[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.
** Branch linked: lp:ubuntu/utopic-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1379779 Title: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.
This bug was fixed in the package neutron - 1:2014.2~rc2-0ubuntu1 --- neutron (1:2014.2~rc2-0ubuntu1) utopic; urgency=medium * New upstream release candidate: - d/p/*: Refresh. * Fixup optimized iptables management by l2 daemons (LP: #1379779): - d/neutron-common.install: Install ipset-firewall.filters to support use of ipset to optimize firewall rulebase management. - d/control: Add ipset to Depends of neutron-common. * d/watch: Only match versions starting with digits. -- James Page james.p...@ubuntu.com Fri, 10 Oct 2014 15:13:44 +0100 ** Changed in: neutron (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to neutron in Ubuntu. https://bugs.launchpad.net/bugs/1379779 Title: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380036] [NEW] kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme
Public bug reported: I am using the kubuntu next repository on kubuntu 14.10 - with the latest release of plasma 5.1. I have a bizarre issue that the kf5 applications like system-settings seem to be using the gtk2 theme set using the kde-gtk-config tool. Kde4 applications and qt4 applications correctly use the application style set. E,g, i set application style to breeze, gtk2 theme to qtcurve and gtk3 to adwaita - and i can see that systemsettings5 is using qtcurve. while konversation (kde 4) and cadence (qt4) is using breeze (qt4config shows that theme is set to desktop default). When i change the gtk2 theme to say oxygen-gtk and restart system- settings it changes themes. Changing the theme in kde application style doesn't have any effect on system settings - also i that kde 4 applications don't change themes on the fly - they need to be restarted which is different behaviour to what i had seen in the early betas of plasma next Please let me know how i can debug this issue further? Output of lsb_release -rd Description:Ubuntu Utopic Unicorn (development branch) Release:14.10 output of apt-cache policy plasma-workspace plasma-workspace: Installed: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 Candidate: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 Version table: *** 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 0 500 http://ppa.launchpad.net/kubuntu-ppa/next/ubuntu/ utopic/main amd64 Packages 100 /var/lib/dpkg/status ** Affects: ubuntu Importance: Undecided Status: New ** Attachment added: bug-theme.png https://bugs.launchpad.net/bugs/1380036/+attachment/4231366/+files/bug-theme.png ** Package changed: open-vm-tools (Ubuntu) = ubuntu -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to open-vm-tools in Ubuntu. https://bugs.launchpad.net/bugs/1380036 Title: kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380038] [NEW] SSL problems: doesn't check certificate chain and hostname when ssl connecting
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in pacemaker, the following is details: 1. file : /pacemaker-1.1.6/lib/common/remote.c problem : Certificate chain verification is missing 2. file : /pacemaker-1.1.6/lib/common/remote.c problem : Hostname verification is missing More specifically , we can take hostname check for example, the function verify_certificate() can only guarantee the validity of the certificate but cannot guarantee that the host you are trying to connect is the one you intend to visit, which may lead to man-in-the-middle attack or other security issues. And other APIs have similar problems. PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. ** Affects: pacemaker (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to pacemaker in Ubuntu. https://bugs.launchpad.net/bugs/1380038 Title: SSL problems: doesn't check certificate chain and hostname when ssl connecting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pacemaker/+bug/1380038/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380080] [NEW] Cannot make directory '/var/run/screen': Permission denied (convert init to upstart)
Public bug reported: Same problem as bug #574773 but happening on Ubuntu 14.04 Trusty Tahr. It looks like the upstart script was removed and there is an /etc/init.d script that just doesn't work properly. It can be fixed by copying the upstart script from 12.04. ** Affects: screen (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to screen in Ubuntu. https://bugs.launchpad.net/bugs/1380080 Title: Cannot make directory '/var/run/screen': Permission denied (convert init to upstart) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380080/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380084] [NEW] SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0
Public bug reported: I expect that when using key based authentication I do $ssh user@0.0.0.0 I expect to be asked for the key password. Instead I get Agent admitted failure to sign using the key. Permission denied (publickey). Using SSH_AUTH_SOCK=0 solves the problem allowing me to be asked for the key password. What should happen is that I should not have to specify SSH_AUTH_SOCK=0 on the CLI, I should only have to type $ user@0.0.0.0 ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: openssh-client 1:6.6p1-2ubuntu2 ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7 Uname: Linux 3.13.0-37-generic i686 NonfreeKernelModules: wl ApportVersion: 2.14.1-0ubuntu3.5 Architecture: i386 CurrentDesktop: Unity Date: Sat Oct 11 07:19:08 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-09-08 (33 days ago) InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release i386 (20140722.2) ProcEnviron: LANGUAGE=en_US PATH=(custom, no user) XDG_RUNTIME_DIR=set LANG=en_US.UTF-8 SHELL=/bin/bash RelatedPackageVersions: ssh-askpass N/A libpam-sshN/A keychain N/A ssh-askpass-gnome 1:6.6p1-2ubuntu2 SSHClientVersion: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014 SourcePackage: openssh UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: openssh (Ubuntu) Importance: Undecided Status: New ** Tags: apport-bug i386 trusty -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1380084 Title: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380099] Re: smbd crashed with SIGABRT in dump_core()
*** This bug is a duplicate of bug 1295518 *** https://bugs.launchpad.net/bugs/1295518 Thank you for taking the time to report this crash and helping to make this software better. This particular crash has already been reported and is a duplicate of bug #1295518, so is being marked as such. Please look at the other bug report to see if there is any missing information that you can provide, or to see if there is a workaround for the bug. Additionally, any further discussion regarding the bug should occur in the other report. Please continue to report any other bugs you may find. ** Attachment removed: CoreDump.gz https://bugs.launchpad.net/bugs/1380099/+attachment/4231618/+files/CoreDump.gz ** Attachment removed: Disassembly.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231620/+files/Disassembly.txt ** Attachment removed: ProcMaps.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231621/+files/ProcMaps.txt ** Attachment removed: ProcStatus.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231622/+files/ProcStatus.txt ** Attachment removed: Registers.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231623/+files/Registers.txt ** Attachment removed: Stacktrace.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231626/+files/Stacktrace.txt ** Attachment removed: ThreadStacktrace.txt https://bugs.launchpad.net/bugs/1380099/+attachment/4231627/+files/ThreadStacktrace.txt ** This bug has been marked a duplicate of private bug 1295518 ** Information type changed from Private to Public ** Tags removed: need-amd64-retrace -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to samba in Ubuntu. https://bugs.launchpad.net/bugs/1380099 Title: smbd crashed with SIGABRT in dump_core() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1380099/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1379761] Re: Asset compression does not happen unless debug mode is enabled
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: horizon (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to horizon in Ubuntu. https://bugs.launchpad.net/bugs/1379761 Title: Asset compression does not happen unless debug mode is enabled To manage notifications about this bug go to: https://bugs.launchpad.net/horizon/+bug/1379761/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380150] [NEW] novaclient: security groups, should fail when creating security groups with duplicate name
Public bug reported: When creating a security group using the novaclient.security_groups create API, there is not check which avoids creating security group if one already exist. This later on poses a problem when trying to delete, find the security group, which results in a NoUniqueMatch exception as below. It would be better if the API returned an error when creating a security group with the same name. == ERROR: test_network_scenarios (__main__.NetworkScenarioTest) -- Traceback (most recent call last): File /home/xyz/code/install_oct10/pns/vmtp.py, line 359, in tearDown self.comp.security_group_delete() File /home/xyz/code/install_oct10/pns/compute.py, line 183, in security_group_delete group = self.novaclient.security_groups.find(name=self.config.security_group_name) File /home/xyz/env/env1/lib/python2.7/site-packages/novaclient/base.py, line 140, in find raise exceptions.NoUniqueMatch NoUniqueMatch ** Affects: python-novaclient (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to python-novaclient in Ubuntu. https://bugs.launchpad.net/bugs/1380150 Title: novaclient: security groups, should fail when creating security groups with duplicate name To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/python-novaclient/+bug/1380150/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380164] Re: screen crashed when trying to split via terminal control sequence
** Information type changed from Private to Public -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to screen in Ubuntu. https://bugs.launchpad.net/bugs/1380164 Title: screen crashed when trying to split via terminal control sequence To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380164] Re: screen crashed when trying to split via terminal control sequence
This is likely fixed in 4.2.1-2 in Utopic. At least I can't reproduce it anymore on Debian Testing with 4.2.1-2. It's likely that this had been fixed upstream with either 4.2.0 or 4.2.1. ** Changed in: screen (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to screen in Ubuntu. https://bugs.launchpad.net/bugs/1380164 Title: screen crashed when trying to split via terminal control sequence To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380164/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0
** Attachment added: ssh_config.local https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+attachment/4231875/+files/ssh_config.local -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1380084 Title: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0
** Attachment added: sshd_config.remote https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+attachment/4231905/+files/sshd_config.remote -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1380084 Title: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0
Happens with all SSH commands such as scp and sftp. This also means that I can't use the file explorer called files to connect to remote file systems. sftp will not work in the files browser because there is no way to tell files to use SSH_AUTH_SOCK=0 So I can not browse remote files in the file explorer as if they were local. I'm talking about the GUI file explorer. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openssh in Ubuntu. https://bugs.launchpad.net/bugs/1380084 Title: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1336555] Re: ovs-vswitchd segfault every 2 days
After updating kernel in ubuntu 14.04 I found this again. But this time with kernel panic. ct 12 00:56:30 red-compute kernel: [ 2139.850867] ovs-vswitchd[19280]: segfault at 0 ip 00459340 sp 7fff2d88c3e8 error 4 in ovs-vswitchd[40+133000] Oct 12 00:56:31 red-compute ovs-vswitchd: ovs|00010|daemon(monitor)|ERR|7 crashes: pid 19280 died, killed (Segmentation fault), core dumped, restarting Oct 12 00:57:01 red-compute CRON[19736]: (root) CMD (if [ -x /usr/share/mdadm/checkarray ] [ $(date +%d) -le 7 ]; then /usr/share/mdadm/checkarray --cron --all --idle --quiet; fi) Oct 12 00:58:28 red-compute ovsdb-client: ovs|1|fatal_signal|WARN|terminating with signal 15 (Terminated) Oct 12 00:58:34 red-compute kernel: [ 2264.419340] init: neutron-plugin-openvswitch-agent main process (14411) killed by KILL signal Oct 12 00:58:56 red-compute kernel: [ 2286.159789] INFO: task jbd2/rbd1-8:10184 blocked for more than 120 seconds. Oct 12 00:58:56 red-compute kernel: [ 2286.159802] Tainted: PW OX 3.13.0-37-generic #64-Ubuntu Oct 12 00:58:56 red-compute kernel: [ 2286.159807] echo 0 /proc/sys/kernel/hung_task_timeout_secs disables this message. Oct 12 00:58:56 red-compute kernel: [ 2286.159812] jbd2/rbd1-8 D 88032fc54480 0 10184 2 0x Oct 12 00:58:56 red-compute kernel: [ 2286.159822] 88029baadbc8 0046 8802d1ac8000 88029baadfd8 Oct 12 00:58:56 red-compute kernel: [ 2286.159832] 00014480 00014480 8802d1ac8000 88032fc54d18 Oct 12 00:58:56 red-compute kernel: [ 2286.159840] 88032ffb1020 0002 811ee820 88029baadc40 Oct 12 00:58:56 red-compute kernel: [ 2286.159847] Call Trace: Oct 12 00:58:56 red-compute kernel: [ 2286.159864] [811ee820] ? generic_block_bmap+0x50/0x50 Oct 12 00:58:56 red-compute kernel: [ 2286.159875] [8172344d] io_schedule+0x9d/0x140 Oct 12 00:58:56 red-compute kernel: [ 2286.159884] [811ee82e] sleep_on_buffer+0xe/0x20 Oct 12 00:58:56 red-compute kernel: [ 2286.159892] [817238d2] __wait_on_bit+0x62/0x90 Oct 12 00:58:56 red-compute kernel: [ 2286.159899] [811ee820] ? generic_block_bmap+0x50/0x50 Oct 12 00:58:56 red-compute kernel: [ 2286.159907] [81723977] out_of_line_wait_on_bit+0x77/0x90 Oct 12 00:58:56 red-compute kernel: [ 2286.159916] [810ab010] ? autoremove_wake_function+0x40/0x40 Oct 12 00:58:56 red-compute kernel: [ 2286.159924] [811efb5a] __wait_on_buffer+0x2a/0x30 Oct 12 00:58:56 red-compute kernel: [ 2286.159933] [812888f0] jbd2_journal_commit_transaction+0xee0/0x1a70 Oct 12 00:58:56 red-compute kernel: [ 2286.159943] [810754ff] ? try_to_del_timer_sync+0x4f/0x70 Oct 12 00:58:56 red-compute kernel: [ 2286.159951] [8128d4ad] kjournald2+0xbd/0x250 Oct 12 00:58:56 red-compute kernel: [ 2286.159959] [810aafd0] ? prepare_to_wait_event+0x100/0x100 Oct 12 00:58:56 red-compute kernel: [ 2286.159967] [8128d3f0] ? commit_timeout+0x10/0x10 Oct 12 00:58:56 red-compute kernel: [ 2286.159974] [8108b492] kthread+0xd2/0xf0 Oct 12 00:58:56 red-compute kernel: [ 2286.159981] [8108b3c0] ? kthread_create_on_node+0x1c0/0x1c0 Oct 12 00:58:56 red-compute kernel: [ 2286.159988] [8172f77c] ret_from_fork+0x7c/0xb0 Oct 12 00:58:56 red-compute kernel: [ 2286.159995] [8108b3c0] ? kthread_create_on_node+0x1c0/0x1c0 Oct 12 00:58:56 red-compute kernel: [ 2286.160016] INFO: task init:10493 blocked for more than 120 seconds. Oct 12 00:58:56 red-compute kernel: [ 2286.160022] Tainted: PW OX 3.13.0-37-generic #64-Ubuntu Oct 12 00:58:56 red-compute kernel: [ 2286.160025] echo 0 /proc/sys/kernel/hung_task_timeout_secs disables this message. Oct 12 00:58:56 red-compute kernel: [ 2286.160028] initD 88032fc94480 0 10493 10443 0x Oct 12 00:58:56 red-compute kernel: [ 2286.160036] 8802eae2da28 0082 8802b37a3000 8802eae2dfd8 Oct 12 00:58:56 red-compute kernel: [ 2286.160043] 00014480 00014480 8802b37a3000 88032fc94d18 Oct 12 00:58:56 red-compute kernel: [ 2286.160050] 88032ffb7908 0002 812851c0 8802eae2daa0 Oct 12 00:58:56 red-compute kernel: [ 2286.160057] Call Trace: Oct 12 00:58:56 red-compute kernel: [ 2286.160066] [812851c0] ? start_this_handle+0x590/0x590 Oct 12 00:58:56 red-compute kernel: [ 2286.160074] [8172344d] io_schedule+0x9d/0x140 Oct 12 00:58:56 red-compute kernel: [ 2286.160081] [812851ce] sleep_on_shadow_bh+0xe/0x20 Oct 12 00:58:56 red-compute kernel: [ 2286.160088] [817238d2] __wait_on_bit+0x62/0x90 Oct 12 00:58:56 red-compute kernel: [ 2286.160095] [812851c0] ? start_this_handle+0x590/0x590 Oct 12 00:58:56 red-compute kernel: [ 2286.160103] [81723977] out_of_line_wait_on_bit+0x77/0x90 Oct 12 00:58:56 red-compute kernel: [
[Bug 1336555] Re: ovs-vswitchd segfault every 2 days
ovs-vsctl (Open vSwitch) 2.0.2 Compiled Aug 15 2014 14:31:02 I did: apport-collect 1336555 Package openvswitch not installed and no hook available, ignoring But no luck. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to openvswitch in Ubuntu. https://bugs.launchpad.net/bugs/1336555 Title: ovs-vswitchd segfault every 2 days To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1336555/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1320074] Re: maas-import-pxe fails to catch comms errors when downloading UEFI shim and TBs instead
giving me a syntax error near unexpected token '(' -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to maas in Ubuntu. https://bugs.launchpad.net/bugs/1320074 Title: maas-import-pxe fails to catch comms errors when downloading UEFI shim and TBs instead To manage notifications about this bug go to: https://bugs.launchpad.net/maas/+bug/1320074/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1230917] Re: php5-fpm logrotate errors after package switched to upstart
Having this issue here too. So, been reading through your comments but what now? Will a bugfix come out soon? If not, what's the recommended, temporary, workaround?? -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1380006] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
Public bug reported: error through upgrading from 14.04 to 14.10 without having had purged some ppa i guess... ProblemType: Package DistroRelease: Ubuntu 14.10 Package: nvidia-331 331.89-0ubuntu5 ProcVersionSignature: Ubuntu 3.16.0-21.28-generic 3.16.4 Uname: Linux 3.16.0-21-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.7-0ubuntu5 Architecture: amd64 DKMSKernelVersion: 3.16.0-22-generic Date: Sat Oct 11 07:45:47 2014 InstallationDate: Installed on 2014-08-23 (48 days ago) InstallationMedia: Ubuntu-GNOME 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.2) PackageVersion: 331.89-0ubuntu5 SourcePackage: nvidia-graphics-drivers-331 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build UpgradeStatus: Upgraded to utopic on 2014-10-11 (0 days ago) ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380006 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380006/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 632984] Re: libwx_gtk2u_media-2.8.so.0 missing from libwxgtk2.8-0
Hello, I read (and maybe understand) than this bug is fixed. Thank you for fix it... can i profit this fix, and how to do ? (please) OK... so, for me (ubuntu-12.04), when i use wxpython-2.6.x with python-2.7, this not works at all. So... i not said the bug is not fixed, i said that i don't know (and nothing is explain here) how to be able to see it runing (and use the wx.media and mediaCtrl implemented). If there is a generous and sympathic user who know and want to tell me what i can do for make it runing, i will be very happy. I just would like to use wxpython and its wx.media runing fine (if it is possible). thank you for share more information for beginners on ubuntu/linux style plateform. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/632984 Title: libwx_gtk2u_media-2.8.so.0 missing from libwxgtk2.8-0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/wxwidgets2.8/+bug/632984/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380009] [NEW] package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another ve
Public bug reported: /boot mounted (ro) issued ' mount -o remount,rw /boot' in another terminal and reran 'apt- get -f install' all is wonderful with this great OS! Keep up the good work :) ProblemType: Package DistroRelease: Ubuntu 14.04 Package: linux-image-3.13.0-38-generic (not installed) ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7 Uname: Linux 3.13.0-37-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: klowrie4910 F pulseaudio Date: Sat Oct 11 00:12:15 2014 DuplicateSignature: package:linux-image-3.13.0-38-generic:(not installed):unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system ErrorMessage: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system InstallationDate: Installed on 2014-04-29 (164 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Beta amd64+mac (20140326) MachineType: Dell Inc. Dell System XPS L322X ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-37-generic root=/dev/mapper/ubuntu--vg-root ro quiet splash PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No PulseAudio daemon running, or not running as session daemon. RelatedPackageVersions: grub-pc 2.02~beta2-9ubuntu1 SourcePackage: linux Title: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 04/18/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A08 dmi.board.name: 0PJHXN dmi.board.vendor: Dell Inc. dmi.board.version: A00 dmi.chassis.asset.tag: 00 dmi.chassis.type: 8 dmi.chassis.vendor: Dell Inc. dmi.chassis.version: 0.1 dmi.modalias: dmi:bvnDellInc.:bvrA08:bd04/18/2013:svnDellInc.:pnDellSystemXPSL322X:pvr:rvnDellInc.:rn0PJHXN:rvrA00:cvnDellInc.:ct8:cvr0.1: dmi.product.name: Dell System XPS L322X dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Undecided Status: Confirmed ** Tags: amd64 apport-package trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380009 Title: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380009] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380009 Title: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380009] Re: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another vers
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380009 Title: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only file system To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380014] [NEW] modemmanager should blacklist Freetronics devices
Public bug reported: In a similar vein to Bug #910736, there are more Arduino related devices that must be blacklisted. For the LeoStick, the following is required: -- /etc/udev/rules.d/77-modem-manager-freetronics.rules -- ATTRS{idVendor}==26ba, ENV{ID_MM_DEVICE_IGNORE}=1 ATTRS{idVendor}==20a0, ENV{ID_MM_DEVICE_IGNORE}=1 --- See http://www.freetronics.com/pages/leostick-getting-started-guide in the section Problems Uploading on Linux. There are also some additional devices listed on the end of Bug #910736 after it was marked as FixedReleased. ** Affects: modemmanager (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380014 Title: modemmanager should blacklist Freetronics devices To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/modemmanager/+bug/1380014/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379448] Re: Can't install or update apps on Ubuntu Touch
Seems like after removing the Ubuntu One account and adding it back everything works -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379448 Title: Can't install or update apps on Ubuntu Touch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/click/+bug/1379448/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380018] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
Public bug reported: v?? ProblemType: Package DistroRelease: Ubuntu 14.10 Package: nvidia-331 331.89-0ubuntu5 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.7-0ubuntu5 Architecture: amd64 DKMSKernelVersion: 3.16.0-22-generic Date: Sat Oct 11 08:12:05 2014 InstallationDate: Installed on 2014-04-08 (185 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Daily amd64 (20140403) PackageVersion: 331.89-0ubuntu5 SourcePackage: nvidia-graphics-drivers-331 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build UpgradeStatus: Upgraded to utopic on 2014-10-06 (4 days ago) modified.conffile..etc.modprobe.d.nvidia.331.hybrid.conf: [deleted] ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380018 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380018/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1059872] Re: Error formatting disk using disk utility
Fresh Ubuntu 14.04.1 LTS. Disk utility fails in formatting empty partition on usb-disk: Error formatting partition Error synchronizing after initial wipe: Timed out waiting for object (udisks-error-quark, 0) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1059872 Title: Error formatting disk using disk utility To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/udisks2/+bug/1059872/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379410] Re: Please update digikam to 4.4.0
** Changed in: digikam (Ubuntu) Assignee: (unassigned) = Achim Bohnet (allee) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379410 Title: Please update digikam to 4.4.0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/digikam/+bug/1379410/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.
** Branch linked: lp:ubuntu/utopic-proposed/neutron -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379779 Title: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 995918] Re: tumbler causes Cannot unmount because file system on device is busy.
I am on 0.1.30-1ubuntu and I just got this issue as well. I was unable to unmount a volume because tumblerd was generating thumbnails, even though I had no Thunar window open. I found it by running fuser, killing the process allowed me to unmount. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/995918 Title: tumbler causes Cannot unmount because file system on device is busy. To manage notifications about this bug go to: https://bugs.launchpad.net/tumbler/+bug/995918/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1362658] Re: screen locks while recording video
** Changed in: media-hub (Ubuntu) Assignee: Jim Hodapp (jhodapp) = Ricardo Mendoza (ricmm) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1362658 Title: screen locks while recording video To manage notifications about this bug go to: https://bugs.launchpad.net/media-hub/+bug/1362658/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379829] Re: package postgresql-9.4 9.4~beta2-1build1 failed to install/upgrade: subprocess new pre-installation script returned error exit status 1
I was updating postgresql using apt-get when this apport-gtk message appears. Apt-get say: Errors were encountered while processing: /var/cache/apt/archives/postgresql-9.4_9.4~beta3-1_amd64.deb E: Sub-process /usr/bin/dpkg returned an error code (1) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379829 Title: package postgresql-9.4 9.4~beta2-1build1 failed to install/upgrade: subprocess new pre-installation script returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-9.4/+bug/1379829/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380022] [NEW] aiccu's SSL connection is not secure
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in aiccu, the following is details: 1. /aiccu-20070115/common/common.c Certificate verification missing Still vulnerable in Ubunutu 14.04 http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c; 2. /aiccu-20070115/common/common.c Host name verification missing Still vulnerable in Ubunutu 14.04 http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c; PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. ** Affects: aiccu (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public ** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380022 Title: aiccu's SSL connection is not secure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aiccu/+bug/1380022/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379986] Re: Kernel Panic with haproxy
*** This bug is a duplicate of bug 1275879 *** https://bugs.launchpad.net/bugs/1275879 Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379986 Title: Kernel Panic with haproxy To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1379986/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376592] Re: X509 certificate verification problem
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376592 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/freetds/+bug/1376592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1378617] Re: xxxterm has SSL security problems
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1378617 Title: xxxterm has SSL security problems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xxxterm/+bug/1378617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376595] Re: X509 certificate verification problem
** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376595 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1376595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380025] [NEW] linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of CONFIG_CC_STACKPROTECTOR_REGULAR
Public bug reported: Here is the relevant kernel config: $ grep STACKPROTECTOR /boot/config-3.16.0-22-generic CONFIG_HAVE_CC_STACKPROTECTOR=y CONFIG_CC_STACKPROTECTOR=y # CONFIG_CC_STACKPROTECTOR_NONE is not set CONFIG_CC_STACKPROTECTOR_REGULAR=y # CONFIG_CC_STACKPROTECTOR_STRONG is not set Since linux is built with gcc 4.9 in Ubuntu 14.10, it could use CONFIG_CC_STACKPROTECTOR_STRONG instead of CONFIG_CC_STACKPROTECTOR_REGULAR. ProblemType: Bug DistroRelease: Ubuntu 14.10 Package: linux-image-3.16.0-22-generic 3.16.0-22.29 ProcVersionSignature: Ubuntu 3.16.0-22.29-generic 3.16.4 Uname: Linux 3.16.0-22-generic x86_64 ApportVersion: 2.14.7-0ubuntu5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC0: bonnaudl 3741 F pulseaudio CurrentDesktop: KDE Date: Sat Oct 11 10:03:30 2014 EcryptfsInUse: Yes HibernationDevice: RESUME=UUID=cf81afe7-8427-45fa-9149-c11d060a5a26 IwConfig: eth1 no wireless extensions. lono wireless extensions. MachineType: Dell Inc. Latitude E6520 ProcFB: 0 inteldrmfb ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-22-generic root=UUID=749a9901-bdd3-4b5f-b80e-69414667e058 ro quiet splash vt.handoff=7 RelatedPackageVersions: linux-restricted-modules-3.16.0-22-generic N/A linux-backports-modules-3.16.0-22-generic N/A linux-firmware 1.135 RfKill: SourcePackage: linux UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 11/14/2013 dmi.bios.vendor: Dell Inc. dmi.bios.version: A19 dmi.board.name: 0NVF5K dmi.board.vendor: Dell Inc. dmi.board.version: A01 dmi.chassis.type: 9 dmi.chassis.vendor: Dell Inc. dmi.modalias: dmi:bvnDellInc.:bvrA19:bd11/14/2013:svnDellInc.:pnLatitudeE6520:pvr01:rvnDellInc.:rn0NVF5K:rvrA01:cvnDellInc.:ct9:cvr: dmi.product.name: Latitude E6520 dmi.product.version: 01 dmi.sys.vendor: Dell Inc. ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380025 Title: linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of CONFIG_CC_STACKPROTECTOR_REGULAR To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380025/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380022] Re: aiccu's SSL connection is not secure
** Description changed: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in aiccu, the following is details: - 1. + 1. /aiccu-20070115/common/common.c - Certificate verification missing + Certificate chain verification is missing - Still vulnerable in Ubunutu 14.04 - http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c; + 2. + /aiccu-20070115/common/common.c + Hostname verification is missing - 2. - /aiccu-20070115/common/common.c - Host name verification missing - - Still vulnerable in Ubunutu 14.04 - http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c; + More specifically , we can take hostname check for example, the function + verify_certificate() can only guarantee the validity of the certificate + but cannot guarantee that the host you are trying to connect is the one + you intend to visit, which may lead to man-in-the-middle attack or other + security issues. And other APIs have similar problems. PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380022 Title: aiccu's SSL connection is not secure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/aiccu/+bug/1380022/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1216385] Re: [needs-packaging] scanbd
** Changed in: debian Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1216385 Title: [needs-packaging] scanbd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.
This bug was fixed in the package neutron - 1:2014.2~rc2-0ubuntu1 --- neutron (1:2014.2~rc2-0ubuntu1) utopic; urgency=medium * New upstream release candidate: - d/p/*: Refresh. * Fixup optimized iptables management by l2 daemons (LP: #1379779): - d/neutron-common.install: Install ipset-firewall.filters to support use of ipset to optimize firewall rulebase management. - d/control: Add ipset to Depends of neutron-common. * d/watch: Only match versions starting with digits. -- James Page james.p...@ubuntu.com Fri, 10 Oct 2014 15:13:44 +0100 ** Changed in: neutron (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379779 Title: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist. To manage notifications about this bug go to: https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380025] Status changed to Confirmed
This change was made by a bot. ** Changed in: linux (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380025 Title: linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of CONFIG_CC_STACKPROTECTOR_REGULAR To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380025/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380028] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
Public bug reported: Failed to build on update to Kernel 3.16.0.22 ProblemType: Package DistroRelease: Ubuntu 14.10 Package: nvidia-331 331.89-0ubuntu5 ProcVersionSignature: Ubuntu 3.16.0-22.29-generic 3.16.4 Uname: Linux 3.16.0-22-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.7-0ubuntu5 Architecture: amd64 DKMSKernelVersion: 3.16.0-22-generic Date: Sat Oct 11 10:17:57 2014 InstallationDate: Installed on 2014-07-11 (91 days ago) InstallationMedia: Xubuntu 14.10 Utopic Unicorn - Alpha amd64 (20140709) PackageVersion: 331.89-0ubuntu5 SourcePackage: nvidia-graphics-drivers-331 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: nvidia-graphics-drivers-331 (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380028 Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380028/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380031] [NEW] hostname and certificate chain check missing when verifying X509 certificate
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in charybdis, the following is details: 1. /charybdis-3.3.0/libratbox/src/gnutls.c Certificate chain verification is missing 2. /charybdis-3.3.0/libratbox/src/gnutls.c Hostname verification is missing More specifically , we can take hostname check for example, the function verify_certificate() can only guarantee the validity of the certificate but cannot guarantee that the host you are trying to connect is the one you intend to visit, which may lead to man-in-the-middle attack or other security issues. And other APIs have similar problems. PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. ** Affects: charybdis (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380031 Title: hostname and certificate chain check missing when verifying X509 certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/charybdis/+bug/1380031/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376592] Re: X509 certificate verification problem
** Description changed: - Hostname verification is an important step when verifying X509 - certificates, however, people tend to miss the step or to misunderstand - the APIs when using SSL/TLS, which might cause severe man in the middle - attack and break the entire TLS mechanism. - We believe that freetds-bin didn't check whether the hostname matches - the name in the SSL certificate and the expired date of the certificate. + Recently, we are trying to find SSL security problems by static anaylsis. + For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - We found the vulnerability by static analysis, typically, a process of - verification involves calling a chain of API, and we can deduce whether - the communication process is vulnerable by detecting whether the - function call process matches a certain model. For example, when using - OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null), - we should verify the certificate by calling the function - SSL_get_peer_certificate() to get the certificate. If the source code - does not match this model, then we can deduce this code is vulnerable. - What’ more , Gnutls is the same as Openssl. + During the experiment, we find that freetds-bin didn't check whether the + hostname matches the name in the SSL certificate and the expired date of + the certificate. - To verify the result: + + To verify the result, we attack the software manually: 一.Hostname verification: 1. configure the file freetds.conf : # A typical Microsoft server [sqlserver2000] host = hackbyfun.sqlserver.com port = 1433 tds version = 8.0 encrpytion = require 2.wirte the file /etc/hosts in order to simulate DNS hijack: 10.214.146.123 hackbyfun.sqlserver.com (PS: 10.214.146.123 is a normal sql server ip, its domain name is safe.sqlserver.com ) 3.connect with freetds-bin tsql -S sqlserver2000 -U sa -P your password 4.result:connect succeed!! The fetch succeeded, indicating freetds-bin didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. the same as the above process. Run freetds-bin to connect a normal sql server 3. result :connect succeed!! The fetch succeeded again and no warning was given, indicating freetds- bin didn't check whether the certificate expired or not. (PS: I have saved the wireshark packages, and upload these files) I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Description changed: - Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. During the experiment, we find that freetds-bin didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate. - To verify the result, we attack the software manually: 一.Hostname verification: 1. configure the file freetds.conf : # A typical Microsoft server [sqlserver2000] host = hackbyfun.sqlserver.com port = 1433 tds version = 8.0 encrpytion = require 2.wirte the file /etc/hosts in order to simulate DNS hijack: 10.214.146.123 hackbyfun.sqlserver.com (PS: 10.214.146.123 is a normal sql server ip, its domain name is safe.sqlserver.com ) 3.connect with freetds-bin tsql -S sqlserver2000 -U sa -P your password 4.result:connect succeed!! The fetch succeeded, indicating freetds-bin didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. the same as the above process. Run freetds-bin to connect a normal sql server 3. result :connect succeed!! The fetch succeeded again and no warning was given, indicating freetds- bin didn't check whether the certificate expired or not. (PS: I have saved the wireshark packages, and upload these files) I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to
[Bug 1376595] Re: X509 certificate verification problem
** Description changed: - Hostname verification is an important step when verifying X509 - certificates, however, people tend to miss the step or to misunderstand - the APIs when using SSL/TLS, which might cause severe man in the middle - attack and break the entire TLS mechanism. + Recently, we are trying to find SSL security problems by static anaylsis. + For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - We believe that scrollz didn't check whether the hostname matches the - name in the SSL certificate and the expired date of the certificate. + During the experiment, we find that freetds-bin didn't check whether the + hostname matches the name in the SSL certificate and the expired date of + the certificate.The followind is details: - We found the vulnerability by static analysis, typically, a process of - verification involves calling a chain of API, and we can deduce whether - the communication process is vulnerable by detecting whether the - function call process matches a certain model. For example, when using - OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null), - we should verify the certificate by calling the function - SSL_get_peer_certificate() to get the certificate. If the source code - does not match this model, then we can deduce this code is vulnerable. - What’ more , Gnutls is the same as Openssl. + 1. + function: /scrollz-2.1/source/server.c login_to_server() + problem: Hostname verification missing - Static analysis result : - /scrollz-2.1/source/server.c login_to_server() have problems. + 2. + function: /scrollz-2.1/source/server.c login_to_server() + problem: expired date check missing - We provide this result to help developers to locate the problem faster. - To verify the result: + To verify the result, we attack the software manually: + 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. - for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376595 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1376595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380001] Re: nvidia-331-updates 331.89-0ubuntu5: nvidia-331-updates kernel module failed to build
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: nvidia-graphics-drivers-331-updates (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380001 Title: nvidia-331-updates 331.89-0ubuntu5: nvidia-331-updates kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331-updates/+bug/1380001/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376592] Re: X509 certificate verification problem
** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - During the experiment, we find that freetds-bin didn't check whether the - hostname matches the name in the SSL certificate and the expired date of - the certificate. + During the experiment, we find that freetds-bin didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate.The following is details: + 1. + file: /freetds-0.91/src/tds/net.c + problem: Hostname verification missing + + 2. + file: /freetds-0.91/src/tds/net.c + problem: Hostname verification missing To verify the result, we attack the software manually: 一.Hostname verification: 1. configure the file freetds.conf : # A typical Microsoft server [sqlserver2000] host = hackbyfun.sqlserver.com port = 1433 tds version = 8.0 encrpytion = require 2.wirte the file /etc/hosts in order to simulate DNS hijack: 10.214.146.123 hackbyfun.sqlserver.com (PS: 10.214.146.123 is a normal sql server ip, its domain name is safe.sqlserver.com ) 3.connect with freetds-bin tsql -S sqlserver2000 -U sa -P your password 4.result:connect succeed!! The fetch succeeded, indicating freetds-bin didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. the same as the above process. Run freetds-bin to connect a normal sql server 3. result :connect succeed!! The fetch succeeded again and no warning was given, indicating freetds- bin didn't check whether the certificate expired or not. (PS: I have saved the wireshark packages, and upload these files) I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376592 Title: X509 certificate verification problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/freetds/+bug/1376592/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376595] Re: X509 certificate verification problem
** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - During the experiment, we find that freetds-bin didn't check whether the + During the experiment, we find that scrollz didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate.The followind is details: 1. function: /scrollz-2.1/source/server.c login_to_server() problem: Hostname verification missing - 2. + 2. function: /scrollz-2.1/source/server.c login_to_server() problem: expired date check missing - To verify the result, we attack the software manually: 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** No longer affects: scrollz (Ubuntu) ** Summary changed: - X509 certificate verification problem + xface4-mailwatch-plugin have some SSL security problems ** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - During the experiment, we find that scrollz didn't check whether the - hostname matches the name in the SSL certificate and the expired date of - the certificate.The followind is details: + During the experiment, we find that xface4-mailwatch-plugin didn't check + whether the hostname matches the name in the SSL certificate and the + expired date of the certificate.The followind is details: 1. function: /scrollz-2.1/source/server.c login_to_server() problem: Hostname verification missing 2. function: /scrollz-2.1/source/server.c login_to_server() problem: expired date check missing To verify the result, we attack the software manually: 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376595 Title: xface4-mailwatch-plugin have some SSL security problems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xfce4-mailwatch-plugin/+bug/1376595/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380036] Re: kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme
Attached screenshot - gtk2 theme is set to redmond and you can see that the systemsettings5 (kf5) takes the theme -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380036 Title: kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380036] [NEW] kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme
Public bug reported: I am using the kubuntu next repository on kubuntu 14.10 - with the latest release of plasma 5.1. I have a bizarre issue that the kf5 applications like system-settings seem to be using the gtk2 theme set using the kde-gtk-config tool. Kde4 applications and qt4 applications correctly use the application style set. E,g, i set application style to breeze, gtk2 theme to qtcurve and gtk3 to adwaita - and i can see that systemsettings5 is using qtcurve. while konversation (kde 4) and cadence (qt4) is using breeze (qt4config shows that theme is set to desktop default). When i change the gtk2 theme to say oxygen-gtk and restart system- settings it changes themes. Changing the theme in kde application style doesn't have any effect on system settings - also i that kde 4 applications don't change themes on the fly - they need to be restarted which is different behaviour to what i had seen in the early betas of plasma next Please let me know how i can debug this issue further? Output of lsb_release -rd Description:Ubuntu Utopic Unicorn (development branch) Release:14.10 output of apt-cache policy plasma-workspace plasma-workspace: Installed: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 Candidate: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 Version table: *** 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 0 500 http://ppa.launchpad.net/kubuntu-ppa/next/ubuntu/ utopic/main amd64 Packages 100 /var/lib/dpkg/status ** Affects: ubuntu Importance: Undecided Status: New ** Attachment added: bug-theme.png https://bugs.launchpad.net/bugs/1380036/+attachment/4231366/+files/bug-theme.png ** Package changed: open-vm-tools (Ubuntu) = ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380036 Title: kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380035] [NEW] scrollz doesn't check hostanem and expired time when verifying x509 certificate
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. During the experiment, we find that scrollz didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate.The followind is details: 1. function: /scrollz-2.1/source/server.c login_to_server() problem: Hostname verification missing 2. function: /scrollz-2.1/source/server.c login_to_server() problem: expired date check missing To verify the result, we attack the software manually: 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Affects: scrollz (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security ** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - During the experiment, we find that xface4-mailwatch-plugin didn't check - whether the hostname matches the name in the SSL certificate and the - expired date of the certificate.The followind is details: + During the experiment, we find that scrollz didn't check whether the + hostname matches the name in the SSL certificate and the expired date of + the certificate.The followind is details: 1. function: /scrollz-2.1/source/server.c login_to_server() problem: Hostname verification missing 2. function: /scrollz-2.1/source/server.c login_to_server() problem: expired date check missing To verify the result, we attack the software manually: 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380035 Title: scrollz doesn't check hostanem and expired time when verifying x509 certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1380035/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376595] Re: xface4-mailwatch-plugin have some SSL security problems
** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. During the experiment, we find that xface4-mailwatch-plugin didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate.The followind is details: 1. - function: /scrollz-2.1/source/server.c login_to_server() + function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c + xfce_mailwatch_net_conn_make_secure() problem: Hostname verification missing 2. - function: /scrollz-2.1/source/server.c login_to_server() + function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c + xfce_mailwatch_net_conn_make_secure() problem: expired date check missing To verify the result, we attack the software manually: 一.Hostname verification 1. write the file /etc/hosts in order to simulate DNS hijack: 64.32.24.176 irc.mibbit.net 46.137.23.30 chat.freenode.net (PS:exchange the ip between these two irc servers) 2. connecting chat.freenode.net with scrollz /server -ssl irc.mibbit.net:6697 3. result : we connected irc.mibbit.net!! The fetch succeeded, indicating srcollz didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! The fetch succeeded again and no warning was given, indicating scrollz didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. During the experiment, we find that xface4-mailwatch-plugin didn't check whether the hostname matches the name in the SSL certificate and the expired date of the certificate.The followind is details: 1. function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c - xfce_mailwatch_net_conn_make_secure() + xfce_mailwatch_net_conn_make_secure() problem: Hostname verification missing 2. function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c - xfce_mailwatch_net_conn_make_secure() + xfce_mailwatch_net_conn_make_secure() problem: expired date check missing To verify the result, we attack the software manually: 一.Hostname verification - 1. write the file /etc/hosts in order to simulate DNS hijack: - 64.32.24.176 irc.mibbit.net - 46.137.23.30 chat.freenode.net - (PS:exchange the ip between these two irc servers) + 1.configure xface4-mailwatch-plugin: + IMAP(SSL) :imap.163.com + Username : 598105904 + Password : Your password + Advanced: Use SSL/TLS on alternate port - 2. connecting chat.freenode.net with scrollz - /server -ssl irc.mibbit.net:6697 + 2. change /etc/hosts in order to simulate the DNS hijack + 113.108.16.116imap.163.com +(113.108.16.116 is QQ’s imap server) - 3. result : we connected irc.mibbit.net!! + 3. run xfce4-mailwatch-plugin to fetch the mail - The fetch succeeded, indicating srcollz didn't check the hostname + 4. result : succeed!!! + + The fetch succeeded, indicating the software didn't check the hostname against the signee of the certificate. 二. Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run scrollz to connect a normal irc server, such as irc.mibbit.net(46.137.12.30) 3. result : connect succeed!! - The fetch succeeded again and no warning was given, indicating scrollz - didn't check whether the certificate expired or not. + The fetch succeeded again and no warning was given, indicating the + software didn't check whether the certificate expired or not. I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. ** Description changed: Recently, we are trying to find SSL security problems by static anaylsis. For example, Hostname verification is an
[Bug 779597] Re: VU meter doesn't work anymore
For me it kind of works, but the levels are insignificant, only a few pixels max (see attachment), so not useful at all. And I also suffer bug #830677, they seem to be related. ** Attachment added: pavucontrol vumeter 1.png https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/779597/+attachment/4231367/+files/pavucontrol%20vumeter%201.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/779597 Title: VU meter doesn't work anymore To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/779597/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1378617] Re: xxxterm has SSL security problems
** Description changed: - Hostname verification is an important step when verifying X509 - certificates, however, people tend to miss the step or to misunderstand - the APIs when using SSL/TLS, which might cause severe man in the middle - attack and break the entire TLS mechanism. + Recently, we are trying to find SSL security problems by static anaylsis. + For example, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. - We believe that xxxterm didn't check whether the hostname matches the - name in the SSL certificate and the expired date of the certificate. + During the experiment, we find that xxxterm didn't check whether the + hostname matches the name in the SSL certificate and the expired date of + the certificate.The followind is details: - We found the vulnerability by static analysis, typically, a process of - verification involves calling a chain of API, and we can deduce whether - the communication process is vulnerable by detecting whether the - function call process matches a certain model. For example, when using - OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null), - we should verify the certificate by calling the function - SSL_get_peer_certificate() to get the certificate. If the source code - does not match this model, then we can deduce this code is vulnerable. - What’ more , Gnutls is the same as Openssl. + 1. + file: /xxxterm-1.10.0/xxxterm.c + problem: Hostname verification missing + 2. + file: /xxxterm-1.10.0/xxxterm.c + problem: expired date check missing - This is the result for xxxterm: - /xxxterm-1.10.0/xxxterm.c have problems. - Host name verification missing + To verify the result, we attack the software manually: - We provide this result to help developers to locate the problem faster. - - - To verify the result: 一. Hostname check 1.configure /etc/hosts in order to simulate DNS hijack - 42.62.48.90 www.facebook.com - # 42.62.48.90 is the ip of i.mi.com + 42.62.48.90 www.facebook.com + # 42.62.48.90 is the ip of i.mi.com 2. visit the website https://www.facebook.com with xxxterm 3. result : connecting succeed without any warning!!! - - The fetch succeeded, indicating xxxterm didn't check the hostname against the signee of the certificate. + The fetch succeeded, indicating xxxterm didn't check the hostname + against the signee of the certificate. 二.Also for expired time check, 1. change the system time to 2200 to guarantee the certificate to be expired. 2. run xxxterm to visit any https website, such as https://www.youtube.com. 3. result : succeed without any warning!! The fetch succeeded again and no warning was given, indicating xxxterm didn't check whether the certificate expired or not. I am running xxxterm 1.11.3-1.2 in ubuntu 14.04 LTS. I have save the SSL connecting packages and upload these wireshark files. for more information about the importance of checking hostname: see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1378617 Title: xxxterm has SSL security problems To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xxxterm/+bug/1378617/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380039] [NEW] pacemaker-mgmt doesn't chekc expired time and hostname when ssl connecting
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in pacemaker-mgmt, the following is details: 1. file : /pacemaker-mgmt-2.0.0+hg1141/lib/mgmt/mgmt_tls_lib.c problem : Certificate chain verification is missing 2. file : /pacemaker-mgmt-2.0.0+hg1141/lib/mgmt/mgmt_tls_lib.c problem : Hostname verification is missing More specifically , we can take hostname check for example, the function verify_certificate() can only guarantee the validity of the certificate but cannot guarantee that the host you are trying to connect is the one you intend to visit, which may lead to man-in-the-middle attack or other security issues. And other APIs have similar problems. PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. ** Affects: pacemaker-mgmt (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380039 Title: pacemaker-mgmt doesn't chekc expired time and hostname when ssl connecting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pacemaker-mgmt/+bug/1380039/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380038] [NEW] SSL problems: doesn't check certificate chain and hostname when ssl connecting
*** This bug is a security vulnerability *** Public security bug reported: Recently, we are trying to find SSL security problems by static analysis. For example, as we all know, Hostname verification is an important step when verifying X509 certificates, however, people tend to miss the step or to misunderstand the APIs when using SSL/TLS, which might cause severe man in the middle attack and break the entire TLS mechanism. And static analysis is a way of finding whether the APIs are called correctly. Now, we find some SSL problems in pacemaker, the following is details: 1. file : /pacemaker-1.1.6/lib/common/remote.c problem : Certificate chain verification is missing 2. file : /pacemaker-1.1.6/lib/common/remote.c problem : Hostname verification is missing More specifically , we can take hostname check for example, the function verify_certificate() can only guarantee the validity of the certificate but cannot guarantee that the host you are trying to connect is the one you intend to visit, which may lead to man-in-the-middle attack or other security issues. And other APIs have similar problems. PS: for more information, you can see the paper: http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf and more details you can contact with us, my email : rainkin1...@gmail.com Thanks. ** Affects: pacemaker (Ubuntu) Importance: Undecided Status: New ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380038 Title: SSL problems: doesn't check certificate chain and hostname when ssl connecting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pacemaker/+bug/1380038/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1216385] Re: [needs-packaging] scanbd
Sander, sorry that I missed your mail. And sorry about the long time this whole thing took. The good news is that scanbd is now finally in Debian unstable and thus will become a part of the next Debian and Ubuntu release. I will likely also make periodic releases for precise in my stable PPA. There's still a lot to be done. For example, I don't have any action scripts packaged yet, mostly because I was unable to test that. People willing to test are still invited to contact me. Let's make this package great, unfortunately scanning isn't where it should be in terms of quality in FOSS. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1216385 Title: [needs-packaging] scanbd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1216385] Re: [needs-packaging] scanbd
I have a scanner with supported buttons...tell me what I need to test and I'll see what I can do. -- Mvg, Sander Devrieze. 2014-10-11 11:18 GMT+02:00 Rolf Leggewie 1216...@bugs.launchpad.net: Sander, sorry that I missed your mail. And sorry about the long time this whole thing took. The good news is that scanbd is now finally in Debian unstable and thus will become a part of the next Debian and Ubuntu release. I will likely also make periodic releases for precise in my stable PPA. There's still a lot to be done. For example, I don't have any action scripts packaged yet, mostly because I was unable to test that. People willing to test are still invited to contact me. Let's make this package great, unfortunately scanning isn't where it should be in terms of quality in FOSS. -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1216385 Title: [needs-packaging] scanbd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1216385 Title: [needs-packaging] scanbd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380041] Re: Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property'
This bug is similar to #1307622 (which is duplicate of #1300361), but in my situation USB flash had partition table. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380041 Title: Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/usb-creator/+bug/1380041/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380041] [NEW] Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property'
Public bug reported: When I'm trying to erase USB flash I'm get popup with following stack trace: org.freedesktop.DBus.Python.AttributeError: Traceback (most recent call last): File /usr/lib/python3/dist-packages/dbus/service.py, line 707, in _message_cb retval = candidate_method(self, *args, **keywords) File /usr/share/usb-creator/usb-creator-helper, line 218, in Format parent_dev = _get_parent_object(udisks, device) File /usr/share/usb-creator/usb-creator-helper, line 49, in _get_parent_object parent = partition.get_cached_property('Table').get_string() AttributeError: 'NoneType' object has no attribute 'get_cached_property' To workaround this problem I've done: 1. Remove existing partition on flash drive in GParted. 2. Create new FAT32 partition for whole flash drive in GParted. 3. Unplug/plug flash drive. 4. Start usb-creator-gtk --- Make Startup Disk now active and works. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: usb-creator-gtk 0.2.56.2 ProcVersionSignature: Ubuntu 3.13.0-35.62-generic 3.13.11.6 Uname: Linux 3.13.0-35-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 CurrentDesktop: Unity Date: Sat Oct 11 12:00:17 2014 InstallationDate: Installed on 2014-01-01 (282 days ago) InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1) SourcePackage: usb-creator UpgradeStatus: Upgraded to trusty on 2014-04-27 (166 days ago) ** Affects: usb-creator (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug trusty ** Attachment added: part of `udisks --all` output for USB flash https://bugs.launchpad.net/bugs/1380041/+attachment/4231375/+files/udisks.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380041 Title: Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/usb-creator/+bug/1380041/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313493] Re: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1
This error happened when I uninstalled mariadb for reinstalling MySQL. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313493 Title: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1313493/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313493] Re: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: mysql-5.5 (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313493 Title: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1313493/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379448] Re: Can't install or update apps on Ubuntu Touch
** Changed in: click (Ubuntu) Status: Incomplete = New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379448 Title: Can't install or update apps on Ubuntu Touch To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/click/+bug/1379448/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1253620]
(In reply to Björn Michaelsen from comment #68) Scoping this bug clearly only on the missing deps for KDE thanks to the excellent summary in comment 59. ...which has become moot with http://cgit.freedesktop.org/libreoffice/core/commit/?id=f9f9aa9873c5851da86d33ca75e937ac022206a3 Remove smb from X-KDE-Protocols lines, see http://lists.freedesktop.org/archives/libreoffice/2014-October/063904.html Re: X-KDE-Protocols=...,smb,... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1253620 Title: Can't open a LibreOffice native file via CIFS share To manage notifications about this bug go to: https://bugs.launchpad.net/df-libreoffice/+bug/1253620/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380044] [NEW] Welcome screen should be visible immediately when screen is activated
Public bug reported: When locking my device with the power button, and then activating it, I briefly see the previously-surfaced application before the welcome screen is drawn over that. What should happen is that activating the screen shows the welcome screen instantly. I suspect we need to draw the welcome screen when then button is pressed, and fade-out the screen to black. This way, the welcome screen is already in place when we turn the screen on again. ** Affects: unity8 (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380044 Title: Welcome screen should be visible immediately when screen is activated To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unity8/+bug/1380044/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1253620] Re: Can't open a LibreOffice native file via CIFS share
** Changed in: df-libreoffice Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1253620 Title: Can't open a LibreOffice native file via CIFS share To manage notifications about this bug go to: https://bugs.launchpad.net/df-libreoffice/+bug/1253620/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 503841] Re: Ktorrent uses masses of memory after some time running
Hi, I'm using Dolphin to copy at lot of files via ssh, and the process kio_file take 3.3 Gb: :~$ top -d 12 top - 11:30:20 up 18:48, 3 users, load average: 0,78, 0,97, 1,12 Tasks: 254 total, 5 running, 249 sleeping, 0 stopped, 0 zombie %Cpu(s): 11,9 us, 6,8 sy, 1,4 ni, 79,4 id, 0,3 wa, 0,0 hi, 0,2 si, 0,0 st KiB Mem: 8119100 total, 7994144 used, 124956 free,16292 buffers KiB Swap:0 total,0 used,0 free. 1392064 cached Mem PID USER PR NIVIRTRESSHR S %CPU %MEM TIME+ COMMAND 25477 guillau+ 20 0 4220264 3,549g 3248 R 7,8 45,8 25:50.39 kio_file 3997 guillau+ 20 0 4451156 243928 33660 S 2,4 3,0 38:13.63 plasma-desktop 5576 guillau+ 20 0 1146132 218772 50528 S 9,4 2,7 0:08.38 chromium-browse 9019 guillau+ 20 0 922824 201032 86284 R 12,1 2,5 18:39.11 chromium-browse 1897 root 20 0 340712 196612 47804 S 3,7 2,4 46:44.67 Xorg On Kubuntu 14.04 ** Also affects: dolphin (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/503841 Title: Ktorrent uses masses of memory after some time running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 503841] Re: Ktorrent uses masses of memory after some time running
https://bugs.kde.org/show_bug.cgi?id=284117 ** Bug watch added: KDE Bug Tracking System #284117 https://bugs.kde.org/show_bug.cgi?id=284117 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/503841 Title: Ktorrent uses masses of memory after some time running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1344535]
I second Forest's comments. The right click edits launchers feature breaks the right-button behavior I've relied on for years. I'd greatly appreciate it if this feature were removed, or some method were provided to disable it. A gui-less item in the settings editor would be sufficient. Other than this, the changes in XFCE 4.10 (as shipped in XUbuntu 14.04) are great: it's a complete, reliable, easy-to-use desktop UI. Keep up the good work! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1344535 Title: New right click edits launchers feature breaks show applications menu on desktop right click To manage notifications about this bug go to: https://bugs.launchpad.net/xfdesktop/+bug/1344535/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1358921] Re: [Acer AO 751h] Laptop requires a hard reset to recover from suspend state
Following the instructions, I couldn't identify any mailing list to send the bug report, so I email it to the maintainer of the presumable affected module who suggested me to report it to the Kernel Bug Tracker: https://bugzilla.kernel.org/show_bug.cgi?id=86031 ** Bug watch added: Linux Kernel Bug Tracker #86031 http://bugzilla.kernel.org/show_bug.cgi?id=86031 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1358921 Title: [Acer AO 751h] Laptop requires a hard reset to recover from suspend state To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1358921/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379021] Re: after utopic upgrade: boot delays for 2 minutes
Strangely, after purging teh configs of my removed packages (that still had upstart jobs on my machine) I did nto have to wait 2 mins for network while my machine booted this morning. I am hoping that this fixed state keeps repeating. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379021 Title: after utopic upgrade: boot delays for 2 minutes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1379021/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1316278] Re: Cannot change mac with --random
I confirm this is the problem, it says constantly it's the same mac, also now -A and -a are doing the same thing, changing by using -a or -A you obtain the same change to the mac, the last 24 bits remain the same. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1316278 Title: Cannot change mac with --random To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/macchanger/+bug/1316278/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374771] Re: black background in resources tab
This bug seems to be fixed in one of the last utopic updates. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374771 Title: black background in resources tab To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-system-monitor/+bug/1374771/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380046] [NEW] [AV200 - Xonar STX, playback] Loud pop when switching to headphones
Public bug reported: When switching the port to either headphone ports from the speaker port there is a loud pop in the headphones. When I am playing music through the speakers at 100% volume and then switch, I can hear the music at a very loud volume through the headphones for a fraction of a second before dropping to the proper headphones volume which is much lower. Even if I mute the output before switching ports there is still a pop although not nearly as loud. I believe this is a driver issue (oxygen/virtuoso). The Essense STX uses a relay to switch between the speaker and headphones ports. I am guessing the the power for the speaker (line out) port is much higher than that used for the headphones port and the drivers need to mute the sound at a hardware level before switching to elmininate the pop. On Windows when switching to and from speaker and headphones port the output would be muted for almost a second as the port was switched so there was no pop. On Ubuntu there is no delay when switching ports. I have looked at the driver source code and there is an anti_pop_delay of 800 milliseconds used on the Xonar init method. I think this same delay should probably be added when switching to the headphone ports. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: alsa-base 1.0.25+dfsg-0ubuntu4 ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7 Uname: Linux 3.13.0-37-generic x86_64 NonfreeKernelModules: fglrx ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 AudioDevicesInUse: USERPID ACCESS COMMAND /dev/snd/controlC2: michael 20842 F pulseaudio /dev/snd/controlC0: michael 20842 F pulseaudio /dev/snd/pcmC0D0p: michael 20842 F...m pulseaudio /dev/snd/controlC1: michael 20842 F pulseaudio CurrentDesktop: Unity Date: Sat Oct 11 22:50:15 2014 InstallationDate: Installed on 2014-10-07 (3 days ago) InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.2) PackageArchitecture: all SourcePackage: alsa-driver Symptom: audio Symptom_AlsaPlaybackTest: ALSA playback test through plughw:STX successful Symptom_Card: HD Webcam C910 - USB Device 0x46d:0x821 Symptom_PulsePlaybackTest: PulseAudio playback test successful Symptom_Type: None of the above Title: [AV200 - Xonar STX, playback] Playback problem UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 08/20/2013 dmi.bios.vendor: American Megatrends Inc. dmi.bios.version: 1401 dmi.board.asset.tag: To be filled by O.E.M. dmi.board.name: P8H77-M PRO dmi.board.vendor: ASUSTeK COMPUTER INC. dmi.board.version: Rev X.0x dmi.chassis.asset.tag: Asset-1234567890 dmi.chassis.type: 3 dmi.chassis.vendor: Chassis Manufacture dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr1401:bd08/20/2013:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnP8H77-MPRO:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion: dmi.product.name: System Product Name dmi.product.version: System Version dmi.sys.vendor: System manufacturer ** Affects: alsa-driver (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug third-party-packages trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380046 Title: [AV200 - Xonar STX, playback] Loud pop when switching to headphones To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1380046/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1377007] Re: Delay in response to user actions in Ubuntu 14.10 on cards AMD
on the kernel 3.16.0-21-generic # 28-Ubuntu SMP Mon Oct 6 16:00:43 UTC 2014 x86_64 x86_64 x86_64 GNU / Linux to normal :) - no delay/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1377007 Title: Delay in response to user actions in Ubuntu 14.10 on cards AMD To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1377007/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380045] [NEW] macchanger invalid options, -A and -a doing the same thing
Public bug reported: Hello, I am using macchanger 1.7.0-1 on Ubuntu 14.04, when I try to change the mac using -A, I get the same result as -a, the last 24 bits (serial number) are not changed even if they should be, or at least I don't see the logic of these two options. -a, --anotherSet random vendor MAC of the same kind -ASet random vendor MAC of any kind This, combined with bug 1316278, which does not allow you to randomly set a mac address, makes this program useless, and a potential security vulnerability for those who are using it to conceal their identity, and I am not talking here about wifi crackers, I am talking about dissidents, politically oppressed individual that can be easily identified as the serial number of the device is preserved. ** Affects: macchanger (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380045 Title: macchanger invalid options, -A and -a doing the same thing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/macchanger/+bug/1380045/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 33883] Re: hidden files not included in directory 'properties'
Confirmed on 14.04 too. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/33883 Title: hidden files not included in directory 'properties' To manage notifications about this bug go to: https://bugs.launchpad.net/nautilus/+bug/33883/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1315898] Re: Light-Locker not working in Lubuntu 14.04
Tested with Lubuntu 14.04 (32 bit 64 bit) up to date. I think the interaction between light-locker, xfce4-power-manager and X is quite confusing. I had to disable the screensaver for a notebook connected that plays music to an audio amplifier. It was hard to disable it... Finally I did: 1. Moved to the left (never) the screensaver buttons at light-locker-settings. Apply button. This generated: ~/.config/autostart/light-locker.desktop with this Exec line: Exec=light-locker --lock-after-screensaver=0 --no-lock-on-suspend --no- late-locking However, if I disable light-locker with light-locker-settings the Exec line has nothing Exec= I think this is a bug, because in this case light-locker runs on my system (despite the Exec=) with its defaults. ~/.config/autostart/screensaver-settings-desktop is also generated. This file controls the X screensaver settings. The Exec line says: Exec=xset s 0 dpms 0 0 0 So, the screensaver for the X will be disabled and dpms will not be applied for the screen (man xset). 2. Move to the left (never) the screensaver buttons (OnAC/Screen, OnBattery/Screen) at xfce4-power-manager-settings === If I don't make this second step, screensaver continues to working and the screen is also locked. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1315898 Title: Light-Locker not working in Lubuntu 14.04 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/light-locker/+bug/1315898/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370859] Re: Error! Bad return status for module build on kernel: 3.16.0-16-generic (x86_64)
Still getting that error: cd /var/lib/dkms/nvidia-331/331.89/build; make module SYSSRC=/lib/modules/3.16.0-22-generic/build SYSOUT=/lib/modules/3.16.0-22-generic/build KBUILD_EXTMOD=/var/lib/dkms/nvidia-331/331.89/build make[1]: Entering directory '/var/lib/dkms/nvidia-331/331.89/build' NVIDIA: calling KBUILD... make[2]: Entering directory '/usr/src/linux-headers-3.16.0-22-generic' test -e include/generated/autoconf.h -a -e include/config/auto.conf || ( \ echo 2; \ echo 2 ERROR: Kernel configuration is invalid.; \ echo 2 include/generated/autoconf.h or include/config/auto.conf are missing.;\ echo 2 Run 'make oldconfig make prepare' on kernel src to fix it.; \ echo 2 ; Could not this be fixed ? That issue is met by many users. Devtalk: https://devtalk.nvidia.com/default/topic/769055/dkms-fails-to- compile-nvidia-modules-340-32-343-13-during-kernel-3-16-1-compile- process-on-debia/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370859 Title: Error! Bad return status for module build on kernel: 3.16.0-16-generic (x86_64) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1370859/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 503841] Re: kio_file uses masses of memory after some time running
I have created a new bug, because I'm not sure the the link at #3 is the same. https://bugs.kde.org/show_bug.cgi?id=339871 ** Summary changed: - Ktorrent uses masses of memory after some time running + kio_file uses masses of memory after some time running ** Bug watch added: KDE Bug Tracking System #339871 https://bugs.kde.org/show_bug.cgi?id=339871 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/503841 Title: kio_file uses masses of memory after some time running To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1306917] Re: light-locker: screen always automatically locked
I think the interaction between light-locker, xfce4-power-manager and X is quite confusing. Please see https://bugs.launchpad.net/ubuntu/+source/light- locker/+bug/1315898/comments/9 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1306917 Title: light-locker: screen always automatically locked To manage notifications about this bug go to: https://bugs.launchpad.net/light-locker-settings/+bug/1306917/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379431] Re: Eclipse crashes very often because of problems with GTK
see https://bugs.eclipse.org/bugs/show_bug.cgi?id=430736 ** Bug watch added: Eclipse bugs #430736 https://bugs.eclipse.org/bugs/show_bug.cgi?id=430736 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379431 Title: Eclipse crashes very often because of problems with GTK To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/eclipse/+bug/1379431/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
Re: [Bug 1265192] Re: Install/reinstall wipes out all/other partitions
+1 for what @Bruno said. The before after is definitely a good idea. Will it be very hard to put in considering it was once a part of the installer? On Sat, Oct 11, 2014 at 12:39 AM, Bruno Nova 1265...@bugs.launchpad.net wrote: In my humble opinion, besides fixing the OS detection and ambiguous labels, a final confirmation step should be added after the simple/advanced partitioning step (like others have suggested). That step should detail the partitioning changes and warn the user that clicking Install Now will write the changes to disk and ask for confirmation. Something like the Ubuntu installer used to have: http://linux4us.org/images/ubuntu_8.10/install7.png It could also display the before and after disk(s) partitions in that step, or before in the simple partitioning step like it used to: http://www.dedoimedo.com/images/computers_new_1/ubuntu-install- partitioning.jpg The older versions of the Ubuntu installer made a better job here. -- You received this bug notification because you are subscribed to the bug report. https://bugs.launchpad.net/bugs/1265192 Title: Install/reinstall wipes out all/other partitions Status in elementary OS: Triaged Status in “ubiquity” package in Ubuntu: Confirmed Status in “ubuntu-livecd-image” package in Ubuntu: Confirmed Status in “ubiquity” source package in Trusty: Triaged Status in “ubuntu-livecd-image” source package in Trusty: Confirmed Bug description: Brand new Samsung laptop with UEFI. I had installed 13.04 Ubuntu but on reboot I never saw the 'grub' style menu. It just kept going into Windows 8.1. So I got the 13.10 version (64 bit) and choose Reinstall Ubuntu (That may not be the exact text) It removed all the partiions including the recovery partitions. I do have a backup for the windows install, but I was very surprised that this happened. On a positive note I now have Ububtu up and running on my machine. This is not my first time with Ubuntu. I have installed Ubuntu alongside WinXp, Vista and Windows 7. I've used Ubuntu desktop for over 6 years. If you would like me to try something to replicate this. .. I could shrink my existing partion make another one - reinstall and see if it whacks that one. I can do this now .. I'm still moving into this laptop so starting over is not so bad. Steve Devine To manage notifications about this bug go to: https://bugs.launchpad.net/elementaryos/+bug/1265192/+subscriptions -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1265192 Title: Install/reinstall wipes out all/other partitions To manage notifications about this bug go to: https://bugs.launchpad.net/elementaryos/+bug/1265192/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1296487] Re: Initial zoom level is slightly under 100%
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: ubuntu-themes (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1296487 Title: Initial zoom level is slightly under 100% To manage notifications about this bug go to: https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1296487] Re: Initial zoom level is slightly under 100%
Status changed to 'Confirmed' because the bug affects multiple users. ** Changed in: ubuntu-themes (Ubuntu) Status: New = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1296487 Title: Initial zoom level is slightly under 100% To manage notifications about this bug go to: https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1296487] Re: Initial zoom level is slightly under 100%
** Package changed: light-themes (Ubuntu) = ubuntu-themes (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1296487 Title: Initial zoom level is slightly under 100% To manage notifications about this bug go to: https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 874283]
Issue still present using Ubuntu 14.04. While this may be related to a wrong behaviour from the server side it works flawlessly using pidgin. Related launchpad bug: https://bugs.launchpad.net/ubuntu/+source /telepathy-gabble/+bug/874283 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/874283 Title: Empathy IM Client does not connect to Zimbra via XMPP To manage notifications about this bug go to: https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 727041] Re: unity-window-decorator crashed with SIGSEGV in g_closure_invoke()
It seems to have resurfaced in 14.10. Mine crashes on boot, then restores itself. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/727041 Title: unity-window-decorator crashed with SIGSEGV in g_closure_invoke() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/compiz/+bug/727041/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 874283]
And may be related or duplicate of this as well: https://bugs.freedesktop.org/show_bug.cgi?id=39931 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/874283 Title: Empathy IM Client does not connect to Zimbra via XMPP To manage notifications about this bug go to: https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380051] [NEW] characters in svg images wiggle
Public bug reported: When zooming an SVG image that contains texts, the positions of characters wiggle. The characters move sidewards closer together or farer away, as if the kerning would be different at every zoom level. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: eog 3.10.2-0ubuntu5 ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4 Uname: Linux 3.13.0-32-generic x86_64 ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 CurrentDesktop: Unity Date: Sat Oct 11 12:51:15 2014 EcryptfsInUse: Yes InstallationDate: Installed on 2014-02-02 (250 days ago) InstallationMedia: Ubuntu-GNOME 14.04 Trusty Tahr - Alpha amd64 (20140201) SourcePackage: eog UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: eog (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug third-party-packages trusty ** Attachment added: video showing the issue https://bugs.launchpad.net/bugs/1380051/+attachment/4231424/+files/eog-svg-text.mp4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380051 Title: characters in svg images wiggle To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/eog/+bug/1380051/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380050] [NEW] Ubuntu boots to a black screen
Public bug reported: Ubuntu boots to a black screen. I can hear the opening chimes, but I cannot see anything until I switch my screen off and on again. Then I can see the login screen. ProblemType: Bug DistroRelease: Ubuntu 14.04 Package: xorg 1:7.7+1ubuntu8 ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6 Uname: Linux 3.13.0-36-generic x86_64 .tmp.unity.support.test.0: ApportVersion: 2.14.1-0ubuntu3.5 Architecture: amd64 CompizPlugins: No value set for `/apps/compiz-1/general/screen0/options/active_plugins' CompositorRunning: compiz CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0' CompositorUnredirectFSW: true Date: Sat Oct 11 12:49:21 2014 DistUpgraded: Fresh install DistroCodename: trusty DistroVariant: ubuntu ExtraDebuggingInterest: Yes, if not too technical GraphicsCard: Advanced Micro Devices, Inc. [AMD/ATI] RV610 [Radeon HD 2400 PRO] [1002:94c3] (prog-if 00 [VGA controller]) Subsystem: Micro-Star International Co., Ltd. [MSI] Device [1462:1041] InstallationDate: Installed on 2014-09-26 (14 days ago) InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.2) MachineType: HP-Pavilion KA869AA-ABZ a6335.it ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-36-generic root=/dev/mapper/ubuntu--vg-root ro plymouth:debug drm.debug=0xe SourcePackage: xorg UpgradeStatus: No upgrade log present (probably fresh install) dmi.bios.date: 10/29/2007 dmi.bios.vendor: Phoenix Technologies, LTD dmi.bios.version: 5.13 dmi.board.name: NARRA2 dmi.board.vendor: ASUSTek Computer INC. dmi.board.version: 2.00 dmi.chassis.type: 3 dmi.chassis.vendor: Hewlett-Packard dmi.chassis.version: Chassis Version dmi.modalias: dmi:bvnPhoenixTechnologies,LTD:bvr5.13:bd10/29/2007:svnHP-Pavilion:pnKA869AA-ABZa6335.it:pvr:rvnASUSTekComputerINC.:rnNARRA2:rvr2.00:cvnHewlett-Packard:ct3:cvrChassisVersion: dmi.product.name: KA869AA-ABZ a6335.it dmi.sys.vendor: HP-Pavilion version.compiz: compiz 1:0.9.11.2+14.04.20140714-0ubuntu1 version.ia32-libs: ia32-libs N/A version.libdrm2: libdrm2 2.4.52-1 version.libgl1-mesa-dri: libgl1-mesa-dri 10.1.3-0ubuntu0.1 version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A version.libgl1-mesa-glx: libgl1-mesa-glx 10.1.3-0ubuntu0.1 version.xserver-xorg-core: xserver-xorg-core 2:1.15.1-0ubuntu2.1 version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.8.2-1ubuntu2 version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.3.0-1ubuntu3.1 version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.910-0ubuntu1.1 version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.10-1ubuntu2 xserver.bootTime: Sat Oct 11 12:48:11 2014 xserver.configfile: default xserver.devices: inputPower Button KEYBOARD, id 6 inputPower Button KEYBOARD, id 7 inputMLK Trust Keyboard 14909 KEYBOARD, id 8 inputMLK Trust Keyboard 14909 KEYBOARD, id 9 xserver.errors: xserver.logfile: /var/log/Xorg.0.log xserver.version: 2:1.15.1-0ubuntu2.1 xserver.video_driver: radeon ** Affects: xorg (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-bug compiz-0.9 trusty ubuntu -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380050 Title: Ubuntu boots to a black screen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1380050/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 874283] Re: Empathy IM Client does not connect to Zimbra via XMPP
** Bug watch added: freedesktop.org Bugzilla #39931 https://bugs.freedesktop.org/show_bug.cgi?id=39931 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/874283 Title: Empathy IM Client does not connect to Zimbra via XMPP To manage notifications about this bug go to: https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379965] Re: linking error with cmake
Sorry about this - seems it may be a problem with the static library I was using. Will do some more investigation before re-reporting. ** Changed in: opencv (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379965 Title: linking error with cmake To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opencv/+bug/1379965/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 859560] Re: Gedit line number margin doesn't scale with font size
I can confirm the Gedit line number does not scale with font size problem reported by Paul Duke. This is a serious issue that forces me to keep a magnifying glass by my machine when I work. There has been insensitivity to this problem. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/859560 Title: Gedit line number margin doesn't scale with font size To manage notifications about this bug go to: https://bugs.launchpad.net/gedit/+bug/859560/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380053] [NEW] package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5
Public bug reported: This just happened when trying to upgrade on utopic ProblemType: Package DistroRelease: Ubuntu 14.10 Package: nvidia-prime 0.6.6 ProcVersionSignature: Ubuntu 3.16.0-21.28-generic 3.16.4 Uname: Linux 3.16.0-21-generic x86_64 NonfreeKernelModules: nvidia ApportVersion: 2.14.7-0ubuntu5 Architecture: amd64 Date: Sat Oct 11 11:58:01 2014 DuplicateSignature: package:nvidia-prime:0.6.6:subprocess new pre-removal script returned error exit status 5 ErrorMessage: subprocess new pre-removal script returned error exit status 5 InstallationDate: Installed on 2014-06-24 (108 days ago) InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417) SourcePackage: nvidia-prime Title: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5 UpgradeStatus: No upgrade log present (probably fresh install) ** Affects: nvidia-prime (Ubuntu) Importance: Undecided Status: New ** Tags: amd64 apport-package utopic -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380053 Title: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1380053/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1251469] Re: Update Extreme Tux Racer package to new 0.6 version
** Summary changed: - [Create Package] Extreme Tux Racer 0.6 (New version) + Update Extreme Tux Racer package to new 0.6 version ** Also affects: extremetuxracer (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1251469 Title: Update Extreme Tux Racer package to new 0.6 version To manage notifications about this bug go to: https://bugs.launchpad.net/getdeb.net/+bug/1251469/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380053] Re: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5
** Tags removed: need-duplicate-check -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380053 Title: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1380053/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1378245] Re: citrain could use a more accurate way to upgrade from silos
How much effort would it be to actually build pristine images per silo that contain the packages in the silo? Each time we have to make the images writable and add silo ppa's manually and run apt-get we effectively taint the testing results as they don't match the state that a released image would have. Simple case: as the root is made writable we would not catch the situation where a component is actually depending on write access which would not be possible under ro root. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1378245 Title: citrain could use a more accurate way to upgrade from silos To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/phablet-tools/+bug/1378245/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1380054] Re: On mako, when you have a big circle about activity in a day, it's show in the pin unlock screen
** Attachment added: 2.png https://bugs.launchpad.net/ubuntu/+source/unity-greeter/+bug/1380054/+attachment/4231436/+files/2.png -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1380054 Title: On mako, when you have a big circle about activity in a day, it's show in the pin unlock screen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unity-greeter/+bug/1380054/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs