:C50E.0001/input/input3 [1.389679] hid-generic 0003:046D:C50E.0001: input,hidraw0: USB HID v1.11 Mouse [Logitech USB RECEIVER] on usb-:00:1d.1-2/input0 oem@u32:~$ logitech_applet 003/002 046D/C50E M-RAG97 MX1000 Laser Mouse Error getting cordless status from device : error sending control message: Operation not permitted Channel 1Battery: 0Single channel No 800cpi support No Horiz Roller No Vert Roller 2 butt. That is: that mouse only have 2 buttons and a wheel, but xorg.0.log warns about: Warning: Only changing the first 12 of 24 buttons. So i'm not sure which package has to be blamed: mousedev driver ? hardware identification ? xserver ? This has been already reported by other users: lp:725911 lp:1006145 ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-18-generic 3.16.0-18.25 ProcVersionSignature: Ubuntu 3.16.0-18.25-generic 3.16.3 Uname: Linux 3.16.0-18-generic i686 NonfreeKernelModules: nvidia ApportVersion: 2.14.7-0ubuntu2 Architecture: i386 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC1: oem1584 F pulseaudio /dev/snd/controlC0: oem1584 F pulseaudio CurrentDesktop: GNOME Date: Sat Sep 27 08:44:00 2014 HibernationDevice: RESUME=UUID=0a9ca7f0-6eeb-4b21-b70f-670fa600de16 IwConfig: lono wireless extensions. eth0 no wireless extensions. eth1 no wireless extensions. Lsusb: Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver Bus 003 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub MachineType: ASUSTEK COMPUTER INC P5W DH Deluxe ProcFB: ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-18-generic root=UUID=7b1f4a51-558f-468f-85e0-f815d2f791e1 ro init=/lib/systemd/systemd RelatedPackageVersions:
[Bug 1374222] Re: path for policy files changed
Are the debian/rules changes from upstream? Near as I can tell, upstream does not have a debian directory in its source tree: https://chromium.googlesource.com/chromium/src.git/+/37.0.2062.120 Or are you referring to a different upstream? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374222 Title: path for policy files changed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1374222/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1101134] Re: Incorrect delimiter on pt_BR
** Bug watch added: Sourceware.org Bugzilla #17438 http://sourceware.org/bugzilla/show_bug.cgi?id=17438 ** Also affects: glibc via http://sourceware.org/bugzilla/show_bug.cgi?id=17438 Importance: Unknown Status: Unknown -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1101134 Title: Incorrect delimiter on pt_BR To manage notifications about this bug go to: https://bugs.launchpad.net/glibc/+bug/1101134/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1087981] Re: 046d:c50e LX5 cordless optical logitech mouse wrongly identified as MX1000 laser mouse
there was no such issue with the 3.2 kernel ** Tags removed: kernel-bug-exists-upstream-v3.11-rc5 latest-bios-3002 raring regression-potential saucy ** Tags added: kernel-bug-exists-upstream-v3.16.0.18 utopic ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1087981 Title: 046d:c50e LX5 cordless optical logitech mouse wrongly identified as MX1000 laser mouse To manage notifications about this bug go to: https://bugs.launchpad.net/evdev/+bug/1087981/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374695] Re: Logitech mouse LX5 ( 046D:C50E ) not well identified
** Description changed: I'm using a Logitech LX5 cordless optical mouse and is recognised (or seems to be) but get hard time using it: - single/double click give very erratic results - select drag is a nightmare: often lost the selected object on the way, or need several tries before being able to select it - System Settings mouse options seems really useless Pluging that mouse with its os2 adaptor or directly on usb makes no difference. These issues are observed from 12.04 with its stoc kernel to 14.10 with the latest kernel upstream. So i wonder if its only a kernel issue or a server config when compiling or the compiler itself. That said, the problem is serious and very annoying when , for example, i want to select large block of cells into libreoffice calc, as most of the time the selection is lost before having done the job. - oem@u32:~$ dmesg | grep mouse [0.672053] mousedev: PS/2 mouse device common for all mice oem@u32:~$ dmesg | grep Logitech [1.339824] usb 3-2: Manufacturer: Logitech [1.389440] input: Logitech USB RECEIVER as /devices/pci:00/:00:1d.1/usb3/3-2/3-2:1.0/0003:046D:C50E.0001/input/input3 [1.389679] hid-generic 0003:046D:C50E.0001: input,hidraw0: USB HID v1.11 Mouse [Logitech USB RECEIVER] on usb-:00:1d.1-2/input0 oem@u32:~$ dmesg | grep usb [0.167202] usbcore: registered new interface driver usbfs [0.168016] usbcore: registered new interface driver hub [0.168073] usbcore: registered new device driver usb [0.668129] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002 [0.668183] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.668248] usb usb1: Product: EHCI Host Controller [0.668300] usb usb1: Manufacturer: Linux 3.16.0-18-generic ehci_hcd [0.668353] usb usb1: SerialNumber: :00:1d.7 [0.669493] usb usb2: New USB device found, idVendor=1d6b, idProduct=0001 [0.669548] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.669612] usb usb2: Product: UHCI Host Controller [0.669664] usb usb2: Manufacturer: Linux 3.16.0-18-generic uhci_hcd [0.669717] usb usb2: SerialNumber: :00:1d.0 [0.670496] usb usb3: New USB device found, idVendor=1d6b, idProduct=0001 [0.670550] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [0.670614] usb usb3: Product: UHCI Host Controller [0.670666] usb usb3: Manufacturer: Linux 3.16.0-18-generic uhci_hcd [0.670719] usb usb3: SerialNumber: :00:1d.1 [1.164028] usb 3-2: new low-speed USB device number 2 using uhci_hcd [1.338486] usb 3-2: New USB device found, idVendor=046d, idProduct=c50e [1.338544] usb 3-2: New USB device strings: Mfr=1, Product=2, SerialNumber=0 [1.339774] usb 3-2: Product: USB RECEIVER [1.339824] usb 3-2: Manufacturer: Logitech [1.384185] usbcore: registered new interface driver usbhid [1.384186] usbhid: USB HID core driver [1.389440] input: Logitech USB RECEIVER as /devices/pci:00/:00:1d.1/usb3/3-2/3-2:1.0/0003:046D:C50E.0001/input/input3 [1.389679] hid-generic 0003:046D:C50E.0001: input,hidraw0: USB HID v1.11 Mouse [Logitech USB RECEIVER] on usb-:00:1d.1-2/input0 oem@u32:~$ logitech_applet 003/002 046D/C50E M-RAG97 MX1000 Laser Mouse -Error getting cordless status from device : error sending control message: Operation not permitted -Channel 1Battery: 0Single channel No 800cpi support No Horiz Roller No Vert Roller 2 butt. + Error getting cordless status from device : error sending control message: Operation not permitted + Channel 1Battery: 0Single channel No 800cpi support No Horiz Roller No Vert Roller 2 butt. + + lsusb -v output for usb3: + Bus 003 Device 002: ID 046d:c50e Logitech, Inc. Cordless Mouse Receiver + Couldn't open device, some information will be missing + Device Descriptor: + bLength18 + bDescriptorType 1 + bcdUSB 1.10 + bDeviceClass0 (Defined at Interface level) + bDeviceSubClass 0 + bDeviceProtocol 0 + bMaxPacketSize0 8 + idVendor 0x046d Logitech, Inc. + idProduct 0xc50e Cordless Mouse Receiver + bcdDevice 25.10 + iManufacturer 1 + iProduct2 + iSerial 0 + bNumConfigurations 1 + Configuration Descriptor: + bLength 9 + bDescriptorType 2 + wTotalLength 34 + bNumInterfaces 1 + bConfigurationValue 1 + iConfiguration 0 + bmAttributes 0xa0 + (Bus Powered) + Remote Wakeup + MaxPower 70mA + Interface Descriptor: + bLength 9 + bDescriptorType 4 + bInterfaceNumber0 +
[Bug 1373654] Re: linux-ti-omap4: version to be filled -proposed tracker
*** This bug is a duplicate of bug 1372683 *** https://bugs.launchpad.net/bugs/1372683 ** This bug has been marked a duplicate of bug 1372683 linux-ti-omap4: 3.2.0-1455.75 -proposed tracker -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373654 Title: linux-ti-omap4: version to be filled -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1373654/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374695] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374695 Title: Logitech mouse LX5 ( 046D:C50E ) not well identified To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374695/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373682] Re: linux: 3.16.0-18.25 -proposed tracker
** Changed in: kernel-development-workflow/promote-to-release Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373682 Title: linux: 3.16.0-18.25 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1373682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373682] Re: linux: 3.16.0-18.25 -proposed tracker
All builds are complete, packages in this bug are available in -proposed. ** Changed in: kernel-development-workflow/prepare-package Status: New = Fix Released ** Changed in: kernel-development-workflow/prepare-package Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner (timg-tpi) ** Changed in: kernel-development-workflow/prepare-package-signed Status: New = Fix Released ** Changed in: kernel-development-workflow/prepare-package-signed Assignee: Canonical Kernel Team (canonical-kernel-team) = Tim Gardner (timg-tpi) ** Changed in: kernel-development-workflow/package-testing Status: New = Confirmed ** Changed in: kernel-development-workflow/package-testing Status: Confirmed = In Progress ** Changed in: kernel-development-workflow/package-testing Status: In Progress = Confirmed ** Description changed: This bug is for tracking the 3.16.0-18.24 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 25. September 2014 01:24 UTC - kernel-phase-changed:Thursday, 25. September 2014 01:24 UTC - kernel-phase:Prepare + kernel-phase-changed:Saturday, 27. September 2014 07:29 UTC + kernel-Prepare-package-end:Saturday, 27. September 2014 07:29 UTC + kernel-Package-testing-start:Saturday, 27. September 2014 07:29 UTC + kernel-phase:PPA Testing + ppa-package-testing-start:Saturday, 27. September 2014 07:29 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373682 Title: linux: 3.16.0-18.25 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1373682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373682] Re: linux: 3.16.0-18.25 -proposed tracker
** Summary changed: - linux: 3.16.0-18.24 -proposed tracker + linux: 3.16.0-18.25 -proposed tracker -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373682 Title: linux: 3.16.0-18.25 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1373682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1372657] Re: linux: 2.6.32-67.134 -proposed tracker
Copied to -proposed and overrides adjusted. ** Changed in: kernel-sru-workflow/promote-to-proposed Status: Confirmed = Fix Released ** Changed in: kernel-sru-workflow/promote-to-proposed Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) = Adam Conrad (adconrad) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372657 Title: linux: 2.6.32-67.134 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1372657/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373682] Re: linux: 3.16.0-18.25 -proposed tracker
** Changed in: kernel-development-workflow/package-testing Status: Confirmed = Won't Fix ** Description changed: This bug is for tracking the 3.16.0-18.24 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 25. September 2014 01:24 UTC kernel-phase-changed:Saturday, 27. September 2014 07:29 UTC kernel-Prepare-package-end:Saturday, 27. September 2014 07:29 UTC kernel-Package-testing-start:Saturday, 27. September 2014 07:29 UTC kernel-phase:PPA Testing ppa-package-testing-start:Saturday, 27. September 2014 07:29 UTC + kernel-Promote-to-release-end:Saturday, 27. September 2014 07:30 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373682 Title: linux: 3.16.0-18.25 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1373682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1372685] Re: linux-lowlatency: version to be filled -proposed tracker
*** This bug is a duplicate of bug 1373657 *** https://bugs.launchpad.net/bugs/1373657 ** This bug has been marked a duplicate of bug 1373657 linux-lowlatency: version to be filled -proposed tracker -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372685 Title: linux-lowlatency: version to be filled -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1372685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374695] Re: Logitech mouse LX5 ( 046D:C50E ) not well identified
oem@u32:~$ sudo lomoco -i [sudo] password for oem: 003.002: 046d:c50e Receiver for MX1000 Laser (C-BN34) Caps: CSR SMS Receiver type: C50E Mouse type: Unknown (type 96) Connect button on mouse pressed: no Active RF Channel: 2 Battery status: 5 (good) Cordless security ID: 0x Receiver talking: yes Lock Request (CONNECT button pressed): no Mouse Powerup (First time out of the box auto-locking): no Receiver Unlocked (Mouse disconnected): no Wait Lock (Searching for mouse): no Device physical shape type: 0 SmartScroll (SMS): on USB Mouse Polling Interval: 10ms oem@u32:~$ sudo lomoco -s 003.002: 046d:c50e Receiver for MX1000 Laser (C-BN34) Caps: CSR SMS -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374695 Title: Logitech mouse LX5 ( 046D:C50E ) not well identified To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374695/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 752542] Re: ACPI DSDT info
hybrid graphics submittal ** Attachment added: hybrid graphics submittal https://bugs.launchpad.net/lpbugreporter/+bug/752542/+attachment/4216893/+files/Hewlett-Packard-HP_ENVY_17_Notebook_PC.tar.gz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/752542 Title: ACPI DSDT info To manage notifications about this bug go to: https://bugs.launchpad.net/bumblebee/+bug/752542/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374699] [NEW] nvidia-331 331.38-0ubuntu7.1: nvidia-331 kernel module failed to build
Public bug reported: a related issue might be that unity is not working anymore ProblemType: Package DistroRelease: Ubuntu 14.04 Package: nvidia-331 331.38-0ubuntu7.1 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 DKMSKernelVersion: 3.13.0-36-generic Date: Sat Sep 27 09:25:19 2014 InstallationDate: Installed on 2014-06-22 (96 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) PackageVersion: 331.38-0ubuntu7.1 SourcePackage: nvidia-graphics-drivers-331 Title: nvidia-331 331.38-0ubuntu7.1: nvidia-331 kernel module failed to build UpgradeStatus: No upgrade log present (probably fresh install) modified.conffile..etc.modprobe.d.nvidia.331.hybrid.conf: [deleted] ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374699 Title: nvidia-331 331.38-0ubuntu7.1: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1374699/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374698] Re: nautilus crashed with SIGABRT in g_assertion_message()
*** This bug is a duplicate of bug 1274291 *** https://bugs.launchpad.net/bugs/1274291 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1274291, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/1374698/+attachment/4216884/+files/CoreDump.gz ** Attachment removed: Disassembly.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216886/+files/Disassembly.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216887/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216888/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216889/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216890/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/1374698/+attachment/4216891/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of bug 1274291 nautilus SIGABRT NAUTILUS_IS_FILE (file) (when using under sudo?) ** Information type changed from Private to Public ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374698 Title: nautilus crashed with SIGABRT in g_assertion_message() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nautilus/+bug/1374698/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1372657] Re: linux: 2.6.32-67.134 -proposed tracker
** Description changed: This bug is for tracking the 2.6.32-67.134 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. September 2014 21:38 UTC kernel-stable-phase:PPA Testing kernel-stable-phase-changed:Friday, 26. September 2014 21:59 UTC kernel-stable-Prepare-package-end:Friday, 26. September 2014 21:59 UTC kernel-stable-Promote-to-proposed-start:Friday, 26. September 2014 21:59 UTC ppa-package-testing-start:Friday, 26. September 2014 21:59 UTC + kernel-stable-Promote-to-proposed-end:Saturday, 27. September 2014 08:00 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372657 Title: linux: 2.6.32-67.134 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1372657/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374695] Re: Logitech mouse LX5 ( 046D:C50E ) not well identified
From xorg.0.log Logitech USB RECEIVER: Applying InputClass evdev pointer catchall [23.696] (II) Using input driver 'evdev' for 'Logitech USB RECEIVER' [23.696] (**) Logitech USB RECEIVER: always reports core events [23.696] (**) evdev: Logitech USB RECEIVER: Device: /dev/input/event3 [23.697] (--) evdev: Logitech USB RECEIVER: Vendor 0x46d Product 0xc50e [23.697] (--) evdev: Logitech USB RECEIVER: Found 20 mouse buttons [23.697] (--) evdev: Logitech USB RECEIVER: Found scroll wheel(s) [23.697] (--) evdev: Logitech USB RECEIVER: Found relative axes [23.697] (--) evdev: Logitech USB RECEIVER: Found x and y relative axes [23.697] (II) evdev: Logitech USB RECEIVER: Configuring as mouse [23.697] (II) evdev: Logitech USB RECEIVER: Adding scrollwheel support [23.697] (**) evdev: Logitech USB RECEIVER: YAxisMapping: buttons 4 and 5 [23.697] (**) evdev: Logitech USB RECEIVER: EmulateWheelButton: 4, EmulateWheelInertia: 10, EmulateWheelTimeout: 200 [23.697] (**) Option config_info udev:/sys/devices/pci:00/:00:1d.1/usb3/3-2/3-2:1.0/0003:046D:C50E.0001/input/input3/event3 [23.697] (II) XINPUT: Adding extended input device Logitech USB RECEIVER (type: MOUSE, id 8) [23.697] (II) evdev: Logitech USB RECEIVER: initialized for relative axes. [23.697] (**) Logitech USB RECEIVER: (accel) keeping acceleration scheme 1 [23.697] (**) Logitech USB RECEIVER: (accel) acceleration profile 0 [23.697] (**) Logitech USB RECEIVER: (accel) acceleration factor: 2.000 [23.697] (**) Logitech USB RECEIVER: (accel) acceleration threshold: 4 [23.697] (II) config/udev: Adding input device Logitech USB RECEIVER (/dev/input/mouse0) [23.697] (II) No input driver specified, ignoring this device. [23.697] (II) This device may have been added with another device file. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374695 Title: Logitech mouse LX5 ( 046D:C50E ) not well identified To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374695/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 991481] Re: Constant dns traffic for daisy.ubuntu.com
This bug has been open two years and it's still occurring. I've noticed it during development of an open-source network security sensor I'm planning to publish in the next few weeks: { source: dns, port_id: 0, direction: 1, self: 0, length: 76, eth_type: 2048, smac: 50:e5:49:36:0a:db, dmac: 78:96:84:71:ea:c0, sip: 192.168.1.5, dip: 192.168.1.254, ip_protocol: 17, ttl: 0, l4_length: 42, icmp_type: 255, icmp_code: 255, sport: 37657, dport: 53, dns_name: daisy.ubuntu.com. } It's a little unbelievable it's been open this long with no concrete plan taking shape. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/991481 Title: Constant dns traffic for daisy.ubuntu.com To manage notifications about this bug go to: https://bugs.launchpad.net/whoopsie/+bug/991481/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373928] Re: Numeric values are not shown and displayed as 0
I have tested the build 1:4.3.2~rc2-0ubuntu1~trusty2 and the problem has been fixed. Thanks to all. I have not updated the status of this report, not being sure what correct procedure is. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373928 Title: Numeric values are not shown and displayed as 0 To manage notifications about this bug go to: https://bugs.launchpad.net/df-libreoffice/+bug/1373928/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374701] [NEW] mount.cifs gives input/output error when connecting to port 139
Public bug reported: Mounting a network share using mount.cifs through port 139 gives an input/output error. I'm using port 139 because the NAS I'm connecting to somehow needs a netbiosname. I'm using the following command: /sbin/mount.cifs //IP/SHARE MOUNTPOINT -o rw,guest,dir_mode=0770,file_mode=0770,uid=1000,gid=1000,port=139,netbiosname=laptop This command used to work: I have not changed the software or settings of the NAS, only updated software on the client (laptop). Although I'm running Lubuntu I suspect this bug is related to Ubuntu. I have found an identical bug on Fedora/Red Hat, with a patch that is reported to work: https://bugzilla.redhat.com/show_bug.cgi?id=1068862 dmesg gives the following error, that is similar to the output given on the above link [ 4874.026333] WARNING: CPU: 1 PID: 12553 at /build/buildd/linux-3.13.0/fs/cifs/transport.c:313 smb_send_rqst+0x201/0x260 [cifs]() [ 4874.026336] Send length mismatch(send_length=72 smb_buf_length=2164260932) [ 4874.026338] Modules linked in: nls_utf8 cifs fscache ctr ccm rfcomm bnep bluetooth binfmt_misc uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_core videodev arc4 snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_page_alloc pcmcia snd_seq_midi ath9k ath9k_common snd_seq_midi_event ath9k_hw joydev snd_rawmidi serio_raw ath mac80211 r592 yenta_socket lpc_ich memstick snd_seq snd_seq_device snd_timer snd pcmcia_rsrc pcmcia_core soundcore cfg80211 i915 asus_laptop video drm_kms_helper sparse_keymap drm mac_hid input_polldev parport_pc i2c_algo_bit ppdev coretemp lp parport ahci psmouse 8139too 8139cp sdhci_pci mii libahci sdhci [ 4874.026411] CPU: 1 PID: 12553 Comm: mount.cifs Tainted: GW 3.13.0-36-generic #63-Ubuntu [ 4874.026414] Hardware name: ASUSTeK Computer Inc. X58LE /X58LE , BIOS 201 12/09/2008 [ 4874.026417] eb3fbd5c c1653137 eb3fbd9c eb3fbd8c c105696e f93a8720 [ 4874.026426] eb3fbdb8 3109 f93a8648 0139 f9385301 f9385301 eb3fbe18 8144 [ 4874.026434] eb3fbdf4 eb3fbda4 c10569c3 0009 eb3fbd9c f93a8720 eb3fbdb8 eb3fbdec [ 4874.026443] Call Trace: [ 4874.026453] [c1653137] dump_stack+0x41/0x52 [ 4874.026459] [c105696e] warn_slowpath_common+0x7e/0xa0 [ 4874.026473] [f9385301] ? smb_send_rqst+0x201/0x260 [cifs] [ 4874.026485] [f9385301] ? smb_send_rqst+0x201/0x260 [cifs] [ 4874.026490] [c10569c3] warn_slowpath_fmt+0x33/0x40 [ 4874.026503] [f9385301] smb_send_rqst+0x201/0x260 [cifs] [ 4874.026509] [c1659ec2] ? _raw_spin_lock_bh+0x12/0x60 [ 4874.026522] [f938538c] smb_sendv+0x2c/0x40 [cifs] [ 4874.026535] [f93853c1] smb_send+0x21/0x30 [cifs] [ 4874.026546] [f9370f64] generic_ip_connect+0x2e4/0x3d0 [cifs] [ 4874.026557] [f9374de7] cifs_mount+0x687/0x970 [cifs] [ 4874.026567] [f9364f36] cifs_do_mount+0x86/0x480 [cifs] [ 4874.026573] [c11660d6] ? __kmalloc_track_caller+0x46/0x1d0 [ 4874.026579] [c112a1d5] ? __get_free_pages+0x25/0x40 [ 4874.026583] [c117ca01] mount_fs+0x31/0x170 [ 4874.026589] [c113dbcf] ? __alloc_percpu+0xf/0x20 [ 4874.026594] [c11949f9] vfs_kern_mount+0x49/0xd0 [ 4874.026599] [c1196b49] do_mount+0x1e9/0x950 [ 4874.026604] [c119684f] ? copy_mount_options+0x2f/0x100 [ 4874.026608] [c119754c] SyS_mount+0x7c/0xb0 [ 4874.026614] [c16614cd] sysenter_do_call+0x12/0x12 [ 4874.026617] ---[ end trace 511a18ed6bd3b4f6 ]--- [ 4874.028292] CIFS VFS: Error connecting to socket. Aborting operation. [ 4874.028576] CIFS VFS: cifs_mount failed w/return code = -5 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: cifs-utils 2:6.0-1ubuntu2 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic i686 ApportVersion: 2.14.1-0ubuntu3.4 Architecture: i386 CurrentDesktop: LXDE Date: Sat Sep 27 10:12:22 2014 InstallationDate: Installed on 2014-04-20 (159 days ago) InstallationMedia: Lubuntu 14.04 LTS Trusty Tahr - Release i386 (20140416.2) SourcePackage: cifs-utils UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: cifs-utils (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374701 Title: mount.cifs gives input/output error when connecting to port 139 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cifs-utils/+bug/1374701/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373781] Re: bash incomplete fix for CVE-2014-6271
Thank you for the reply Marc Simon. Unfortunately this isn't due to a leftover file. spyros@prod01:~# env X='() { (a)=\' bash -c echo date; cat echo bash: X: line 1: syntax error near unexpected token `=' bash: X: line 1: `' bash: error importing function definition for `X' Fri Sep 26 12:14:15 PDT 2014 spyros@prod01:~# rm echo spyros@prod01:~# env X='() { (a)=\' bash -c echo date; cat echo bash: X: line 1: syntax error near unexpected token `=' bash: X: line 1: `' bash: error importing function definition for `X' Fri Sep 26 12:15:24 PDT 2014 The only difference between the working and non-working version that I spot, is the -i argument to env, but I'm not sure why/how the empty environment would affect this. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373781 Title: bash incomplete fix for CVE-2014-6271 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1373781/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1101134] Re: Incorrect delimiter on pt_BR
** Patch added: fix_lp1101134_lp1242416.patch https://bugs.launchpad.net/ubuntu/+source/langpack-locales/+bug/1101134/+attachment/4216902/+files/fix_lp1101134_lp1242416.patch ** Tags added: patch ** Changed in: langpack-locales (Ubuntu) Importance: Undecided = Low ** Changed in: langpack-locales (Ubuntu) Status: New = In Progress ** Changed in: langpack-locales (Ubuntu) Assignee: (unassigned) = Gunnar Hjalmarsson (gunnarhj) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1101134 Title: Incorrect delimiter on pt_BR To manage notifications about this bug go to: https://bugs.launchpad.net/glibc/+bug/1101134/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374704] Re: oneconf-query crashed with dbus.exceptions.DBusException in call_blocking(): org.freedesktop.DBus.Error.ServiceUnknown: The name :1.129 was not provided by any .service files
*** This bug is a duplicate of bug 1106232 *** https://bugs.launchpad.net/bugs/1106232 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1106232, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Tags removed: need-duplicate-check ** Changed in: oneconf (Ubuntu) Importance: Undecided = Medium ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374704/+attachment/4216905/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374704/+attachment/4216906/+files/ProcStatus.txt ** This bug has been marked a duplicate of private bug 1106232 ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374704 Title: oneconf-query crashed with dbus.exceptions.DBusException in call_blocking(): org.freedesktop.DBus.Error.ServiceUnknown: The name :1.129 was not provided by any .service files To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oneconf/+bug/1374704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1242416] Re: Wrong Turkish currency symbol
The patch attached to bug #1101134 fixes this bug too. ** Changed in: langpack-locales (Ubuntu) Status: Triaged = In Progress ** Changed in: langpack-locales (Ubuntu) Assignee: (unassigned) = Gunnar Hjalmarsson (gunnarhj) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1242416 Title: Wrong Turkish currency symbol To manage notifications about this bug go to: https://bugs.launchpad.net/glibc/+bug/1242416/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373682] Re: linux: 3.16.0-18.25 -proposed tracker
The package has been published and the bug is being set to Fix Released ** Changed in: kernel-development-workflow Status: In Progress = Fix Released ** Description changed: This bug is for tracking the 3.16.0-18.24 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-Prepare-package-start:Thursday, 25. September 2014 01:24 UTC - kernel-phase-changed:Saturday, 27. September 2014 07:29 UTC kernel-Prepare-package-end:Saturday, 27. September 2014 07:29 UTC kernel-Package-testing-start:Saturday, 27. September 2014 07:29 UTC - kernel-phase:PPA Testing ppa-package-testing-start:Saturday, 27. September 2014 07:29 UTC kernel-Promote-to-release-end:Saturday, 27. September 2014 07:30 UTC + kernel-phase:Released + kernel-phase-changed:Saturday, 27. September 2014 09:00 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373682 Title: linux: 3.16.0-18.25 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-development-workflow/+bug/1373682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1372657] Re: linux: 2.6.32-67.134 -proposed tracker
** Changed in: kernel-sru-workflow/verification-testing Status: New = In Progress ** Changed in: kernel-sru-workflow/certification-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/regression-testing Status: New = Confirmed ** Changed in: kernel-sru-workflow/security-signoff Status: New = Confirmed ** Description changed: This bug is for tracking the 2.6.32-67.134 upload package. This bug will contain status and testing results related to that upload. For an explanation of the tasks and the associated workflow see: https://wiki.ubuntu.com/Kernel/kernel-sru-workflow kernel-stable-Prepare-package-start:Monday, 22. September 2014 21:38 UTC - kernel-stable-phase:PPA Testing - kernel-stable-phase-changed:Friday, 26. September 2014 21:59 UTC kernel-stable-Prepare-package-end:Friday, 26. September 2014 21:59 UTC kernel-stable-Promote-to-proposed-start:Friday, 26. September 2014 21:59 UTC ppa-package-testing-start:Friday, 26. September 2014 21:59 UTC kernel-stable-Promote-to-proposed-end:Saturday, 27. September 2014 08:00 UTC + kernel-stable-phase:Verification Testing + kernel-stable-phase-changed:Saturday, 27. September 2014 09:02 UTC + kernel-stable-Verification-testing-start:Saturday, 27. September 2014 09:02 UTC + kernel-stable-Certification-testing-start:Saturday, 27. September 2014 09:02 UTC + kernel-stable-Security-signoff-start:Saturday, 27. September 2014 09:02 UTC + kernel-stable-Regression-testing-start:Saturday, 27. September 2014 09:02 UTC -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372657 Title: linux: 2.6.32-67.134 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1372657/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374705] [NEW] package grub-pc 2.02~beta2-9ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
Public bug reported: Ubuntu 12.4 upgrade to 12.4.x failed with problem with ZFS ProblemType: Package DistroRelease: Ubuntu 14.04 Package: grub-pc 2.02~beta2-9ubuntu1 ProcVersionSignature: Ubuntu 3.2.0-23.36-generic 3.2.14 Uname: Linux 3.2.0-23-generic x86_64 NonfreeKernelModules: zfs zcommon znvpair zavl zunicode ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 Date: Sat Sep 27 09:17:51 2014 DuplicateSignature: package:grub-pc:2.02~beta2-9ubuntu1:subprocess installed post-installation script returned error exit status 1 ErrorMessage: subprocess installed post-installation script returned error exit status 1 ProcCmdLine: BOOT_IMAGE=/ROOT/ubuntu-1/@/boot/vmlinuz-3.2.0-23-generic root=/dev/sda2 ro boot=zfs zfs-bootfs=garageroot/21 quiet splash SourcePackage: grub2 Title: package grub-pc 2.02~beta2-9ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 UpgradeStatus: Upgraded to trusty on 2014-09-27 (0 days ago) ** Affects: grub2 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package dist-upgrade third-party-packages trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374705 Title: package grub-pc 2.02~beta2-9ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1374705/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1372798] Re: unable to upgrade to 14.04 LTS.
Thanks for your help with this. Nothing worked, so I just upgraded the whole thing straight to 14.04. Everything works except for the audio. Have tried everything but nothing works except headphones. Will keep checking to see if someone releases some info that will work for my computer. Thanks again!! erik =) On 23/09/14 18:45, Steve Nadeau wrote: Hi! you have a broken system, please run in a terminal : sudo apt-get update sudo apt-get install -f try to upgrade from here: in a terminal: sudo do-release-upgrade if it doesn't work, you have a lot of kernel installed but not the last one for 12.04.5, it will be a good thing to upgrade your system before to be sure your system is OK. in a terminal: sudo apt-get install linux-lts-trusty try to upgrade from here: in a terminal: sudo do-release-upgrade if it doesn't work, then you may have some PPA installed, that may be a source of problems, maybe you will have to remove them, this may be problematic and complicated cause it will be like a puzzle to get back to a normal and stable state. at this point, it may be a good idea to have a technician with you or you will have to learn a lot of how to purge a lot of packages (don't ever remove network-manager and other basic packages). It may be a lot complicated at this point, may be better to reinstall the system from scratch, but don't forget to make a backup of all your system before. hope it may help you. -- I've seen things you people wouldn't believe, all those moments will be lost, in time, like tears in rain. Time to die. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1372798 Title: unable to upgrade to 14.04 LTS. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1372798/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374705] Re: package grub-pc 2.02~beta2-9ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374705 Title: package grub-pc 2.02~beta2-9ubuntu1 failed to install/upgrade: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1374705/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1088392] Re: no lock screen immediately after resume (delayed)
This issue persists in Ubuntu 14.04 LTS. It seems surprising that only 4 of us have flagged this as affecting them when I believe it to be a known issue. (It was discussed on UK Ubuntu Podcast several months ago.) It was introduced a few releases ago and presents a security risk. Is it reported under another ticket? (I haven't found one.) Why is the screen lock not being applied before sleep rather than after wake? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1088392 Title: no lock screen immediately after resume (delayed) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpi/+bug/1088392/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374707] [NEW] package wget 1.15-1ubuntu1 failed to install/upgrade: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error)
Public bug reported: . ProblemType: Package DistroRelease: Ubuntu 14.04 Package: wget 1.15-1ubuntu1 ProcVersionSignature: Ubuntu 3.11.0-26.45-generic 3.11.10.12 Uname: Linux 3.11.0-26-generic i686 ApportVersion: 2.14.1-0ubuntu3.4 Architecture: i386 Date: Fri Sep 26 16:51:39 2014 DuplicateSignature: package:wget:1.15-1ubuntu1:cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error) ErrorMessage: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error) InstallationDate: Installed on 2012-01-19 (981 days ago) InstallationMedia: Ubuntu 11.10 Oneiric Ocelot - Release i386 (20111012) SourcePackage: wget Title: package wget 1.15-1ubuntu1 failed to install/upgrade: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error) UpgradeStatus: Upgraded to trusty on 2014-09-27 (0 days ago) mtime.conffile..etc.wgetrc: 2011-05-17T22:17:24 ** Affects: wget (Ubuntu) Importance: Undecided Status: New ** Tags: apport-package dist-upgrade i386 trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374707 Title: package wget 1.15-1ubuntu1 failed to install/upgrade: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wget/+bug/1374707/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374707] Re: package wget 1.15-1ubuntu1 failed to install/upgrade: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error)
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374707 Title: package wget 1.15-1ubuntu1 failed to install/upgrade: cannot compute MD5 hash for file '/etc/wgetrc': failed to read (Input/output error) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wget/+bug/1374707/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374682] Re: [FFe] gmusicbrowser 1.1.13 for Utopic
ACK'ing from the Xubuntu documentation team POV. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374682 Title: [FFe] gmusicbrowser 1.1.13 for Utopic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gmusicbrowser/+bug/1374682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374460] Re: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: nvidia-graphics-drivers-331 (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374460 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1374460/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1088392] Re: no lock screen immediately after resume (delayed)
There seems to be a solution (work-around) here: http://askubuntu.com/questions/180594/resume-to-login-screen-after- suspend/270598#270598. This describes how to show the (nicer) ubuntu login screen before suspend / hibernate. Must disable Lock screen when going for suspend/hibernate option in power manager settings. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1088392 Title: no lock screen immediately after resume (delayed) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/acpi/+bug/1088392/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1365977] [NEW] Ubuntu Store front is not translated into Norwegian
You have been subscribed to a public bug: Opening the Ubuntu Store using a Norwegian locale gives me English labels on everything. On the second level (in an app, e.g.), most items are translated. ** Affects: unity-scope-click (Ubuntu) Importance: Undecided Status: New ** Tags: rtm-i18n -- Ubuntu Store front is not translated into Norwegian https://bugs.launchpad.net/bugs/1365977 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374708] Re: cheese crashed with SIGSEGV in clutter_x11_handle_event()
*** This bug is a duplicate of bug 1372209 *** https://bugs.launchpad.net/bugs/1372209 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1372209, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/1374708/+attachment/4216925/+files/CoreDump.gz ** Attachment removed: Disassembly.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216927/+files/Disassembly.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216930/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216931/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216932/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216933/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/1374708/+attachment/4216934/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of private bug 1372209 ** Information type changed from Private to Public ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374708 Title: cheese crashed with SIGSEGV in clutter_x11_handle_event() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cheese/+bug/1374708/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373466] Re: Please update lintian to 2.5.27
** Changed in: lintian (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373466 Title: Please update lintian to 2.5.27 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1373466/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374375] Re: CVE-2014-7186: bash crashed with SIGSEGV in list_reverse()
This is now fixed: http://www.ubuntu.com/usn/usn-2364-1/ ** Changed in: bash (Ubuntu Precise) Status: Confirmed = Fix Released ** Changed in: bash (Ubuntu Trusty) Status: Confirmed = Fix Released ** Changed in: bash (Ubuntu Lucid) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374375 Title: CVE-2014-7186: bash crashed with SIGSEGV in list_reverse() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1374375/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1365977] Re: Ubuntu Store front is not translated into Norwegian
** Project changed: ubuntu-translations = unity-scope-click (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1365977 Title: Ubuntu Store front is not translated into Norwegian To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unity-scope-click/+bug/1365977/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374712] [NEW] package linux-image-3.2.0-69-generic 3.2.0-69.103 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1
Public bug reported: failed to install ProblemType: Package DistroRelease: Ubuntu 12.04 Package: linux-image-3.2.0-69-generic ProcVersionSignature: Ubuntu 3.2.0-69.103-generic-pae 3.2.62 Uname: Linux 3.2.0-69-generic-pae i686 AlsaVersion: Advanced Linux Sound Architecture Driver Version 1.0.24. ApportVersion: 2.0.1-0ubuntu17.7 Architecture: i386 ArecordDevices: List of CAPTURE Hardware Devices card 0: SB [HDA ATI SB], device 0: VT1708S Analog [VT1708S Analog] Subdevices: 2/2 Subdevice #0: subdevice #0 Subdevice #1: subdevice #1 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: paololinux 1839 F pulseaudio CRDA: country GB: (2402 - 2482 @ 40), (N/A, 20) (5170 - 5250 @ 40), (N/A, 20) (5250 - 5330 @ 40), (N/A, 20), DFS (5490 - 5710 @ 40), (N/A, 27), DFS Card0.Amixer.info: Card hw:0 'SB'/'HDA ATI SB at 0xfbaf4000 irq 16' Mixer name : 'VIA VT1708S' Components : 'HDA:11060397,10431523,0010' Controls : 24 Simple ctrls : 14 Date: Sat Sep 27 10:39:28 2014 ErrorMessage: ErrorMessage: subprocess installed post-installation script returned error exit status 1 InstallationMedia: Ubuntu 10.04.2 LTS Lucid Lynx - Release i386 (20110211.1) MachineType: ASUSTeK Computer INC. K50AB MarkForUpload: True ProcFB: 0 radeondrmfb 1 radeondrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.2.0-69-generic-pae root=UUID=027EA8AF7EA89CC3 loop=/ubuntu/disks/root.disk ro quiet splash vt.handoff=7 PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 1.99-21ubuntu3.17 RfKill: 0: phy0: Wireless LAN Soft blocked: no Hard blocked: no SourcePackage: linux Title: package linux-image-3.2.0-69-generic 3.2.0-69.103 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1 UpgradeStatus: Upgraded to precise on 2014-09-27 (0 days ago) dmi.bios.date: 12/07/2009 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 222 dmi.board.asset.tag: To Be Filled By O.E.M. dmi.board.name: K50AB dmi.board.vendor: ASUSTeK Computer INC. dmi.board.version: 1.00 dmi.chassis.asset.tag: 0x dmi.chassis.type: 10 dmi.chassis.vendor: ASUSTek Computer INC. dmi.chassis.version: 1.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr222:bd12/07/2009:svnASUSTeKComputerINC.:pnK50AB:pvr1.0:rvnASUSTeKComputerINC.:rnK50AB:rvr1.00:cvnASUSTekComputerINC.:ct10:cvr1.0: dmi.product.name: K50AB dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK Computer INC. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: apport-package i386 precise -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374712 Title: package linux-image-3.2.0-69-generic 3.2.0-69.103 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374712/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374713] Re: update-software-center crashed with AttributeError in __getattr__(): When using gi.repository you must not import static modules like gobject. Please change all occurrences of imp
*** This bug is a duplicate of bug 1367017 *** https://bugs.launchpad.net/bugs/1367017 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1367017, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Tags removed: need-duplicate-check ** Changed in: software-center (Ubuntu) Importance: Undecided = Medium ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374713/+attachment/4216966/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374713/+attachment/4216967/+files/ProcStatus.txt ** This bug has been marked a duplicate of private bug 1367017 ** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374713 Title: update-software-center crashed with AttributeError in __getattr__(): When using gi.repository you must not import static modules like gobject. Please change all occurrences of import gobject to from gi.repository import GObject. See: https://bugzilla.gnome.org/show_bug.cgi?id=709183 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/software-center/+bug/1374713/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1351905] Re: Untranslated strings in Evince
** Changed in: ubuntu-translations Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1351905 Title: Untranslated strings in Evince To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-translations/+bug/1351905/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350506] Re: No phone numbers message needs to be marked for translation
** Changed in: ubuntu-translations Status: Triaged = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350506 Title: No phone numbers message needs to be marked for translation To manage notifications about this bug go to: https://bugs.launchpad.net/address-book-app/+bug/1350506/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1169763] Re: When restart button pressed, the restart offers shutdown and restart
I think that system should just restart when user press the restart button form update-manager. No need to wait fr X seconds... The actual behavior can make user think that Ubuntu is acting like win$ : - user : i click restart, cause i wan t my system t restart - computer : ok, do you wan to restart or shutdown ? - user : hum...maybe i'd like to restart, but i'm not sure now, wait... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1169763 Title: When restart button pressed, the restart offers shutdown and restart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/1169763/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374714] [NEW] After my Ubuntu is started my USB mouse sometime doesn't work
Public bug reported: Hi After my Ubuntu is started (already on the logging screen) my USB mouse sometime doesn't work at all and sometime it does work just as normal. In the case it doesn't work: - plug-out and plug-in the USB mouse doesn't help. I see that the lights from the mouse is short time turned on but after that the lights switches off. I seems for me as if the USB channel is not reacting correcly... - also other USB devices doesn't work In the case it does work: - complet normal functionality, never expirienced that when it work it stop to working during ubuntu is running. - other USB devices working as expected. My USB mouse is a ASUS Product M/N MOBKUL ASUS P/N 0K100-00020 PEGA P/N 0411-000J0AS S/N AUT1332001745 Branded with EPUBLIC OF GAMERS (R.O.G.) I don't believe that the mechanism of the mouse is from interesting for this bug report. I have Ubuntu 14.04.1 LTS Best Regards Werner btw I have created this bug report with the xdiagnose - Report an Xorg Bug and at the end the following error message GLib-CRITICAL **: g_slice_set_config: assertion 'sys_page_size == 0' failed is in the terminal window where I have start it. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: xorg 1:7.7+1ubuntu8 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 NonfreeKernelModules: nvidia .proc.driver.nvidia.gpus.0: Error: [Errno 21] Is a directory: '/proc/driver/nvidia/gpus/0' .proc.driver.nvidia.registry: Binary: .proc.driver.nvidia.version: NVRM version: NVIDIA UNIX x86_64 Kernel Module 331.38 Wed Jan 8 19:32:30 PST 2014 GCC version: gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) .proc.driver.nvidia.warnings.fbdev: Your system is not currently configured to drive a VGA console on the primary VGA device. The NVIDIA Linux graphics driver requires the use of a text-mode VGA console. Use of other console drivers including, but not limited to, vesafb, may result in corruption and stability problems, and is not supported. .tmp.unity.support.test.0: ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 CompizPlugins: [core,composite,opengl,compiztoolbox,decor,vpswitch,snap,mousepoll,resize,place,move,wall,grid,regex,imgpng,session,gnomecompat,animation,fade,staticswitcher,workarounds,scale,expo,ezoom,dbus] CompositorRunning: compiz CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0' CompositorUnredirectFSW: true Date: Sat Sep 27 11:30:34 2014 DistUpgraded: 2014-05-22 21:29:07,402 DEBUG enabling apt cron job DistroCodename: trusty DistroVariant: ubuntu ExtraDebuggingInterest: Yes GraphicsCard: NVIDIA Corporation GK106M [GeForce GTX 770M] [10de:11e0] (rev a1) (prog-if 00 [VGA controller]) Subsystem: ASUSTeK Computer Inc. Device [1043:213e] InstallationDate: Installed on 2014-01-12 (257 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: ASUSTeK COMPUTER INC. G750JX ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-36-generic root=UUID=38e51521-23e2-4a85-8aad-b63484675685 ro quiet splash vt.handoff=7 SourcePackage: xorg UpgradeStatus: Upgraded to trusty on 2014-05-22 (127 days ago) dmi.bios.date: 08/19/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: G750JX.208 dmi.board.asset.tag: ATN12345678901234567 dmi.board.name: G750JX dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: ASUSTeK COMPUTER INC. dmi.chassis.version: 1.0 dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvrG750JX.208:bd08/19/2013:svnASUSTeKCOMPUTERINC.:pnG750JX:pvr1.0:rvnASUSTeKCOMPUTERINC.:rnG750JX:rvr1.0:cvnASUSTeKCOMPUTERINC.:ct10:cvr1.0: dmi.product.name: G750JX dmi.product.version: 1.0 dmi.sys.vendor: ASUSTeK COMPUTER INC. version.compiz: compiz 1:0.9.11.2+14.04.20140714-0ubuntu1 version.ia32-libs: ia32-libs N/A version.libdrm2: libdrm2 2.4.52-1 version.libgl1-mesa-dri: libgl1-mesa-dri 10.1.3-0ubuntu0.1 version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A version.libgl1-mesa-glx: libgl1-mesa-glx 10.1.3-0ubuntu0.1 version.nvidia-graphics-drivers: nvidia-graphics-drivers N/A version.xserver-xorg-core: xserver-xorg-core 2:1.15.1-0ubuntu2.1 version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.8.2-1ubuntu2 version.xserver-xorg-video-ati: xserver-xorg-video-ati N/A version.xserver-xorg-video-intel: xserver-xorg-video-intel N/A version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau N/A xserver.bootTime: Sat Sep 27 09:17:30 2014 xserver.configfile: default xserver.errors: Failed to load module nouveau (module does not exist, 0) Failed to load module nouveau (module does not exist, 0) xserver.logfile: /var/log/Xorg.0.log xserver.outputs: xserver.version: 2:1.15.1-0ubuntu2.1 ** Affects: xorg (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug compiz-0.9 trusty ubuntu ** Attachment added: output of dmesg
[Bug 1029289] Re: Need to authorize my google account each time I boot the computer
This isn't fixed for me on utopic, can anyone else confirm? What does fix this for me is the patch I wrote for evolution-data-server over at LP: #1373908 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1029289 Title: Need to authorize my google account each time I boot the computer To manage notifications about this bug go to: https://bugs.launchpad.net/account-plugins/+bug/1029289/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374715] [NEW] CVE links in the updater are invalid
Public bug reported: The auto-updater was asking for permission to update Bash. The Changes message was as follows: Changes for bash versions: Installed version: 4.3-7ubuntu1.3 Available version: 4.3-7ubuntu1.4 Version 4.3-7ubuntu1.4: * SECURITY UPDATE: out-of-bounds memory access - debian/patches/CVE-2014-718x.diff: guard against overflow and fix off-by-one in parse.y and y.tab.c. - CVE-2014-7186 - CVE-2014-7187 * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports - debian/patches/variables-affix.diff: add prefixes and suffixes in variables.c. Each CVE link went to an URL such as http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-7186. This is an error page which states that the CVE_ID is invalid. I would have expected to see a bug description of some sort. Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. I assume this is for the reason suggested, that the problem has not been uploaded, and that this is now the correct URL. Does the code that generates the links need to include CVE- in the URLs? I assume that this will apply to all updates, not just Bash, but I can't yet verify this. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: update-manager 1:0.196.12 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Aptdaemon: Architecture: amd64 CurrentDesktop: Unity Date: Sat Sep 27 10:40:34 2014 ExecutablePath: /usr/bin/update-manager GsettingsChanges: b'com.ubuntu.update-manager' b'show-details' b'true' b'com.ubuntu.update-manager' b'window-height' b'1000' b'com.ubuntu.update-manager' b'first-run' b'false' b'com.ubuntu.update-manager' b'window-width' b'1215' b'com.ubuntu.update-manager' b'launch-time' b'1411810242' InstallationDate: Installed on 2014-07-31 (57 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) InterpreterPath: /usr/bin/python3.4 PackageArchitecture: all SourcePackage: update-manager UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: update-manager (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty ** Description changed: The auto-updater was asking for permission to update Bash. The Changes message was as follows: Changes for bash versions: Installed version: 4.3-7ubuntu1.3 Available version: 4.3-7ubuntu1.4 Version 4.3-7ubuntu1.4: - * SECURITY UPDATE: out-of-bounds memory access - - debian/patches/CVE-2014-718x.diff: guard against overflow and fix - off-by-one in parse.y and y.tab.c. - - CVE-2014-7186 - - CVE-2014-7187 - * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports - - debian/patches/variables-affix.diff: add prefixes and suffixes in - variables.c. + * SECURITY UPDATE: out-of-bounds memory access + - debian/patches/CVE-2014-718x.diff: guard against overflow and fix + off-by-one in parse.y and y.tab.c. + - CVE-2014-7186 + - CVE-2014-7187 + * SECURITY IMPROVEMENT: use prefixes and suffixes for function exports + - debian/patches/variables-affix.diff: add prefixes and suffixes in + variables.c. Each CVE link went to an URL such as http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-7186. This is an error page which states that the CVE_ID is invalid. I would have expected to see a bug description of some sort. - Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. (I assume this is for the reason suggested, that the problem has not been uploaded). + Manually changing the URL to http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186 changed the error message, which now claims the ID is valid but unrecognised. I assume this is for the reason suggested, that the problem has not been uploaded, and that this is now the correct URL. + Does the code that generates the links need to include CVE- in the URLs? I assume that this will apply to all updates, not just Bash, but I can't yet verify this. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: update-manager 1:0.196.12 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Aptdaemon: - + Architecture: amd64 CurrentDesktop: Unity Date: Sat Sep 27 10:40:34 2014 ExecutablePath: /usr/bin/update-manager GsettingsChanges: - b'com.ubuntu.update-manager' b'show-details' b'true' - b'com.ubuntu.update-manager' b'window-height' b'1000' - b'com.ubuntu.update-manager' b'first-run' b'false' - b'com.ubuntu.update-manager' b'window-width' b'1215' - b'com.ubuntu.update-manager' b'launch-time' b'1411810242' + b'com.ubuntu.update-manager'
[Bug 1374714] Re: After my Ubuntu is started my USB mouse sometime doesn't work
** Attachment added: the Xorg.0.log https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1374714/+attachment/4217000/+files/Xorg.0.log ** Description changed: - Hi After my Ubuntu is started (already on the logging screen) my USB mouse - sometime doesn't work at alla and sometime it does work just as normal. + sometime doesn't work at all and sometime it does work just as normal. - In the case it doesn't work: + In the case it doesn't work: - plug-out and plug-in the USB mouse doesn't help. I see that the lights from the mouse is short time turned on but after that the lights switches off. I seems for me as if the USB channel is not reacting correcly... - also other USB devices doesn't work - In the case it does work: + In the case it does work: - complet normal functionality, never expirienced that when it work it stop to working during ubuntu is running. - other USB devices working as expected. My USB mouse is a ASUS Product M/N MOBKUL ASUS P/N 0K100-00020 PEGA P/N 0411-000J0AS S/N AUT1332001745 Branded with EPUBLIC OF GAMERS (R.O.G.) I don't believe that the mechanism of the mouse is from interesting for this bug report. I have Ubuntu 14.04.1 LTS Best Regards Werner - - btw I have created this bug report with the xdiagnose - Report an Xorg Bug and at the end the following error message GLib-CRITICAL **: g_slice_set_config: assertion 'sys_page_size == 0' failed is in the terminal window where I have start it. + btw I have created this bug report with the xdiagnose - Report an Xorg + Bug and at the end the following error message GLib-CRITICAL **: + g_slice_set_config: assertion 'sys_page_size == 0' failed is in the + terminal window where I have start it. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: xorg 1:7.7+1ubuntu8 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 NonfreeKernelModules: nvidia .proc.driver.nvidia.gpus.0: Error: [Errno 21] Is a directory: '/proc/driver/nvidia/gpus/0' .proc.driver.nvidia.registry: Binary: .proc.driver.nvidia.version: - NVRM version: NVIDIA UNIX x86_64 Kernel Module 331.38 Wed Jan 8 19:32:30 PST 2014 - GCC version: gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) + NVRM version: NVIDIA UNIX x86_64 Kernel Module 331.38 Wed Jan 8 19:32:30 PST 2014 + GCC version: gcc version 4.8.2 (Ubuntu 4.8.2-19ubuntu1) .proc.driver.nvidia.warnings.fbdev: - Your system is not currently configured to drive a VGA console - on the primary VGA device. The NVIDIA Linux graphics driver - requires the use of a text-mode VGA console. Use of other console - drivers including, but not limited to, vesafb, may result in - corruption and stability problems, and is not supported. + Your system is not currently configured to drive a VGA console + on the primary VGA device. The NVIDIA Linux graphics driver + requires the use of a text-mode VGA console. Use of other console + drivers including, but not limited to, vesafb, may result in + corruption and stability problems, and is not supported. .tmp.unity.support.test.0: - + ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 CompizPlugins: [core,composite,opengl,compiztoolbox,decor,vpswitch,snap,mousepoll,resize,place,move,wall,grid,regex,imgpng,session,gnomecompat,animation,fade,staticswitcher,workarounds,scale,expo,ezoom,dbus] CompositorRunning: compiz CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0' CompositorUnredirectFSW: true Date: Sat Sep 27 11:30:34 2014 DistUpgraded: 2014-05-22 21:29:07,402 DEBUG enabling apt cron job DistroCodename: trusty DistroVariant: ubuntu ExtraDebuggingInterest: Yes GraphicsCard: - NVIDIA Corporation GK106M [GeForce GTX 770M] [10de:11e0] (rev a1) (prog-if 00 [VGA controller]) -Subsystem: ASUSTeK Computer Inc. Device [1043:213e] + NVIDIA Corporation GK106M [GeForce GTX 770M] [10de:11e0] (rev a1) (prog-if 00 [VGA controller]) + Subsystem: ASUSTeK Computer Inc. Device [1043:213e] InstallationDate: Installed on 2014-01-12 (257 days ago) InstallationMedia: Ubuntu 13.04 Raring Ringtail - Release amd64 (20130424) MachineType: ASUSTeK COMPUTER INC. G750JX ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.13.0-36-generic root=UUID=38e51521-23e2-4a85-8aad-b63484675685 ro quiet splash vt.handoff=7 SourcePackage: xorg UpgradeStatus: Upgraded to trusty on 2014-05-22 (127 days ago) dmi.bios.date: 08/19/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: G750JX.208 dmi.board.asset.tag: ATN12345678901234567 dmi.board.name: G750JX dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: 1.0 dmi.chassis.asset.tag: No Asset Tag dmi.chassis.type: 10 dmi.chassis.vendor: ASUSTeK COMPUTER INC. dmi.chassis.version: 1.0 dmi.modalias:
[Bug 1374712] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374712 Title: package linux-image-3.2.0-69-generic 3.2.0-69.103 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374712/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374712] BOT: Examined VarLogDistupgradeApttermlog.gz
User postinst hook script [/usr/sbin/update-grub] exited with value 1 dpkg: error processing linux-image-3.2.0-69-generic (--configure): subprocess installed post-installation script returned error exit status 1 ** Tags added: varlogdistupgradeapttermlog-examined -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374712 Title: package linux-image-3.2.0-69-generic 3.2.0-69.103 failed to install/upgrade: ErrorMessage: subprocess installed post-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374712/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1287594] Re: Import fail with error message about photo library not being writeable
Hmm maybe solved?.. I had the same problem, so I started shotwell via console and I got some output there: snip L 20406 2014-09-27 11:55:05 [WRN] Debug.vala:95: Unable to open or create log file /home/dn/.cache/shotwell/shotwell.log L 20406 2014-09-27 11:55:05 [MSG] main.vala:385: Shotwell Photo Manager 0.18.0 L 20406 2014-09-27 11:55:05 [MSG] main.vala:43: Verifying database ... L 20406 2014-09-27 11:55:18 [MSG] LibraryFiles.vala:86: There was a problem copying /mnt/data/data/images/Pictures/Pictures/1948/03/07/2014-03-08 20.04.56.mp4: Error setting owner: Operation not permitted (shotwell-video-thumbnailer:20436): GStreamer-CRITICAL **: gst_structure_new_empty: assertion 'gst_structure_validate_name (name)' failed (shotwell:20406): GStreamer-CRITICAL **: gst_structure_new_empty: assertion 'gst_structure_validate_name (name)' failed L 20406 2014-09-27 11:55:18 [WRN] BatchImport.vala:1118: Failed to import [1] /home/dn/Pictures/2014/03/08/2014-03-08 20.04.56_1.mp4: unable to write thumbnails (File write error) /snip After fiddling around (also deleting ~/.local/share/shotwell/data) and `chown -R [user]:[group] ~/.local` it was still the same.. But then I observed that my user didn't have the permission to write in ~/.cache/shotwell (see output), very strange. So i deleted ~/.cache/shotwell, restarted Shotwell, did an import again and then it worked successfully. So - Make sure your user *can* write import destination (~/Pictures by default), chown that - Make sure your user *can* write ~/.local/share/shotwell/data AND ~/.cache/shotwell, chown'ing or possibly delete so it gets re-created.. Also LTS 14.04 on AMD64 with Shotwell 0.18.0.. Does that help others maybe? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1287594 Title: Import fail with error message about photo library not being writeable To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/shotwell/+bug/1287594/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374716] [NEW] Feature request: Allow restricting apt-cache search to search installed packages only
Public bug reported: Currently, apt-cache has option --installed, but it works only with depends and rdepends, not with search. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: apt 1.0.1ubuntu2.4.1 ProcVersionSignature: Ubuntu 3.13.0-36.63-lowlatency 3.13.11.6 Uname: Linux 3.13.0-36-lowlatency x86_64 ApportVersion: 2.14.1-0ubuntu3.4 Architecture: amd64 CurrentDesktop: XFCE Date: Sat Sep 27 12:43:14 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-09-21 (6 days ago) InstallationMedia: Ubuntu-Studio 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.1) SourcePackage: apt UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374716 Title: Feature request: Allow restricting apt-cache search to search installed packages only To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1374716/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 204536] Re: sound volume always resets to 100% after reboot
Facing the same problem. I'm using an USB sound card from Siberia. mukit@lifebook:~$ cat /proc/asound/cards 0 [PCH]: HDA-Intel - HDA Intel PCH HDA Intel PCH at 0xf160 irq 45 1 [Device ]: USB-Audio - USB PnP Sound Device C-Media Electronics Inc. USB PnP Sound Device at usb-:00:1d.0-1.1, full spe mukit@lifebook:~$ uname -a Linux lifebook 3.13.0-36-generic #63-Ubuntu SMP Wed Sep 3 21:30:07 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/204536 Title: sound volume always resets to 100% after reboot To manage notifications about this bug go to: https://bugs.launchpad.net/hundredpapercuts/+bug/204536/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370987] Re: didn't check hostname and expired time in ssl verfication
** Description changed: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that mailfilter didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. + We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the verfication follows a certain process. + The result format is like this: + notice: Line Number@Method Name, Source File + + We provide this result for developers to locate the problem faster. + + This is the result for mailfilter: + [PDG]Socket::c_open(const char *, int, int, int) + [Found]SSL_connect() + [HASH] 4222839072 [LineNo]@ 178[Kind]call-site[Char] SSL_connect ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc + [INFO] API SSL_new() Found! -- [HASH] 382462720 [LineNo]@ 161[Kind]call-site[Char] SSL_new ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc + [INFO] API SSL_CTX_new() Found! -- [HASH] 3612132685 [LineNo]@ 124[Kind]call-site[Char] SSL_CTX_new ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc + [INFO] API SSLv23_client_method() Found! -- [HASH] 1228347384 [LineNo]@ 123[Kind]call-site[Char] SSLv23_client_method ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc + [Warning] No SSL_get_peer_certificate() SSL_get_verify_result() APIs found! Potentially vulnerable!!! + To verify the result: + {\verfication process 1.choose a pop3s mail server. (write the configuration in ~/.mailfilterrc) 2.Find the ip of the mail server, and add the line in /etc/hosts IP HostnameOfTheMailServer 3.run mailfilter to fetch the mail in the mailserver through pop3s. The fetch succeeded, indicating mailfilter didn't check the hostname against the signee of the certificate. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run mailfilter to fetch the mail in the mailserver through pop3s. + } The fetch succeeded again and no warning was given, indicating mailfilter didn't check whether the certificate expired or not. - I am running mailfilter 0.8.2 in ubuntu 14.04 LTS. + I am running mailfilter 0.8.3-1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Description changed: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that mailfilter didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. - We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the verfication follows a certain process. + We found the vulnerability by static analysis, typically, a process of + verfication involves calling a chain of API, and we can deduce whether + the communication process is vulnerable by detecting whether the + verfication follows a certain process. + The result format is like this: notice: Line Number@Method Name, Source File - - We provide this result for developers to locate the problem faster. + We provide this result to help developers to locate the problem faster. This is the result for mailfilter: [PDG]Socket::c_open(const char *, int, int, int) - [Found]SSL_connect() - [HASH] 4222839072 [LineNo]@ 178[Kind]call-site[Char] SSL_connect ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc - [INFO] API SSL_new() Found! -- [HASH] 382462720 [LineNo]@ 161[Kind]call-site[Char] SSL_new ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc - [INFO] API SSL_CTX_new() Found! -- [HASH] 3612132685 [LineNo]@ 124[Kind]call-site[Char] SSL_CTX_new ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc - [INFO] API SSLv23_client_method() Found! -- [HASH] 1228347384 [LineNo]@ 123[Kind]call-site[Char] SSLv23_client_method ()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/mailfilter/mailfilter-0.8.2/src/socket.cc - [Warning] No SSL_get_peer_certificate() SSL_get_verify_result() APIs
[Bug 1341944] Re: 32-Bit UEFI bootloader support needed
Even I can confirm the above mentioned bug.. I have recently purchased a NotionInk CAIN Tablet It has the latest Intel Atom Z3735D Quad Core(Bay Trail) Processor The tablet(Hybrid) comes pre-installed with 32-bit Windows 8.1 I have tried booting the 64 bit Ubuntu but it doesnt boot because of the above mentioned bug. The manual compiling of the 32 bit grub2 bootloader is the only option left as of now which i'll explore in the coming days. But it'll be better if the 32bit distributions can come with a preinsatalled with 32bit UEFI bootloader as day by day more number of tablets with such requirement are getting released and we would love to see our favourite Linux distribution running on these tablets.. Thank You.. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1341944 Title: 32-Bit UEFI bootloader support needed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1341944/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374721] [NEW] ibus-daemon uses 100% CPU when using gnome-calculator
Public bug reported: Steps to reproduce: 1. Open gnome-calculator 2. Enter 3*7 3. Notice that ibus-daemon and ibus-x11 are using 100+% CPU ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: ibus 1.5.8-2ubuntu1 ProcVersionSignature: Ubuntu 3.16.0-18.25-generic 3.16.3 Uname: Linux 3.16.0-18-generic x86_64 ApportVersion: 2.14.7-0ubuntu2 Architecture: amd64 CurrentDesktop: Unity Date: Sat Sep 27 20:32:05 2014 InstallationDate: Installed on 2014-09-03 (24 days ago) InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Alpha amd64 (20140902) SourcePackage: ibus UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: ibus (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374721 Title: ibus-daemon uses 100% CPU when using gnome-calculator To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ibus/+bug/1374721/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1361972] Re: Utopic Installation completed window nearly spans the width of the screen
Still effects Ubuntu GNOME Utopic 20140926 i386. ** Attachment added: wide_dialog_window.png https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1361972/+attachment/4217020/+files/wide_dialog_window.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1361972 Title: Utopic Installation completed window nearly spans the width of the screen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1361972/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374723] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that nagircbot didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for nagircbot: [PDG]ssl_handshake [Found]SSL_connect() [HASH] 3864143967 [LineNo]@ 17[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/nagircbot/nagircbot-0.0.33/ssl.c [Warning] SSL_new() not found! To verify the result: 1.choose a irc website 2.Find the ip of the website, and add the line in /etc/hosts IP FakeHostnameOfTheMailServer suppose it's fake.irc 3.nagircbot -c \#nagircbot -s fake.irc:6697 The connection is established, indicating nagircbot didn't check the hostname of the server against the certificate. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. nagircbot -c \#nagircbot -s irchostname:6697 The connection is established again and no warning was given, indicating nagircbot didn't check whether the certificate expired or not. I am running nagircbot 0.0.33-2 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: nagircbot (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374723 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nagircbot/+bug/1374723/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374724] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that pavuk didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for pavuk: [PDG]my_ssl_do_connect [Found]SSL_connect() [HASH] 884435222 [LineNo]@ 665[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/pavuk/pavuk-0.9.35/src/myssl_openssl.c [INFO] API SSL_new() Found! -- [HASH] 3400266686 [LineNo]@ 654[Kind]call-site[Char] SSL_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/pavuk/pavuk-0.9.35/src/myssl_openssl.c [INFO] API SSL_CTX_new() Found! -- [HASH] 2718779866 [LineNo]@ 564[Kind]call-site[Char] SSL_CTX_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/pavuk/pavuk-0.9.35/src/myssl_openssl.c [INFO] API SSLv23_client_method() Found! -- [HASH] 2509471869 [LineNo]@ 560[Kind]call-site[Char] SSLv23_client_method()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/pavuk/pavuk-0.9.35/src/myssl_openssl.c [INFO] API SSL_CTX_set_verify() Found! -- [HASH] 241425030 [LineNo]@ 593[Kind]call-site[Char] SSL_CTX_set_verify()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/pavuk/pavuk-0.9.35/src/myssl_openssl.c [Warning] No SSL_get_peer_certificate() SSL_get_verify_result() APIs found! Potentially vulnerable!!! To verify the result: 1. put line 192.30.252.130 fake.github.com in /etc/hosts(192.30.252.130 is the ip address for github) 2. run pavuk https://fake.github.com; The fetch succeeded, indicating mailfilter didn't check the hostname against the signee of the certificate. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run pavuk https://www.github.com The fetch succeeded again and no warning was given, indicating pavuk didn't check whether the certificate expired or not. I am running pavuk 0.9.35 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: pavuk (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374724 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pavuk/+bug/1374724/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1361962] Re: If started from the advanced boot menu Ubuntu GNOME Utopic live session boots to TTY prompt
This has not effected the 20140922, 20140923, or 20140926 builds of Ubuntu GNOME Utopic so I'm marking it invalid. If it crops up again in the future I'll change the status accordingly. ** Changed in: casper (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1361962 Title: If started from the advanced boot menu Ubuntu GNOME Utopic live session boots to TTY prompt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/casper/+bug/1361962/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374725] [NEW] package grub-pc 2.00-19ubuntu2.1 failed to install/upgrade
Public bug reported: package grub-pc 2.00-19ubuntu2.1 failed to install/upgrad ProblemType: Package DistroRelease: Ubuntu 13.10 Package: grub-pc 2.00-19ubuntu2.1 ProcVersionSignature: Ubuntu 3.5.0-26.42-generic 3.5.7.6 Uname: Linux 3.5.0-26-generic i686 NonfreeKernelModules: wl ApportVersion: 2.12.5-0ubuntu2.2 Architecture: i386 Date: Sat Sep 27 11:34:26 2014 DuplicateSignature: package:grub-pc:2.00-19ubuntu2.1: ErrorMessage: InstallationDate: Installed on 2013-02-23 (581 days ago) InstallationMedia: Ubuntu 12.10 Quantal Quetzal - Release i386 (20121017.2) InvalidGrubScript: /etc/default/grub MarkForUpload: True ProcCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.5.0-26-generic root=UUID=7c31b789-1577-4cb0-a5f2-5dacced62ca1 ro quiet splash vt.handoff=7 SourcePackage: grub2 Title: package grub-pc 2.00-19ubuntu2.1 failed to install/upgrade UpgradeStatus: Upgraded to saucy on 2014-09-27 (0 days ago) ** Affects: grub2 (Ubuntu) Importance: Undecided Status: New ** Tags: apport-package i386 saucy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374725 Title: package grub-pc 2.00-19ubuntu2.1 failed to install/upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1374725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374725] Re: package grub-pc 2.00-19ubuntu2.1 failed to install/upgrade
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374725 Title: package grub-pc 2.00-19ubuntu2.1 failed to install/upgrade To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1374725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374726] Re: Xorg crashed with SIGABRT in OsAbort()
*** This bug is a duplicate of bug 1338492 *** https://bugs.launchpad.net/bugs/1338492 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1338492, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/1374726/+attachment/4217035/+files/CoreDump.gz ** Attachment removed: Disassembly.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217038/+files/Disassembly.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217052/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217054/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217055/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217056/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/1374726/+attachment/4217057/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of bug 1338492 Xorg crashed with SIGABRT in OsAbort() ** Information type changed from Private to Public ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374726 Title: Xorg crashed with SIGABRT in OsAbort() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/1374726/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374729] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that imapproxy didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for imapproxy: [PDG]Get_Server_conn [Found]SSL_connect() [HASH] 1168817039 [LineNo]@ 680[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/imapproxy/up-imapproxy-1.2.7/src/imapcommon.c [INFO] API SSL_new() Found! -- [HASH] 1396359115 [LineNo]@ 663[Kind]call-site[Char] SSL_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/imapproxy/up-imapproxy-1.2.7/src/imapcommon.c [Warning] SSL_CTX_new() not found! We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: up-imapproxy (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374729 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/up-imapproxy/+bug/1374729/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374730] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that keepalived didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for keepalived: PDG]ssl_connect'1 [Found]SSL_connect() [HASH] 1598777261 [LineNo]@ 211[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/keepalived/keepalived-1.2.2/keepalived/check/check_ssl.c [Warning] SSL_new() not found! [PDG]ssl_connect [Found]SSL_connect() [HASH] 2061808858 [LineNo]@ 107[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/keepalived/keepalived-1.2.2/genhash/ssl.c [Warning] SSL_new() not found! We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: keepalived (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374730 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keepalived/+bug/1374730/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374731] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that prayer-accountd didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for prayer-accountd: [PDG]ssl_start_client [Found]SSL_connect() [HASH] 282435988 [LineNo]@ 660[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/prayer-accountd/prayer-1.3.4-dfsg1/lib/ssl.c [INFO] API SSL_new() Found! -- [HASH] 1396692037 [LineNo]@ 651[Kind]call-site[Char] SSL_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/prayer-accountd/prayer-1.3.4-dfsg1/lib/ssl.c [INFO] API SSL_CTX_new() Found! -- [HASH] 3247568991 [LineNo]@ 410[Kind]call-site[Char] SSL_CTX_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/prayer-accountd/prayer-1.3.4-dfsg1/lib/ssl.c [Warning] No secure SSL_Method API found! Potentially vulnerable!!! We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: prayer (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374731 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/prayer/+bug/1374731/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374733] [NEW] System Settings disappearing along with sudo apt-get remove pulseaudio
Public bug reported: Removing pulseaudio wipes out most entries from System Settings (as well as its sidebar icon) on Ubuntu 14.04 LTS. The following lets me suspect pulseaudio's dependencies are too broad, giving rise to an overzealous removal: grep remove /var/log/dpkg.log2014-09-27 12:18:58 startup packages remove 2014-09-27 12:18:58 remove xul-ext-webaccounts:amd64 0.5-0ubuntu2 none 2014-09-27 12:18:59 remove webaccounts-extension-common:amd64 0.5-0ubuntu2 none 2014-09-27 12:19:00 remove unity-control-center-signon:amd64 0.1.7~+14.04.20140211.2-0ubuntu4 none 2014-09-27 12:19:01 remove ubuntu-desktop:amd64 1.325 none 2014-09-27 12:19:02 remove libcanberra-pulse:amd64 0.30-0ubuntu3 none 2014-09-27 12:19:02 remove pulseaudio-module-x11:amd64 1:4.0-0ubuntu11 none 2014-09-27 12:19:03 remove pulseaudio-module-bluetooth:amd64 1:4.0-0ubuntu11 none 2014-09-27 12:19:05 remove unity-control-center:amd64 14.04.3+14.04.20140604-0ubuntu1 none 2014-09-27 12:19:06 remove indicator-sound:amd64 12.10.2+14.04.20140401-0ubuntu1 none 2014-09-27 12:19:06 remove pulseaudio:amd64 1:4.0-0ubuntu11 none Users most likely will neither be aware of that log nor able to reinstall the required packages (and icons) for recovery. ** Affects: pulseaudio (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374733 Title: System Settings disappearing along with sudo apt-get remove pulseaudio To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1374733/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374732] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that p3scan didn't check whether the hostname matches the name in the ssl certificate and the expired date of the certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for p3scan: PDG]SSL_create_conn [Found]SSL_connect() [HASH] 368837387 [LineNo]@ 295[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/p3scan/p3scan-2.3.2/getline_ssl.c [Warning] SSL_new() not found! We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: p3scan (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374732 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/p3scan/+bug/1374732/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374734] [NEW] X509 certificate verification problem
Public bug reported: Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. We believe that picolisp didn't check whether the hostname matches the name in the ssl certificate. We found the vulnerability by static analysis, typically, a process of verfication involves calling a chain of API, and we can deduce whether the communication process is vulnerable by detecting whether the process satisfies a certain relation. The result format is like this: notice: Line Number@Method Name, Source File We provide this result to help developers to locate the problem faster. This is the result for picolisp: [PDG]sslConnect [Found]SSL_connect() [HASH] 891159133 [LineNo]@ 60[Kind]call-site[Char] SSL_connect()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/picolisp/picolisp-3.0.8.10/src/ssl.c [INFO] API SSL_new() Found! -- [HASH] 3854924628 [LineNo]@ 142[Kind]call-site[Char] SSL_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/picolisp/picolisp-3.0.8.10/src/ssl.c [INFO] API SSL_CTX_new() Found! -- [HASH] 4074646250 [LineNo]@ 138[Kind]call-site[Char] SSL_CTX_new()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/picolisp/picolisp-3.0.8.10/src/ssl.c [INFO] API SSLv23_client_method() Found! -- [HASH] 771566435 [LineNo]@ 138[Kind]call-site[Char] SSLv23_client_method()[Src] /home/roca/workspace/codebase/code/ubuntu_pkg/picolisp/picolisp-3.0.8.10/src/ssl.c [Warning] No SSL_get_peer_certificate() SSL_get_verify_result() APIs found! Potentially vulnerable!!! This means that although picolisp used the correct APIs to connect but it doesn't check the returned result, which may potentially be a failure. We don't have a POC because we didn't succeed in configuring this software or don't know the way to verify the vulnerability. But through the analysis of the source code, we believe it breaks the ssl certificate verfication protocol. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: picolisp (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374734 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/picolisp/+bug/1374734/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1330239] Re: Activated service 'org.freedesktop.ModemManager1' failed: Cannot launch daemon, file not found or permissions invalid showed in syslog in Ubuntu 14.04
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: modemmanager (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1330239 Title: Activated service 'org.freedesktop.ModemManager1' failed: Cannot launch daemon, file not found or permissions invalid showed in syslog in Ubuntu 14.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/modemmanager/+bug/1330239/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374650] Re: cannot make dbus connections inside a shell started via adb shell
seemingly a bug in adbd, it does not process the shell invoked by adb shell as login shell (and thus does not parse /etc/profile) ** Also affects: android-tools (Ubuntu) Importance: Undecided Status: New ** Changed in: android-tools (Ubuntu) Importance: Undecided = Critical ** Changed in: android-tools (Ubuntu) Assignee: (unassigned) = Oliver Grawert (ogra) ** Changed in: android-tools (Ubuntu) Status: New = Confirmed ** Changed in: ubuntu-touch-session (Ubuntu) Status: Confirmed = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374650 Title: cannot make dbus connections inside a shell started via adb shell To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/android-tools/+bug/1374650/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374739] [NEW] [wishlist] please use a more recent version
Public bug reported: Hi, The morituri package is terribly outdated even by Trusty standards. The 0.2.0 version was released, according to this page, in Jan 2013. The latest version was released in July 2014. even Utopic comes with that ancient 0.2.0 version. http://thomas.apestaart.org/download/morituri/ apt-cache policy morituri morituri: Installed: (none) Candidate: 0.2.0-2 Version table: 0.2.0-2 0 500 http://ubuntu.mirrors.linux.ro/archive/ trusty/universe amd64 Packages ** Affects: morituri (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374739 Title: [wishlist] please use a more recent version To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/morituri/+bug/1374739/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 62244] Re: Debugging mode not enabled in Bochs.
** Also affects: qemu Importance: Undecided Status: New ** No longer affects: qemu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/62244 Title: Debugging mode not enabled in Bochs. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bochs/+bug/62244/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 434476]
Check d-feet (#yum install d-feet.noarch in Fedora) to inspect your active dbus interfaces. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/434476 Title: screensaver starts while playing HTML5 videos To manage notifications about this bug go to: https://bugs.launchpad.net/firefox/+bug/434476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 434476]
For instance I see only org.mate.ScreenSaver interface on Fedora20/MATE desktop. So the problem may be here. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/434476 Title: screensaver starts while playing HTML5 videos To manage notifications about this bug go to: https://bugs.launchpad.net/firefox/+bug/434476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374743] Re: compiz crashed with SIGSEGV in g_closure_invoke()
*** This bug is a duplicate of bug 1373891 *** https://bugs.launchpad.net/bugs/1373891 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1373891, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/1374743/+attachment/4217098/+files/CoreDump.gz ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1374743/+attachment/4217113/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1374743/+attachment/4217115/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/1374743/+attachment/4217116/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/1374743/+attachment/4217117/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/1374743/+attachment/4217118/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of bug 1373891 compiz crashed with SIGSEGV in g_closure_invoke() ** Information type changed from Private to Public ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374743 Title: compiz crashed with SIGSEGV in g_closure_invoke() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/compiz/+bug/1374743/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1369684] Re: Elantech touchpad locks cursor when touching with 2 or more fingers
We found same issue on several devices (running Debian Whezzy with kernel 3.14) But. we have many other same device with this firmware reported from psmouse: [9.906882] psmouse serio4: elantech: assuming hardware version 3 (with firmware version 0x450f02) [9.920408] psmouse serio4: elantech: Synaptics capabilities query result 0x09, 0x16, 0x09. i down know if same touch hardware with different firmware or the hardware is no same On the firmware 0x450f02 the problem does not happen Do you have a bios update to try? I will contact to our vendor to ask if bios update can be fix the buggie devices. on windows with 0x354f01 the issue is little different, the touchpad freeze few seconds and work again. # dmidecode 2.11 # SMBIOS entry point at 0x79269000 SMBIOS 2.7 present. 33 structures occupying 1568 bytes. Table at 0x79268000. Handle 0x, DMI type 0, 24 bytes BIOS Information Vendor: Phoenix Technologies Ltd. Version: MPBYT10A.86A.0023.2014.0317.1155 Release Date: 03/17/2014 Address: 0xE Runtime Size: 128 kB ROM Size: 4096 kB Characteristics: PCI is supported BIOS is upgradeable BIOS shadowing is allowed Boot from CD is supported Selectable boot is supported NEC PC-98 ACPI is supported USB legacy is supported BIOS boot specification is supported Function key-initiated network boot is supported Targeted content distribution is supported UEFI is supported BIOS Revision: 0.1 Firmware Revision: 1.0 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1369684 Title: Elantech touchpad locks cursor when touching with 2 or more fingers To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1369684/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 434476]
The patch utilizes the org.freedesktop.ScreenSaver or org.gnome.SessionManager D-BUS interfaces so it depends if you have such services enabled or not and if your screen saver listen here. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/434476 Title: screensaver starts while playing HTML5 videos To manage notifications about this bug go to: https://bugs.launchpad.net/firefox/+bug/434476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 434476]
It works for me with gnome-screensaver 2.30, firefox nightly 2014-08-30, both with and without fullscreen. Sometimes screensaver stiil appears after ~ 25 minutes of video (but it's configured to get activated after 2 minutes), so it's another problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/434476 Title: screensaver starts while playing HTML5 videos To manage notifications about this bug go to: https://bugs.launchpad.net/firefox/+bug/434476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 520290] Re: Doesn't support dual-head desktop
** Changed in: gedit Status: New = Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/520290 Title: Doesn't support dual-head desktop To manage notifications about this bug go to: https://bugs.launchpad.net/gedit/+bug/520290/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374745] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
Public bug reported: error when updating kernel ProblemType: Package DistroRelease: Ubuntu 14.10 Package: nvidia-331 331.89-0ubuntu5 ProcVersionSignature: Ubuntu 3.16.0-17.23-generic 3.16.3 Uname: Linux 3.16.0-17-generic x86_64 ApportVersion: 2.14.7-0ubuntu2 Architecture: amd64 DKMSKernelVersion: 3.16.0-18-generic Date: Sat Sep 27 15:16:04 2014 InstallationDate: Installed on 2014-09-26 (0 days ago) InstallationMedia: Ubuntu 14.10 Utopic Unicorn - Alpha amd64 (20140923) PackageVersion: 331.89-0ubuntu5 SourcePackage: nvidia-graphics-drivers-331 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374745 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1374745/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374747] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374747 Title: e1000e causes intermittent freezes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1374747/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs