[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.

2014-10-11 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/utopic-proposed/neutron

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1379779

Title:
  neutron-openvswitch-agent fails to apply iptables rules - Set
  IPv4cf55331e-3b18-488d-8 doesn't exist.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.

2014-10-11 Thread Launchpad Bug Tracker
This bug was fixed in the package neutron - 1:2014.2~rc2-0ubuntu1

---
neutron (1:2014.2~rc2-0ubuntu1) utopic; urgency=medium

  * New upstream release candidate:
- d/p/*: Refresh.
  * Fixup optimized iptables management by l2 daemons (LP: #1379779):
- d/neutron-common.install: Install ipset-firewall.filters to support
  use of ipset to optimize firewall rulebase management.
- d/control: Add ipset to Depends of neutron-common.
  * d/watch: Only match versions starting with digits.
 -- James Page james.p...@ubuntu.com   Fri, 10 Oct 2014 15:13:44 +0100

** Changed in: neutron (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to neutron in Ubuntu.
https://bugs.launchpad.net/bugs/1379779

Title:
  neutron-openvswitch-agent fails to apply iptables rules - Set
  IPv4cf55331e-3b18-488d-8 doesn't exist.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380036] [NEW] kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

2014-10-11 Thread Bharat Rajagopalan
Public bug reported:

I am using the kubuntu next repository on kubuntu 14.10 - with  the
latest release of plasma 5.1. I have a bizarre issue that the kf5
applications like system-settings seem to be using the gtk2 theme set
using the kde-gtk-config tool.  Kde4 applications and qt4 applications
correctly use the application style set.

E,g, i set application style to breeze, gtk2 theme to qtcurve and gtk3
to adwaita - and i can see that systemsettings5 is using qtcurve. while
konversation (kde 4)  and cadence (qt4) is using breeze (qt4config shows
that theme is set to desktop default).

When i change the gtk2 theme to say oxygen-gtk and restart system-
settings it changes themes.

Changing the theme in kde application style doesn't have any effect on
system settings - also i that kde 4 applications don't change themes on
the fly - they need to be restarted which is different behaviour to what
i had seen in the early betas of plasma next

Please let me know how i can debug this issue further?

Output of lsb_release -rd

Description:Ubuntu Utopic Unicorn (development branch)
Release:14.10

output of apt-cache policy plasma-workspace

plasma-workspace:
  Installed: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4
  Candidate: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4
  Version table:
 *** 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 0
500 http://ppa.launchpad.net/kubuntu-ppa/next/ubuntu/ utopic/main amd64 
Packages
100 /var/lib/dpkg/status

** Affects: ubuntu
 Importance: Undecided
 Status: New

** Attachment added: bug-theme.png
   
https://bugs.launchpad.net/bugs/1380036/+attachment/4231366/+files/bug-theme.png

** Package changed: open-vm-tools (Ubuntu) = ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to open-vm-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1380036

Title:
  kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380038] [NEW] SSL problems: doesn't check certificate chain and hostname when ssl connecting

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static
analysis. For example, as we all know, Hostname verification is an
important step when verifying X509 certificates, however, people tend to
miss the step or to misunderstand the APIs when using SSL/TLS, which
might cause severe man in the middle attack and break the entire TLS
mechanism. And static analysis is a way of finding whether the APIs are
called correctly.

Now, we find some SSL problems in pacemaker, the following is details:

1.
file :  /pacemaker-1.1.6/lib/common/remote.c 
problem : Certificate chain verification is missing

2.
file : /pacemaker-1.1.6/lib/common/remote.c
problem : Hostname verification is missing

More specifically , we can take hostname check for example, the function
verify_certificate() can only guarantee the validity of the certificate
but cannot guarantee that the host you are trying to connect is the one
you intend to visit, which may lead to man-in-the-middle attack or other
security issues. And other APIs have similar problems.

PS: for more information, you can see the paper: 
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
and more details you can contact with us, my email : rainkin1...@gmail.com

Thanks.

** Affects: pacemaker (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to pacemaker in Ubuntu.
https://bugs.launchpad.net/bugs/1380038

Title:
  SSL problems: doesn't check certificate chain and hostname when ssl
  connecting

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pacemaker/+bug/1380038/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380080] [NEW] Cannot make directory '/var/run/screen': Permission denied (convert init to upstart)

2014-10-11 Thread Bob Ballister
Public bug reported:

Same problem as bug #574773 but happening on Ubuntu 14.04 Trusty Tahr.

It looks like the upstart script was removed and there is an /etc/init.d
script that just doesn't work properly.

It can be fixed by copying the upstart script from 12.04.

** Affects: screen (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to screen in Ubuntu.
https://bugs.launchpad.net/bugs/1380080

Title:
  Cannot make directory '/var/run/screen': Permission denied (convert
  init to upstart)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380080/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] [NEW] SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-11 Thread Nathaniel Homier
Public bug reported:

I expect that when using key based authentication I do $ssh user@0.0.0.0 I 
expect to be asked for the key password.  Instead I get Agent admitted failure 
to sign using the key.
Permission denied (publickey).

Using SSH_AUTH_SOCK=0 solves the problem allowing me to be asked for the
key password.

What should happen is that I should not have to specify SSH_AUTH_SOCK=0
on the CLI, I should only have to type $ user@0.0.0.0

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: openssh-client 1:6.6p1-2ubuntu2
ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7
Uname: Linux 3.13.0-37-generic i686
NonfreeKernelModules: wl
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: i386
CurrentDesktop: Unity
Date: Sat Oct 11 07:19:08 2014
EcryptfsInUse: Yes
InstallationDate: Installed on 2014-09-08 (33 days ago)
InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release i386 (20140722.2)
ProcEnviron:
 LANGUAGE=en_US
 PATH=(custom, no user)
 XDG_RUNTIME_DIR=set
 LANG=en_US.UTF-8
 SHELL=/bin/bash
RelatedPackageVersions:
 ssh-askpass   N/A
 libpam-sshN/A
 keychain  N/A
 ssh-askpass-gnome 1:6.6p1-2ubuntu2
SSHClientVersion: OpenSSH_6.6.1p1 Ubuntu-2ubuntu2, OpenSSL 1.0.1f 6 Jan 2014
SourcePackage: openssh
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: openssh (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apport-bug i386 trusty

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380099] Re: smbd crashed with SIGABRT in dump_core()

2014-10-11 Thread Apport retracing service
*** This bug is a duplicate of bug 1295518 ***
https://bugs.launchpad.net/bugs/1295518

Thank you for taking the time to report this crash and helping to make
this software better.  This particular crash has already been reported
and is a duplicate of bug #1295518, so is being marked as such.  Please
look at the other bug report to see if there is any missing information
that you can provide, or to see if there is a workaround for the bug.
Additionally, any further discussion regarding the bug should occur in
the other report.  Please continue to report any other bugs you may
find.

** Attachment removed: CoreDump.gz
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231618/+files/CoreDump.gz

** Attachment removed: Disassembly.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231620/+files/Disassembly.txt

** Attachment removed: ProcMaps.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231621/+files/ProcMaps.txt

** Attachment removed: ProcStatus.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231622/+files/ProcStatus.txt

** Attachment removed: Registers.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231623/+files/Registers.txt

** Attachment removed: Stacktrace.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231626/+files/Stacktrace.txt

** Attachment removed: ThreadStacktrace.txt
   
https://bugs.launchpad.net/bugs/1380099/+attachment/4231627/+files/ThreadStacktrace.txt

** This bug has been marked a duplicate of private bug 1295518

** Information type changed from Private to Public

** Tags removed: need-amd64-retrace

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1380099

Title:
  smbd crashed with SIGABRT in dump_core()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1380099/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1379761] Re: Asset compression does not happen unless debug mode is enabled

2014-10-11 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: horizon (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to horizon in Ubuntu.
https://bugs.launchpad.net/bugs/1379761

Title:
  Asset compression does not happen unless debug mode is enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/horizon/+bug/1379761/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380150] [NEW] novaclient: security groups, should fail when creating security groups with duplicate name

2014-10-11 Thread Behzad
Public bug reported:

When creating a security group using the novaclient.security_groups
create API, there is not check which avoids creating security group if
one already exist. This later on poses a problem when trying to delete,
find the security group, which results in a NoUniqueMatch exception as
below.

It would be better if the API returned an error when creating a security
group with the same name.

   
==
ERROR: test_network_scenarios (__main__.NetworkScenarioTest)
--
Traceback (most recent call last):
  File /home/xyz/code/install_oct10/pns/vmtp.py, line 359, in tearDown
self.comp.security_group_delete()
  File /home/xyz/code/install_oct10/pns/compute.py, line 183, in 
security_group_delete
group = 
self.novaclient.security_groups.find(name=self.config.security_group_name)
  File /home/xyz/env/env1/lib/python2.7/site-packages/novaclient/base.py, 
line 140, in find
raise exceptions.NoUniqueMatch
NoUniqueMatch

** Affects: python-novaclient (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to python-novaclient in Ubuntu.
https://bugs.launchpad.net/bugs/1380150

Title:
  novaclient: security groups, should fail when creating security groups
  with duplicate name

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-novaclient/+bug/1380150/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380164] Re: screen crashed when trying to split via terminal control sequence

2014-10-11 Thread Jarno Malmari
** Information type changed from Private to Public

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to screen in Ubuntu.
https://bugs.launchpad.net/bugs/1380164

Title:
  screen crashed when trying to split via terminal control sequence

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380164] Re: screen crashed when trying to split via terminal control sequence

2014-10-11 Thread Axel Beckert
This is likely fixed in 4.2.1-2 in Utopic. At least I can't reproduce it
anymore on Debian Testing with 4.2.1-2. It's likely that this had been
fixed upstream with either 4.2.0 or 4.2.1.

** Changed in: screen (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to screen in Ubuntu.
https://bugs.launchpad.net/bugs/1380164

Title:
  screen crashed when trying to split via terminal control sequence

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/screen/+bug/1380164/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-11 Thread Nathaniel Homier
** Attachment added: ssh_config.local
   
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+attachment/4231875/+files/ssh_config.local

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-11 Thread Nathaniel Homier
** Attachment added: sshd_config.remote
   
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+attachment/4231905/+files/sshd_config.remote

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380084] Re: SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't use key auth without SSH_AUTH_SOCK=0

2014-10-11 Thread Nathaniel Homier
Happens with all SSH commands such as scp and sftp.  This also means
that I can't use the file explorer called files to connect to remote
file systems.  sftp will not work in the files browser because there is
no way to tell files to use SSH_AUTH_SOCK=0

So I can not browse remote files in the file explorer as if they were
local.  I'm talking about the GUI file explorer.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1380084

Title:
  SSH client requires SSH_AUTH_SOCK=0 will not work without it, can't
  use key auth without SSH_AUTH_SOCK=0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1380084/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1336555] Re: ovs-vswitchd segfault every 2 days

2014-10-11 Thread gadLinux
After updating kernel in ubuntu 14.04 I found this again. But this time
with kernel panic.


ct 12 00:56:30 red-compute kernel: [ 2139.850867] ovs-vswitchd[19280]: segfault 
at 0 ip 00459340 sp 7fff2d88c3e8 error 4 in 
ovs-vswitchd[40+133000]
Oct 12 00:56:31 red-compute ovs-vswitchd: ovs|00010|daemon(monitor)|ERR|7 
crashes: pid 19280 died, killed (Segmentation fault), core dumped, restarting
Oct 12 00:57:01 red-compute CRON[19736]: (root) CMD (if [ -x 
/usr/share/mdadm/checkarray ]  [ $(date +%d) -le 7 ]; then 
/usr/share/mdadm/checkarray --cron --all --idle --quiet; fi)
Oct 12 00:58:28 red-compute ovsdb-client: 
ovs|1|fatal_signal|WARN|terminating with signal 15 (Terminated)
Oct 12 00:58:34 red-compute kernel: [ 2264.419340] init: 
neutron-plugin-openvswitch-agent main process (14411) killed by KILL signal
Oct 12 00:58:56 red-compute kernel: [ 2286.159789] INFO: task jbd2/rbd1-8:10184 
blocked for more than 120 seconds.
Oct 12 00:58:56 red-compute kernel: [ 2286.159802]   Tainted: PW  
OX 3.13.0-37-generic #64-Ubuntu
Oct 12 00:58:56 red-compute kernel: [ 2286.159807] echo 0  
/proc/sys/kernel/hung_task_timeout_secs disables this message.
Oct 12 00:58:56 red-compute kernel: [ 2286.159812] jbd2/rbd1-8 D 
88032fc54480 0 10184  2 0x
Oct 12 00:58:56 red-compute kernel: [ 2286.159822]  88029baadbc8 
0046 8802d1ac8000 88029baadfd8
Oct 12 00:58:56 red-compute kernel: [ 2286.159832]  00014480 
00014480 8802d1ac8000 88032fc54d18
Oct 12 00:58:56 red-compute kernel: [ 2286.159840]  88032ffb1020 
0002 811ee820 88029baadc40
Oct 12 00:58:56 red-compute kernel: [ 2286.159847] Call Trace:
Oct 12 00:58:56 red-compute kernel: [ 2286.159864]  [811ee820] ? 
generic_block_bmap+0x50/0x50
Oct 12 00:58:56 red-compute kernel: [ 2286.159875]  [8172344d] 
io_schedule+0x9d/0x140
Oct 12 00:58:56 red-compute kernel: [ 2286.159884]  [811ee82e] 
sleep_on_buffer+0xe/0x20
Oct 12 00:58:56 red-compute kernel: [ 2286.159892]  [817238d2] 
__wait_on_bit+0x62/0x90
Oct 12 00:58:56 red-compute kernel: [ 2286.159899]  [811ee820] ? 
generic_block_bmap+0x50/0x50
Oct 12 00:58:56 red-compute kernel: [ 2286.159907]  [81723977] 
out_of_line_wait_on_bit+0x77/0x90
Oct 12 00:58:56 red-compute kernel: [ 2286.159916]  [810ab010] ? 
autoremove_wake_function+0x40/0x40
Oct 12 00:58:56 red-compute kernel: [ 2286.159924]  [811efb5a] 
__wait_on_buffer+0x2a/0x30
Oct 12 00:58:56 red-compute kernel: [ 2286.159933]  [812888f0] 
jbd2_journal_commit_transaction+0xee0/0x1a70
Oct 12 00:58:56 red-compute kernel: [ 2286.159943]  [810754ff] ? 
try_to_del_timer_sync+0x4f/0x70
Oct 12 00:58:56 red-compute kernel: [ 2286.159951]  [8128d4ad] 
kjournald2+0xbd/0x250
Oct 12 00:58:56 red-compute kernel: [ 2286.159959]  [810aafd0] ? 
prepare_to_wait_event+0x100/0x100
Oct 12 00:58:56 red-compute kernel: [ 2286.159967]  [8128d3f0] ? 
commit_timeout+0x10/0x10
Oct 12 00:58:56 red-compute kernel: [ 2286.159974]  [8108b492] 
kthread+0xd2/0xf0
Oct 12 00:58:56 red-compute kernel: [ 2286.159981]  [8108b3c0] ? 
kthread_create_on_node+0x1c0/0x1c0
Oct 12 00:58:56 red-compute kernel: [ 2286.159988]  [8172f77c] 
ret_from_fork+0x7c/0xb0
Oct 12 00:58:56 red-compute kernel: [ 2286.159995]  [8108b3c0] ? 
kthread_create_on_node+0x1c0/0x1c0
Oct 12 00:58:56 red-compute kernel: [ 2286.160016] INFO: task init:10493 
blocked for more than 120 seconds.
Oct 12 00:58:56 red-compute kernel: [ 2286.160022]   Tainted: PW  
OX 3.13.0-37-generic #64-Ubuntu
Oct 12 00:58:56 red-compute kernel: [ 2286.160025] echo 0  
/proc/sys/kernel/hung_task_timeout_secs disables this message.
Oct 12 00:58:56 red-compute kernel: [ 2286.160028] initD 
88032fc94480 0 10493  10443 0x
Oct 12 00:58:56 red-compute kernel: [ 2286.160036]  8802eae2da28 
0082 8802b37a3000 8802eae2dfd8
Oct 12 00:58:56 red-compute kernel: [ 2286.160043]  00014480 
00014480 8802b37a3000 88032fc94d18
Oct 12 00:58:56 red-compute kernel: [ 2286.160050]  88032ffb7908 
0002 812851c0 8802eae2daa0
Oct 12 00:58:56 red-compute kernel: [ 2286.160057] Call Trace:
Oct 12 00:58:56 red-compute kernel: [ 2286.160066]  [812851c0] ? 
start_this_handle+0x590/0x590
Oct 12 00:58:56 red-compute kernel: [ 2286.160074]  [8172344d] 
io_schedule+0x9d/0x140
Oct 12 00:58:56 red-compute kernel: [ 2286.160081]  [812851ce] 
sleep_on_shadow_bh+0xe/0x20
Oct 12 00:58:56 red-compute kernel: [ 2286.160088]  [817238d2] 
__wait_on_bit+0x62/0x90
Oct 12 00:58:56 red-compute kernel: [ 2286.160095]  [812851c0] ? 
start_this_handle+0x590/0x590
Oct 12 00:58:56 red-compute kernel: [ 2286.160103]  [81723977] 
out_of_line_wait_on_bit+0x77/0x90
Oct 12 00:58:56 red-compute kernel: [ 

[Bug 1336555] Re: ovs-vswitchd segfault every 2 days

2014-10-11 Thread gadLinux
ovs-vsctl (Open vSwitch) 2.0.2
Compiled Aug 15 2014 14:31:02
 
I did:
apport-collect 1336555
Package openvswitch not installed and no hook available, ignoring

But no luck.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openvswitch in Ubuntu.
https://bugs.launchpad.net/bugs/1336555

Title:
  ovs-vswitchd segfault every 2 days

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openvswitch/+bug/1336555/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1320074] Re: maas-import-pxe fails to catch comms errors when downloading UEFI shim and TBs instead

2014-10-11 Thread Lightman
giving me a syntax error near unexpected token '('

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to maas in Ubuntu.
https://bugs.launchpad.net/bugs/1320074

Title:
  maas-import-pxe fails to catch comms errors when downloading UEFI shim
  and TBs instead

To manage notifications about this bug go to:
https://bugs.launchpad.net/maas/+bug/1320074/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1230917] Re: php5-fpm logrotate errors after package switched to upstart

2014-10-11 Thread Michael Heuberger
Having this issue here too.  So, been reading through your comments but
what now?

Will a bugfix come out soon? If not, what's the recommended, temporary,
workaround??

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1380006] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

2014-10-11 Thread starkus
Public bug reported:

error through upgrading from 14.04 to 14.10 without having had purged
some ppa i guess...

ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: nvidia-331 331.89-0ubuntu5
ProcVersionSignature: Ubuntu 3.16.0-21.28-generic 3.16.4
Uname: Linux 3.16.0-21-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.7-0ubuntu5
Architecture: amd64
DKMSKernelVersion: 3.16.0-22-generic
Date: Sat Oct 11 07:45:47 2014
InstallationDate: Installed on 2014-08-23 (48 days ago)
InstallationMedia: Ubuntu-GNOME 14.04.1 LTS Trusty Tahr - Release amd64 
(20140722.2)
PackageVersion: 331.89-0ubuntu5
SourcePackage: nvidia-graphics-drivers-331
Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
UpgradeStatus: Upgraded to utopic on 2014-10-11 (0 days ago)

** Affects: nvidia-graphics-drivers-331 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package utopic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380006

Title:
  nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380006/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 632984] Re: libwx_gtk2u_media-2.8.so.0 missing from libwxgtk2.8-0

2014-10-11 Thread pfffff___
Hello,
I read (and maybe understand) than this bug is fixed. Thank you for fix it... 
can i profit this fix, and how to do ? (please)
OK... so, for me (ubuntu-12.04), when i use wxpython-2.6.x with python-2.7, 
this not works at all.
So... i not said the bug is not fixed, i said that i don't know (and nothing is 
explain here) how to be able to see it runing (and use the wx.media and 
mediaCtrl implemented).
If there is a generous and sympathic user who know and want to tell me what i 
can do for make it runing, i will be very happy.
I just would like to use wxpython and its wx.media runing fine (if it is 
possible).

thank you for share more information for beginners on ubuntu/linux style
plateform.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/632984

Title:
  libwx_gtk2u_media-2.8.so.0 missing from libwxgtk2.8-0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wxwidgets2.8/+bug/632984/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380009] [NEW] package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another ve

2014-10-11 Thread kevin lowrie
Public bug reported:

/boot mounted (ro)

issued ' mount -o remount,rw /boot' in another terminal and reran 'apt-
get -f install'

all is wonderful with this great OS! Keep up the good work :)

ProblemType: Package
DistroRelease: Ubuntu 14.04
Package: linux-image-3.13.0-38-generic (not installed)
ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7
Uname: Linux 3.13.0-37-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  klowrie4910 F pulseaudio
Date: Sat Oct 11 00:12:15 2014
DuplicateSignature: package:linux-image-3.13.0-38-generic:(not 
installed):unable to clean up mess surrounding 
`./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only 
file system
ErrorMessage: unable to clean up mess surrounding 
`./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only 
file system
InstallationDate: Installed on 2014-04-29 (164 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Beta amd64+mac (20140326)
MachineType: Dell Inc. Dell System XPS L322X
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-37-generic 
root=/dev/mapper/ubuntu--vg-root ro quiet splash
PulseList: Error: command ['pacmd', 'list'] failed with exit code 1: No 
PulseAudio daemon running, or not running as session daemon.
RelatedPackageVersions: grub-pc 2.02~beta2-9ubuntu1
SourcePackage: linux
Title: package linux-image-3.13.0-38-generic (not installed) failed to 
install/upgrade: unable to clean up mess surrounding 
`./boot/vmlinuz-3.13.0-38-generic' before installing another version: Read-only 
file system
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 04/18/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A08
dmi.board.name: 0PJHXN
dmi.board.vendor: Dell Inc.
dmi.board.version: A00
dmi.chassis.asset.tag: 00
dmi.chassis.type: 8
dmi.chassis.vendor: Dell Inc.
dmi.chassis.version: 0.1
dmi.modalias: 
dmi:bvnDellInc.:bvrA08:bd04/18/2013:svnDellInc.:pnDellSystemXPSL322X:pvr:rvnDellInc.:rn0PJHXN:rvrA00:cvnDellInc.:ct8:cvr0.1:
dmi.product.name: Dell System XPS L322X
dmi.sys.vendor: Dell Inc.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Confirmed


** Tags: amd64 apport-package trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380009

Title:
  package linux-image-3.13.0-38-generic (not installed) failed to
  install/upgrade: unable to clean up mess surrounding
  `./boot/vmlinuz-3.13.0-38-generic' before installing another version:
  Read-only file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380009] Status changed to Confirmed

2014-10-11 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380009

Title:
  package linux-image-3.13.0-38-generic (not installed) failed to
  install/upgrade: unable to clean up mess surrounding
  `./boot/vmlinuz-3.13.0-38-generic' before installing another version:
  Read-only file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380009] Re: package linux-image-3.13.0-38-generic (not installed) failed to install/upgrade: unable to clean up mess surrounding `./boot/vmlinuz-3.13.0-38-generic' before installing another vers

2014-10-11 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380009

Title:
  package linux-image-3.13.0-38-generic (not installed) failed to
  install/upgrade: unable to clean up mess surrounding
  `./boot/vmlinuz-3.13.0-38-generic' before installing another version:
  Read-only file system

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380009/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380014] [NEW] modemmanager should blacklist Freetronics devices

2014-10-11 Thread Ben Stanley
Public bug reported:

In a similar vein to Bug #910736, there are more Arduino related devices
that must be blacklisted.

For the LeoStick, the following is required:
-- /etc/udev/rules.d/77-modem-manager-freetronics.rules 
--
ATTRS{idVendor}==26ba, ENV{ID_MM_DEVICE_IGNORE}=1
ATTRS{idVendor}==20a0, ENV{ID_MM_DEVICE_IGNORE}=1
---
See http://www.freetronics.com/pages/leostick-getting-started-guide in the 
section Problems Uploading on Linux.

There are also some additional devices listed on the end of Bug #910736
after it was marked as FixedReleased.

** Affects: modemmanager (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380014

Title:
  modemmanager should blacklist Freetronics devices

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/modemmanager/+bug/1380014/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379448] Re: Can't install or update apps on Ubuntu Touch

2014-10-11 Thread Bogdan
Seems like after removing the Ubuntu One account and adding it back
everything works

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379448

Title:
  Can't install or update apps on Ubuntu Touch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1379448/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380018] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

2014-10-11 Thread Thierry Leiber
Public bug reported:

v??

ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: nvidia-331 331.89-0ubuntu5
ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6
Uname: Linux 3.13.0-36-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.7-0ubuntu5
Architecture: amd64
DKMSKernelVersion: 3.16.0-22-generic
Date: Sat Oct 11 08:12:05 2014
InstallationDate: Installed on 2014-04-08 (185 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Daily amd64 (20140403)
PackageVersion: 331.89-0ubuntu5
SourcePackage: nvidia-graphics-drivers-331
Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
UpgradeStatus: Upgraded to utopic on 2014-10-06 (4 days ago)
modified.conffile..etc.modprobe.d.nvidia.331.hybrid.conf: [deleted]

** Affects: nvidia-graphics-drivers-331 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package utopic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380018

Title:
  nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380018/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1059872] Re: Error formatting disk using disk utility

2014-10-11 Thread Mupfelzitze
Fresh Ubuntu 14.04.1 LTS. Disk utility fails in formatting empty
partition on usb-disk:

Error formatting partition
Error synchronizing after initial wipe: Timed out waiting for object 
(udisks-error-quark, 0)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1059872

Title:
  Error formatting disk using disk utility

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/udisks2/+bug/1059872/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379410] Re: Please update digikam to 4.4.0

2014-10-11 Thread Achim Bohnet
** Changed in: digikam (Ubuntu)
 Assignee: (unassigned) = Achim Bohnet (allee)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379410

Title:
  Please update digikam to 4.4.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/digikam/+bug/1379410/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.

2014-10-11 Thread Launchpad Bug Tracker
** Branch linked: lp:ubuntu/utopic-proposed/neutron

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379779

Title:
  neutron-openvswitch-agent fails to apply iptables rules - Set
  IPv4cf55331e-3b18-488d-8 doesn't exist.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 995918] Re: tumbler causes Cannot unmount because file system on device is busy.

2014-10-11 Thread lagre
I am on 0.1.30-1ubuntu and I just got this issue as well. I was unable
to unmount a volume because tumblerd was generating thumbnails, even
though I had no Thunar window open. I found it by running fuser, killing
the process allowed me to unmount.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/995918

Title:
  tumbler causes Cannot unmount because file system on device is busy.

To manage notifications about this bug go to:
https://bugs.launchpad.net/tumbler/+bug/995918/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1362658] Re: screen locks while recording video

2014-10-11 Thread Ricardo Salveti
** Changed in: media-hub (Ubuntu)
 Assignee: Jim Hodapp (jhodapp) = Ricardo Mendoza (ricmm)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1362658

Title:
  screen locks while recording video

To manage notifications about this bug go to:
https://bugs.launchpad.net/media-hub/+bug/1362658/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379829] Re: package postgresql-9.4 9.4~beta2-1build1 failed to install/upgrade: subprocess new pre-installation script returned error exit status 1

2014-10-11 Thread Simon THOBY
I was updating postgresql using apt-get when this apport-gtk message appears.
Apt-get say:
Errors were encountered while processing:
 /var/cache/apt/archives/postgresql-9.4_9.4~beta3-1_amd64.deb
E: Sub-process /usr/bin/dpkg returned an error code (1)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379829

Title:
  package postgresql-9.4 9.4~beta2-1build1 failed to install/upgrade:
  subprocess new pre-installation script returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-9.4/+bug/1379829/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380022] [NEW] aiccu's SSL connection is not secure

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static
analysis. For example, as we all know, Hostname verification is an
important step when verifying X509 certificates, however, people tend to
miss the step or to misunderstand the APIs when using SSL/TLS, which
might cause severe man in the middle attack and break the entire TLS
mechanism. And static analysis is a way of finding whether the APIs are
called correctly.

Now, we find some SSL problems in aiccu, the following is details:

1. 
/aiccu-20070115/common/common.c
 Certificate verification missing

Still vulnerable in Ubunutu 14.04
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c;

2. 
/aiccu-20070115/common/common.c
 Host name verification missing

Still vulnerable in Ubunutu 14.04
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c;

PS: for more information, you can see the paper:  
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
and more details you can contact with us, my email : rainkin1...@gmail.com

Thanks.

** Affects: aiccu (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380022

Title:
  aiccu's SSL connection is not secure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aiccu/+bug/1380022/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379986] Re: Kernel Panic with haproxy

2014-10-11 Thread Launchpad Bug Tracker
*** This bug is a duplicate of bug 1275879 ***
https://bugs.launchpad.net/bugs/1275879

Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379986

Title:
  Kernel Panic with haproxy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1379986/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1376592] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376592

Title:
  X509 certificate verification problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/freetds/+bug/1376592/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1378617] Re: xxxterm has SSL security problems

2014-10-11 Thread rainkin
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378617

Title:
  xxxterm has  SSL security problems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xxxterm/+bug/1378617/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1376595] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376595

Title:
  X509 certificate verification problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1376595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380025] [NEW] linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of CONFIG_CC_STACKPROTECTOR_REGULAR

2014-10-11 Thread Laurent Bonnaud
Public bug reported:

Here is the relevant kernel config:

$ grep STACKPROTECTOR /boot/config-3.16.0-22-generic 
CONFIG_HAVE_CC_STACKPROTECTOR=y
CONFIG_CC_STACKPROTECTOR=y
# CONFIG_CC_STACKPROTECTOR_NONE is not set
CONFIG_CC_STACKPROTECTOR_REGULAR=y
# CONFIG_CC_STACKPROTECTOR_STRONG is not set

Since linux is built with gcc 4.9 in Ubuntu 14.10, it could use
CONFIG_CC_STACKPROTECTOR_STRONG instead of
CONFIG_CC_STACKPROTECTOR_REGULAR.

ProblemType: Bug
DistroRelease: Ubuntu 14.10
Package: linux-image-3.16.0-22-generic 3.16.0-22.29
ProcVersionSignature: Ubuntu 3.16.0-22.29-generic 3.16.4
Uname: Linux 3.16.0-22-generic x86_64
ApportVersion: 2.14.7-0ubuntu5
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC0:  bonnaudl   3741 F pulseaudio
CurrentDesktop: KDE
Date: Sat Oct 11 10:03:30 2014
EcryptfsInUse: Yes
HibernationDevice: RESUME=UUID=cf81afe7-8427-45fa-9149-c11d060a5a26
IwConfig:
 eth1  no wireless extensions.
 
 lono wireless extensions.
MachineType: Dell Inc. Latitude E6520
ProcFB: 0 inteldrmfb
ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-3.16.0-22-generic 
root=UUID=749a9901-bdd3-4b5f-b80e-69414667e058 ro quiet splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-3.16.0-22-generic N/A
 linux-backports-modules-3.16.0-22-generic  N/A
 linux-firmware 1.135
RfKill:
 
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 11/14/2013
dmi.bios.vendor: Dell Inc.
dmi.bios.version: A19
dmi.board.name: 0NVF5K
dmi.board.vendor: Dell Inc.
dmi.board.version: A01
dmi.chassis.type: 9
dmi.chassis.vendor: Dell Inc.
dmi.modalias: 
dmi:bvnDellInc.:bvrA19:bd11/14/2013:svnDellInc.:pnLatitudeE6520:pvr01:rvnDellInc.:rn0NVF5K:rvrA01:cvnDellInc.:ct9:cvr:
dmi.product.name: Latitude E6520
dmi.product.version: 01
dmi.sys.vendor: Dell Inc.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug utopic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380025

Title:
  linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of
  CONFIG_CC_STACKPROTECTOR_REGULAR

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380025/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380022] Re: aiccu's SSL connection is not secure

2014-10-11 Thread rainkin
** Description changed:

  Recently, we are trying to find SSL security problems by static
  analysis. For example, as we all know, Hostname verification is an
  important step when verifying X509 certificates, however, people tend to
  miss the step or to misunderstand the APIs when using SSL/TLS, which
  might cause severe man in the middle attack and break the entire TLS
  mechanism. And static analysis is a way of finding whether the APIs are
  called correctly.
  
  Now, we find some SSL problems in aiccu, the following is details:
  
- 1. 
+ 1.
  /aiccu-20070115/common/common.c
-  Certificate verification missing
+  Certificate chain verification is missing
  
- Still vulnerable in Ubunutu 14.04
- 
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c;
+ 2.
+ /aiccu-20070115/common/common.c
+  Hostname verification is missing
  
- 2. 
- /aiccu-20070115/common/common.c
-  Host name verification missing
- 
- Still vulnerable in Ubunutu 14.04
- 
http://bazaar.launchpad.net/~ubuntu-branches/ubuntu/trusty/aiccu/trusty/view/head:/common/common.c;
+ More specifically , we can take hostname check for example, the function
+ verify_certificate() can only guarantee the validity of the certificate
+ but cannot guarantee that the host you are trying to connect is the one
+ you intend to visit, which may lead to man-in-the-middle attack or other
+ security issues. And other APIs have similar problems.
  
  PS: for more information, you can see the paper:  
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  and more details you can contact with us, my email : rainkin1...@gmail.com
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380022

Title:
  aiccu's SSL connection is not secure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/aiccu/+bug/1380022/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1216385] Re: [needs-packaging] scanbd

2014-10-11 Thread Bug Watch Updater
** Changed in: debian
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1216385

Title:
  [needs-packaging] scanbd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379779] Re: neutron-openvswitch-agent fails to apply iptables rules - Set IPv4cf55331e-3b18-488d-8 doesn't exist.

2014-10-11 Thread Launchpad Bug Tracker
This bug was fixed in the package neutron - 1:2014.2~rc2-0ubuntu1

---
neutron (1:2014.2~rc2-0ubuntu1) utopic; urgency=medium

  * New upstream release candidate:
- d/p/*: Refresh.
  * Fixup optimized iptables management by l2 daemons (LP: #1379779):
- d/neutron-common.install: Install ipset-firewall.filters to support
  use of ipset to optimize firewall rulebase management.
- d/control: Add ipset to Depends of neutron-common.
  * d/watch: Only match versions starting with digits.
 -- James Page james.p...@ubuntu.com   Fri, 10 Oct 2014 15:13:44 +0100

** Changed in: neutron (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379779

Title:
  neutron-openvswitch-agent fails to apply iptables rules - Set
  IPv4cf55331e-3b18-488d-8 doesn't exist.

To manage notifications about this bug go to:
https://bugs.launchpad.net/neutron/+bug/1379779/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380025] Status changed to Confirmed

2014-10-11 Thread Brad Figg
This change was made by a bot.

** Changed in: linux (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380025

Title:
  linux could use CONFIG_CC_STACKPROTECTOR_STRONG instead of
  CONFIG_CC_STACKPROTECTOR_REGULAR

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1380025/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380028] [NEW] nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

2014-10-11 Thread Brian Smith
Public bug reported:

Failed to build on update to Kernel 3.16.0.22

ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: nvidia-331 331.89-0ubuntu5
ProcVersionSignature: Ubuntu 3.16.0-22.29-generic 3.16.4
Uname: Linux 3.16.0-22-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.7-0ubuntu5
Architecture: amd64
DKMSKernelVersion: 3.16.0-22-generic
Date: Sat Oct 11 10:17:57 2014
InstallationDate: Installed on 2014-07-11 (91 days ago)
InstallationMedia: Xubuntu 14.10 Utopic Unicorn - Alpha amd64 (20140709)
PackageVersion: 331.89-0ubuntu5
SourcePackage: nvidia-graphics-drivers-331
Title: nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: nvidia-graphics-drivers-331 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package utopic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380028

Title:
  nvidia-331 331.89-0ubuntu5: nvidia-331 kernel module failed to build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1380028/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380031] [NEW] hostname and certificate chain check missing when verifying X509 certificate

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static
analysis. For example, as we all know, Hostname verification is an
important step when verifying X509 certificates, however, people tend to
miss the step or to misunderstand the APIs when using SSL/TLS, which
might cause severe man in the middle attack and break the entire TLS
mechanism. And static analysis is a way of finding whether the APIs are
called correctly.

Now, we find some SSL problems in charybdis, the following is details:

1.
/charybdis-3.3.0/libratbox/src/gnutls.c

Certificate chain verification is missing

2.
/charybdis-3.3.0/libratbox/src/gnutls.c

 Hostname verification is missing

More specifically , we can take hostname check for example, the function
verify_certificate() can only guarantee the validity of the certificate
but cannot guarantee that the host you are trying to connect is the one
you intend to visit, which may lead to man-in-the-middle attack or other
security issues. And other APIs have similar problems.

PS: for more information, you can see the paper: 
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
and more details you can contact with us, my email : rainkin1...@gmail.com

Thanks.

** Affects: charybdis (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380031

Title:
  hostname and certificate chain check missing when verifying X509
  certificate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/charybdis/+bug/1380031/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1376592] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Description changed:

- Hostname verification is an important step when verifying X509
- certificates, however, people tend to miss the step or to misunderstand
- the APIs when using SSL/TLS, which might cause severe man in the middle
- attack and break the entire TLS mechanism.
  
- We believe that freetds-bin didn't check whether the hostname matches
- the name in the SSL certificate and the expired date of the certificate.
+ Recently, we are trying to find SSL security problems by static anaylsis.
+ For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- We found the vulnerability by static analysis, typically, a process of
- verification involves calling a chain of API, and we can deduce whether
- the communication process is vulnerable by detecting whether the
- function call process matches a certain model. For example, when using
- OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null),
- we should verify the certificate by calling the function
- SSL_get_peer_certificate() to get the certificate. If the source code
- does not match this model, then we can deduce this code is vulnerable.
- What’ more , Gnutls is the same as Openssl.
+ During the experiment, we find that freetds-bin didn't check whether the
+ hostname matches the name in the SSL certificate and the expired date of
+ the certificate.
  
- To verify the result:
+ 
+ To verify the result, we attack the software manually:
  
  一.Hostname verification:
  1. configure the file freetds.conf :
     # A typical Microsoft server
  [sqlserver2000]
  host = hackbyfun.sqlserver.com
  port = 1433
  tds version = 8.0
  encrpytion = require
  2.wirte the file /etc/hosts in order to simulate DNS hijack:
    10.214.146.123 hackbyfun.sqlserver.com
   (PS: 10.214.146.123 is a normal sql server ip, its domain name is 
safe.sqlserver.com )
  
  3.connect with freetds-bin
  tsql -S sqlserver2000 -U sa -P your password
  
  4.result:connect succeed!!
  
  The fetch succeeded, indicating freetds-bin didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. the same as the above process. Run freetds-bin to connect a normal sql 
server
  3. result :connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating freetds-
  bin didn't check whether the certificate expired or not.
  
  (PS: I have saved the wireshark packages, and upload these files)
  
  I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

** Description changed:

- 
  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
  During the experiment, we find that freetds-bin didn't check whether the
  hostname matches the name in the SSL certificate and the expired date of
  the certificate.
- 
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification:
  1. configure the file freetds.conf :
     # A typical Microsoft server
  [sqlserver2000]
  host = hackbyfun.sqlserver.com
  port = 1433
  tds version = 8.0
  encrpytion = require
  2.wirte the file /etc/hosts in order to simulate DNS hijack:
    10.214.146.123 hackbyfun.sqlserver.com
   (PS: 10.214.146.123 is a normal sql server ip, its domain name is 
safe.sqlserver.com )
  
  3.connect with freetds-bin
  tsql -S sqlserver2000 -U sa -P your password
  
  4.result:connect succeed!!
  
  The fetch succeeded, indicating freetds-bin didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. the same as the above process. Run freetds-bin to connect a normal sql 
server
  3. result :connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating freetds-
  bin didn't check whether the certificate expired or not.
  
  (PS: I have saved the wireshark packages, and upload these files)
  
  I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to 

[Bug 1376595] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Description changed:

- Hostname verification is an important step when verifying X509
- certificates, however, people tend to miss the step or to misunderstand
- the APIs when using SSL/TLS, which might cause severe man in the middle
- attack and break the entire TLS mechanism.
+ Recently, we are trying to find SSL security problems by static anaylsis.
+ For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- We believe that scrollz didn't check whether the hostname matches the
- name in the SSL certificate and the expired date of the certificate.
+ During the experiment, we find that freetds-bin didn't check whether the
+ hostname matches the name in the SSL certificate and the expired date of
+ the certificate.The followind is details:
  
- We found the vulnerability by static analysis, typically, a process of
- verification involves calling a chain of API, and we can deduce whether
- the communication process is vulnerable by detecting whether the
- function call process matches a certain model. For example, when using
- OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null),
- we should verify the certificate by calling the function
- SSL_get_peer_certificate() to get the certificate. If the source code
- does not match this model, then we can deduce this code is vulnerable.
- What’ more , Gnutls is the same as Openssl.
+ 1.
+ function: /scrollz-2.1/source/server.c login_to_server()
+ problem:  Hostname verification missing
  
- Static analysis result :
- /scrollz-2.1/source/server.c login_to_server() have problems.
+ 2. 
+ function: /scrollz-2.1/source/server.c login_to_server()
+ problem:  expired date check missing
  
- We provide this result to help developers to locate the problem faster.
  
- To verify the result:
+ To verify the result, we attack the software manually:
+ 
  一.Hostname verification
  1. write the file /etc/hosts in order to simulate DNS hijack:
  64.32.24.176  irc.mibbit.net
  46.137.23.30  chat.freenode.net
  (PS:exchange the ip between these two irc servers)
  
  2. connecting chat.freenode.net with scrollz
  /server -ssl irc.mibbit.net:6697
  
  3. result : we connected irc.mibbit.net!!
  
  The fetch succeeded, indicating srcollz didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating scrollz
  didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
- 
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376595

Title:
  X509 certificate verification problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1376595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1380001] Re: nvidia-331-updates 331.89-0ubuntu5: nvidia-331-updates kernel module failed to build

2014-10-11 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: nvidia-graphics-drivers-331-updates (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380001

Title:
  nvidia-331-updates 331.89-0ubuntu5: nvidia-331-updates kernel module
  failed to build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331-updates/+bug/1380001/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1376592] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- During the experiment, we find that freetds-bin didn't check whether the
- hostname matches the name in the SSL certificate and the expired date of
- the certificate.
+ During the experiment, we find that freetds-bin didn't check whether the 
hostname matches the name in the SSL certificate and the expired date of the 
certificate.The following is details:
+ 1. 
+ file: /freetds-0.91/src/tds/net.c
+ problem: Hostname verification missing
+ 
+ 2. 
+ file: /freetds-0.91/src/tds/net.c
+ problem: Hostname verification missing
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification:
  1. configure the file freetds.conf :
     # A typical Microsoft server
  [sqlserver2000]
  host = hackbyfun.sqlserver.com
  port = 1433
  tds version = 8.0
  encrpytion = require
  2.wirte the file /etc/hosts in order to simulate DNS hijack:
    10.214.146.123 hackbyfun.sqlserver.com
   (PS: 10.214.146.123 is a normal sql server ip, its domain name is 
safe.sqlserver.com )
  
  3.connect with freetds-bin
  tsql -S sqlserver2000 -U sa -P your password
  
  4.result:connect succeed!!
  
  The fetch succeeded, indicating freetds-bin didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. the same as the above process. Run freetds-bin to connect a normal sql 
server
  3. result :connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating freetds-
  bin didn't check whether the certificate expired or not.
  
  (PS: I have saved the wireshark packages, and upload these files)
  
  I am running freetds-bin 9.1-5 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376592

Title:
  X509 certificate verification problem

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/freetds/+bug/1376592/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1376595] Re: X509 certificate verification problem

2014-10-11 Thread rainkin
** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- During the experiment, we find that freetds-bin didn't check whether the
+ During the experiment, we find that scrollz didn't check whether the
  hostname matches the name in the SSL certificate and the expired date of
  the certificate.The followind is details:
  
  1.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem:  Hostname verification missing
  
- 2. 
+ 2.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem:  expired date check missing
- 
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification
  1. write the file /etc/hosts in order to simulate DNS hijack:
  64.32.24.176  irc.mibbit.net
  46.137.23.30  chat.freenode.net
  (PS:exchange the ip between these two irc servers)
  
  2. connecting chat.freenode.net with scrollz
  /server -ssl irc.mibbit.net:6697
  
  3. result : we connected irc.mibbit.net!!
  
  The fetch succeeded, indicating srcollz didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating scrollz
  didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

** No longer affects: scrollz (Ubuntu)

** Summary changed:

- X509 certificate verification problem
+ xface4-mailwatch-plugin have some SSL security problems

** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- During the experiment, we find that scrollz didn't check whether the
- hostname matches the name in the SSL certificate and the expired date of
- the certificate.The followind is details:
+ During the experiment, we find that xface4-mailwatch-plugin didn't check
+ whether the hostname matches the name in the SSL certificate and the
+ expired date of the certificate.The followind is details:
  
  1.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem:  Hostname verification missing
  
  2.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem:  expired date check missing
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification
  1. write the file /etc/hosts in order to simulate DNS hijack:
  64.32.24.176  irc.mibbit.net
  46.137.23.30  chat.freenode.net
  (PS:exchange the ip between these two irc servers)
  
  2. connecting chat.freenode.net with scrollz
  /server -ssl irc.mibbit.net:6697
  
  3. result : we connected irc.mibbit.net!!
  
  The fetch succeeded, indicating srcollz didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating scrollz
  didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376595

Title:
  xface4-mailwatch-plugin have some SSL security problems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfce4-mailwatch-plugin/+bug/1376595/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1380036] Re: kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

2014-10-11 Thread Bharat Rajagopalan
Attached screenshot - gtk2 theme is set to redmond and you can see that
the systemsettings5 (kf5) takes the theme

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380036

Title:
  kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380036] [NEW] kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

2014-10-11 Thread Bharat Rajagopalan
Public bug reported:

I am using the kubuntu next repository on kubuntu 14.10 - with  the
latest release of plasma 5.1. I have a bizarre issue that the kf5
applications like system-settings seem to be using the gtk2 theme set
using the kde-gtk-config tool.  Kde4 applications and qt4 applications
correctly use the application style set.

E,g, i set application style to breeze, gtk2 theme to qtcurve and gtk3
to adwaita - and i can see that systemsettings5 is using qtcurve. while
konversation (kde 4)  and cadence (qt4) is using breeze (qt4config shows
that theme is set to desktop default).

When i change the gtk2 theme to say oxygen-gtk and restart system-
settings it changes themes.

Changing the theme in kde application style doesn't have any effect on
system settings - also i that kde 4 applications don't change themes on
the fly - they need to be restarted which is different behaviour to what
i had seen in the early betas of plasma next

Please let me know how i can debug this issue further?

Output of lsb_release -rd

Description:Ubuntu Utopic Unicorn (development branch)
Release:14.10

output of apt-cache policy plasma-workspace

plasma-workspace:
  Installed: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4
  Candidate: 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4
  Version table:
 *** 4:5.1.0-0ubuntu1~ubuntu14.10~ppa4 0
500 http://ppa.launchpad.net/kubuntu-ppa/next/ubuntu/ utopic/main amd64 
Packages
100 /var/lib/dpkg/status

** Affects: ubuntu
 Importance: Undecided
 Status: New

** Attachment added: bug-theme.png
   
https://bugs.launchpad.net/bugs/1380036/+attachment/4231366/+files/bug-theme.png

** Package changed: open-vm-tools (Ubuntu) = ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380036

Title:
  kubuntu plasma next ( 14.10) - kf5 apps use gtk2 theme

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1380036/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380035] [NEW] scrollz doesn't check hostanem and expired time when verifying x509 certificate

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static anaylsis.
For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.

During the experiment, we find that scrollz didn't check whether the
hostname matches the name in the SSL certificate and the expired date of
the certificate.The followind is details:

1.
function: /scrollz-2.1/source/server.c login_to_server()
problem: Hostname verification missing

2.
function: /scrollz-2.1/source/server.c login_to_server()
problem: expired date check missing

To verify the result, we attack the software manually:

一.Hostname verification
1. write the file /etc/hosts in order to simulate DNS hijack:
64.32.24.176 irc.mibbit.net
46.137.23.30 chat.freenode.net
(PS:exchange the ip between these two irc servers)

2. connecting chat.freenode.net with scrollz
/server -ssl irc.mibbit.net:6697

3. result : we connected irc.mibbit.net!!

The fetch succeeded, indicating srcollz didn't check the hostname
against the signee of the certificate.

二. Also for expired time check,
1. change the system time to 2200 to guarantee the certificate to be expired.
2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
3. result : connect succeed!!

The fetch succeeded again and no warning was given, indicating scrollz
didn't check whether the certificate expired or not.

I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.

for more information about the importance of checking hostname:
see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf

Thanks.

** Affects: scrollz (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- During the experiment, we find that xface4-mailwatch-plugin didn't check
- whether the hostname matches the name in the SSL certificate and the
- expired date of the certificate.The followind is details:
+ During the experiment, we find that scrollz didn't check whether the
+ hostname matches the name in the SSL certificate and the expired date of
+ the certificate.The followind is details:
  
  1.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem: Hostname verification missing
  
  2.
  function: /scrollz-2.1/source/server.c login_to_server()
  problem: expired date check missing
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification
  1. write the file /etc/hosts in order to simulate DNS hijack:
  64.32.24.176 irc.mibbit.net
  46.137.23.30 chat.freenode.net
  (PS:exchange the ip between these two irc servers)
  
  2. connecting chat.freenode.net with scrollz
  /server -ssl irc.mibbit.net:6697
  
  3. result : we connected irc.mibbit.net!!
  
  The fetch succeeded, indicating srcollz didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating scrollz
  didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380035

Title:
  scrollz doesn't check hostanem and expired time when verifying x509
  certificate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/scrollz/+bug/1380035/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1376595] Re: xface4-mailwatch-plugin have some SSL security problems

2014-10-11 Thread rainkin
** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
  During the experiment, we find that xface4-mailwatch-plugin didn't check
  whether the hostname matches the name in the SSL certificate and the
  expired date of the certificate.The followind is details:
  
  1.
- function: /scrollz-2.1/source/server.c login_to_server()
+ function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c
+   xfce_mailwatch_net_conn_make_secure()
  problem:  Hostname verification missing
  
  2.
- function: /scrollz-2.1/source/server.c login_to_server()
+ function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c
+   xfce_mailwatch_net_conn_make_secure()
  problem:  expired date check missing
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification
  1. write the file /etc/hosts in order to simulate DNS hijack:
  64.32.24.176  irc.mibbit.net
  46.137.23.30  chat.freenode.net
  (PS:exchange the ip between these two irc servers)
  
  2. connecting chat.freenode.net with scrollz
  /server -ssl irc.mibbit.net:6697
  
  3. result : we connected irc.mibbit.net!!
  
  The fetch succeeded, indicating srcollz didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
  The fetch succeeded again and no warning was given, indicating scrollz
  didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
  During the experiment, we find that xface4-mailwatch-plugin didn't check
  whether the hostname matches the name in the SSL certificate and the
  expired date of the certificate.The followind is details:
  
  1.
  function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c
-   xfce_mailwatch_net_conn_make_secure()
+   xfce_mailwatch_net_conn_make_secure()
  problem:  Hostname verification missing
  
  2.
  function: /xfce4-mailwatch-plugin-1.1.0/libmailwatch-core/mailwatchnet-conn.c
-   xfce_mailwatch_net_conn_make_secure()
+   xfce_mailwatch_net_conn_make_secure()
  problem:  expired date check missing
  
  To verify the result, we attack the software manually:
  
  一.Hostname verification
- 1. write the file /etc/hosts in order to simulate DNS hijack:
- 64.32.24.176  irc.mibbit.net
- 46.137.23.30  chat.freenode.net
- (PS:exchange the ip between these two irc servers)
+ 1.configure xface4-mailwatch-plugin:
+ IMAP(SSL) :imap.163.com
+ Username : 598105904
+ Password : Your password
+ Advanced: Use SSL/TLS on alternate port
  
- 2. connecting chat.freenode.net with scrollz
- /server -ssl irc.mibbit.net:6697
+ 2. change /etc/hosts in order to simulate the DNS hijack
+ 113.108.16.116imap.163.com
+(113.108.16.116 is QQ’s imap server)
  
- 3. result : we connected irc.mibbit.net!!
+ 3. run xfce4-mailwatch-plugin to fetch the mail
  
- The fetch succeeded, indicating srcollz didn't check the hostname
+ 4. result : succeed!!!
+ 
+ The fetch succeeded, indicating the software didn't check the hostname
  against the signee of the certificate.
  
  二. Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run scrollz to connect a normal irc server, such as 
irc.mibbit.net(46.137.12.30)
  3. result : connect succeed!!
  
- The fetch succeeded again and no warning was given, indicating scrollz
- didn't check whether the certificate expired or not.
+ The fetch succeeded again and no warning was given, indicating the
+ software didn't check whether the certificate expired or not.
  
  I am running scrollz 2.1-1.1 in ubuntu 14.04 LTS.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

** Description changed:

  Recently, we are trying to find SSL security problems by static anaylsis.
  For example, Hostname verification is an 

[Bug 779597] Re: VU meter doesn't work anymore

2014-10-11 Thread jnerin
For me it kind of works, but the levels are insignificant, only a few
pixels max (see attachment), so not useful at all.

And I also suffer bug #830677, they seem to be related.

** Attachment added: pavucontrol vumeter 1.png
   
https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/779597/+attachment/4231367/+files/pavucontrol%20vumeter%201.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/779597

Title:
  VU meter doesn't work anymore

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pavucontrol/+bug/779597/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1378617] Re: xxxterm has SSL security problems

2014-10-11 Thread rainkin
** Description changed:

- Hostname verification is an important step when verifying X509
- certificates, however, people tend to miss the step or to misunderstand
- the APIs when using SSL/TLS, which might cause severe man in the middle
- attack and break the entire TLS mechanism.
+ Recently, we are trying to find SSL security problems by static anaylsis.
+ For example, Hostname verification is an important step when verifying X509 
certificates, however, people tend to miss the step or to misunderstand the 
APIs when using SSL/TLS, which might cause severe man in the middle attack and 
break the entire TLS mechanism.
  
- We believe that xxxterm didn't check whether the hostname matches the
- name in the SSL certificate and the expired date of the certificate.
+ During the experiment, we find that xxxterm didn't check whether the
+ hostname matches the name in the SSL certificate and the expired date of
+ the certificate.The followind is details:
  
- We found the vulnerability by static analysis, typically, a process of
- verification involves calling a chain of API, and we can deduce whether
- the communication process is vulnerable by detecting whether the
- function call process matches a certain model. For example, when using
- OPENSSL, if we call SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_NONE, null),
- we should verify the certificate by calling the function
- SSL_get_peer_certificate() to get the certificate. If the source code
- does not match this model, then we can deduce this code is vulnerable.
- What’ more , Gnutls is the same as Openssl.
+ 1.
+ file: /xxxterm-1.10.0/xxxterm.c
+ problem: Hostname verification missing
  
+ 2.
+ file: /xxxterm-1.10.0/xxxterm.c
+ problem: expired date check missing
  
- This is the result for xxxterm:
- /xxxterm-1.10.0/xxxterm.c have problems. 
- Host name verification missing
+ To verify the result, we attack the software manually:
  
- We provide this result to help developers to locate the problem faster.
- 
- 
- To verify the result:
  一. Hostname check
  1.configure /etc/hosts in order to simulate DNS hijack
-   42.62.48.90 www.facebook.com 
-   # 42.62.48.90 is the ip of i.mi.com
+   42.62.48.90 www.facebook.com
+   # 42.62.48.90 is the ip of i.mi.com
  
  2. visit the website https://www.facebook.com with xxxterm
  
  3. result : connecting succeed without any warning!!!
  
- 
- The fetch succeeded, indicating xxxterm didn't check the hostname against the 
signee of the certificate.
+ The fetch succeeded, indicating xxxterm didn't check the hostname
+ against the signee of the certificate.
  
  二.Also for expired time check,
  1. change the system time to 2200 to guarantee the certificate to be expired.
  2. run xxxterm to visit any https website, such as https://www.youtube.com.
  3. result : succeed without any warning!!
  
  The fetch succeeded again and no warning was given, indicating xxxterm
  didn't check whether the certificate expired or not.
  
  I am running xxxterm 1.11.3-1.2 in ubuntu 14.04 LTS.
  I have save the SSL connecting packages and upload these wireshark files.
  
  for more information about the importance of checking hostname:
  see http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
  
  Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378617

Title:
  xxxterm has  SSL security problems

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xxxterm/+bug/1378617/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1380039] [NEW] pacemaker-mgmt doesn't chekc expired time and hostname when ssl connecting

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static
analysis. For example, as we all know, Hostname verification is an
important step when verifying X509 certificates, however, people tend to
miss the step or to misunderstand the APIs when using SSL/TLS, which
might cause severe man in the middle attack and break the entire TLS
mechanism. And static analysis is a way of finding whether the APIs are
called correctly.

Now, we find some SSL problems in pacemaker-mgmt, the following is
details:

1.
file : /pacemaker-mgmt-2.0.0+hg1141/lib/mgmt/mgmt_tls_lib.c
problem : Certificate chain verification is missing

2.
file : /pacemaker-mgmt-2.0.0+hg1141/lib/mgmt/mgmt_tls_lib.c
problem : Hostname verification is missing

More specifically , we can take hostname check for example, the function
verify_certificate() can only guarantee the validity of the certificate
but cannot guarantee that the host you are trying to connect is the one
you intend to visit, which may lead to man-in-the-middle attack or other
security issues. And other APIs have similar problems.

PS: for more information, you can see the paper: 
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
and more details you can contact with us, my email : rainkin1...@gmail.com

Thanks.

** Affects: pacemaker-mgmt (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380039

Title:
  pacemaker-mgmt doesn't chekc expired time and hostname when ssl
  connecting

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pacemaker-mgmt/+bug/1380039/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380038] [NEW] SSL problems: doesn't check certificate chain and hostname when ssl connecting

2014-10-11 Thread rainkin
*** This bug is a security vulnerability ***

Public security bug reported:

Recently, we are trying to find SSL security problems by static
analysis. For example, as we all know, Hostname verification is an
important step when verifying X509 certificates, however, people tend to
miss the step or to misunderstand the APIs when using SSL/TLS, which
might cause severe man in the middle attack and break the entire TLS
mechanism. And static analysis is a way of finding whether the APIs are
called correctly.

Now, we find some SSL problems in pacemaker, the following is details:

1.
file :  /pacemaker-1.1.6/lib/common/remote.c 
problem : Certificate chain verification is missing

2.
file : /pacemaker-1.1.6/lib/common/remote.c
problem : Hostname verification is missing

More specifically , we can take hostname check for example, the function
verify_certificate() can only guarantee the validity of the certificate
but cannot guarantee that the host you are trying to connect is the one
you intend to visit, which may lead to man-in-the-middle attack or other
security issues. And other APIs have similar problems.

PS: for more information, you can see the paper: 
http://people.stfx.ca/x2011/x2011ucj/SSL/p38-georgiev.pdf
and more details you can contact with us, my email : rainkin1...@gmail.com

Thanks.

** Affects: pacemaker (Ubuntu)
 Importance: Undecided
 Status: New

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380038

Title:
  SSL problems: doesn't check certificate chain and hostname when ssl
  connecting

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pacemaker/+bug/1380038/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1216385] Re: [needs-packaging] scanbd

2014-10-11 Thread Rolf Leggewie
Sander, sorry that I missed your mail.  And sorry about the long time
this whole thing took.  The good news is that scanbd is now finally in
Debian unstable and thus will become a part of the next Debian and
Ubuntu release.  I will likely also make periodic releases for precise
in my stable PPA.

There's still a lot to be done.  For example, I don't have any action
scripts packaged yet, mostly because I was unable to test that.  People
willing to test are still invited to contact me.  Let's make this
package great, unfortunately scanning isn't where it should be in terms
of quality in FOSS.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1216385

Title:
  [needs-packaging] scanbd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 1216385] Re: [needs-packaging] scanbd

2014-10-11 Thread sander
I have a scanner with supported buttons...tell me what I need to test and
I'll see what I can do.

-- 
Mvg, Sander Devrieze.

2014-10-11 11:18 GMT+02:00 Rolf Leggewie 1216...@bugs.launchpad.net:

 Sander, sorry that I missed your mail.  And sorry about the long time
 this whole thing took.  The good news is that scanbd is now finally in
 Debian unstable and thus will become a part of the next Debian and
 Ubuntu release.  I will likely also make periodic releases for precise
 in my stable PPA.

 There's still a lot to be done.  For example, I don't have any action
 scripts packaged yet, mostly because I was unable to test that.  People
 willing to test are still invited to contact me.  Let's make this
 package great, unfortunately scanning isn't where it should be in terms
 of quality in FOSS.

 --
 You received this bug notification because you are subscribed to the bug
 report.
 https://bugs.launchpad.net/bugs/1216385

 Title:
   [needs-packaging] scanbd

 To manage notifications about this bug go to:
 https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions


-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1216385

Title:
  [needs-packaging] scanbd

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/1216385/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380041] Re: Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property'

2014-10-11 Thread Vladimir Rutsky
This bug is similar to #1307622 (which is duplicate of #1300361), but in
my situation USB flash had partition table.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380041

Title:
  Erasing NTFS formatted flash raises AttributeError: 'NoneType' object
  has no attribute 'get_cached_property'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usb-creator/+bug/1380041/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380041] [NEW] Erasing NTFS formatted flash raises AttributeError: 'NoneType' object has no attribute 'get_cached_property'

2014-10-11 Thread Vladimir Rutsky
Public bug reported:

When I'm trying to erase USB flash I'm get popup with following stack
trace:

org.freedesktop.DBus.Python.AttributeError: Traceback (most recent call last):
  File /usr/lib/python3/dist-packages/dbus/service.py, line 707, in 
_message_cb
retval = candidate_method(self, *args, **keywords)
  File /usr/share/usb-creator/usb-creator-helper, line 218, in Format
parent_dev = _get_parent_object(udisks, device)
  File /usr/share/usb-creator/usb-creator-helper, line 49, in 
_get_parent_object
parent = partition.get_cached_property('Table').get_string()
AttributeError: 'NoneType' object has no attribute 'get_cached_property'

To workaround this problem I've done:
1. Remove existing partition on flash drive in GParted.
2. Create new FAT32 partition for whole flash drive in GParted.
3. Unplug/plug flash drive.
4. Start usb-creator-gtk --- Make Startup Disk now active and works.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: usb-creator-gtk 0.2.56.2
ProcVersionSignature: Ubuntu 3.13.0-35.62-generic 3.13.11.6
Uname: Linux 3.13.0-35-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
CurrentDesktop: Unity
Date: Sat Oct 11 12:00:17 2014
InstallationDate: Installed on 2014-01-01 (282 days ago)
InstallationMedia: Ubuntu 13.10 Saucy Salamander - Release amd64 (20131016.1)
SourcePackage: usb-creator
UpgradeStatus: Upgraded to trusty on 2014-04-27 (166 days ago)

** Affects: usb-creator (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug trusty

** Attachment added: part of `udisks --all` output for USB flash
   https://bugs.launchpad.net/bugs/1380041/+attachment/4231375/+files/udisks.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380041

Title:
  Erasing NTFS formatted flash raises AttributeError: 'NoneType' object
  has no attribute 'get_cached_property'

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/usb-creator/+bug/1380041/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1313493] Re: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1

2014-10-11 Thread Iban Eguia Moraza
This error happened when I uninstalled mariadb for reinstalling MySQL.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313493

Title:
  package mysql-server-5.5 (not installed) failed to install/upgrade: el
  subproceso script pre-installation nuevo devolvió el código de salida
  de error 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1313493/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1313493] Re: package mysql-server-5.5 (not installed) failed to install/upgrade: el subproceso script pre-installation nuevo devolvió el código de salida de error 1

2014-10-11 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: mysql-5.5 (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313493

Title:
  package mysql-server-5.5 (not installed) failed to install/upgrade: el
  subproceso script pre-installation nuevo devolvió el código de salida
  de error 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.5/+bug/1313493/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1379448] Re: Can't install or update apps on Ubuntu Touch

2014-10-11 Thread Nekhelesh Ramananthan
** Changed in: click (Ubuntu)
   Status: Incomplete = New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379448

Title:
  Can't install or update apps on Ubuntu Touch

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/click/+bug/1379448/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1253620]

2014-10-11 Thread Sbergman
(In reply to Björn Michaelsen from comment #68)
 Scoping this bug clearly only on the missing deps for KDE thanks to the
 excellent summary in comment 59.

...which has become moot with
http://cgit.freedesktop.org/libreoffice/core/commit/?id=f9f9aa9873c5851da86d33ca75e937ac022206a3
Remove smb from X-KDE-Protocols lines, see
http://lists.freedesktop.org/archives/libreoffice/2014-October/063904.html
Re: X-KDE-Protocols=...,smb,...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1253620

Title:
  Can't open a LibreOffice native file via CIFS share

To manage notifications about this bug go to:
https://bugs.launchpad.net/df-libreoffice/+bug/1253620/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1380044] [NEW] Welcome screen should be visible immediately when screen is activated

2014-10-11 Thread Mark Shuttleworth
Public bug reported:

When locking my device with the power button, and then activating it, I
briefly see the previously-surfaced application before the welcome
screen is drawn over that.

What should happen is that activating the screen shows the welcome
screen instantly.

I suspect we need to draw the welcome screen when then button is
pressed, and fade-out the screen to black. This way, the welcome screen
is already in place when we turn the screen on again.

** Affects: unity8 (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380044

Title:
  Welcome screen should be visible immediately when screen is activated

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unity8/+bug/1380044/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1253620] Re: Can't open a LibreOffice native file via CIFS share

2014-10-11 Thread Bug Watch Updater
** Changed in: df-libreoffice
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1253620

Title:
  Can't open a LibreOffice native file via CIFS share

To manage notifications about this bug go to:
https://bugs.launchpad.net/df-libreoffice/+bug/1253620/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 503841] Re: Ktorrent uses masses of memory after some time running

2014-10-11 Thread gaara
Hi,
I'm using Dolphin to copy at lot of files via ssh, and the process kio_file 
take 3.3 Gb:

:~$ top -d 12
top - 11:30:20 up 18:48,  3 users,  load average: 0,78, 0,97, 1,12
Tasks: 254 total,   5 running, 249 sleeping,   0 stopped,   0 zombie
%Cpu(s): 11,9 us,  6,8 sy,  1,4 ni, 79,4 id,  0,3 wa,  0,0 hi,  0,2 si,  0,0 st
KiB Mem:   8119100 total,  7994144 used,   124956 free,16292 buffers
KiB Swap:0 total,0 used,0 free.  1392064 cached Mem

  PID USER  PR  NIVIRTRESSHR S  %CPU %MEM TIME+ COMMAND 
   
25477 guillau+  20   0 4220264 3,549g   3248 R   7,8 45,8  25:50.39 kio_file
   
 3997 guillau+  20   0 4451156 243928  33660 S   2,4  3,0  38:13.63 
plasma-desktop 
 5576 guillau+  20   0 1146132 218772  50528 S   9,4  2,7   0:08.38 
chromium-browse
 9019 guillau+  20   0  922824 201032  86284 R  12,1  2,5  18:39.11 
chromium-browse
 1897 root  20   0  340712 196612  47804 S   3,7  2,4  46:44.67 Xorg
  

On Kubuntu 14.04

** Also affects: dolphin (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/503841

Title:
  Ktorrent uses masses of memory after some time running

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 503841] Re: Ktorrent uses masses of memory after some time running

2014-10-11 Thread gaara
https://bugs.kde.org/show_bug.cgi?id=284117

** Bug watch added: KDE Bug Tracking System #284117
   https://bugs.kde.org/show_bug.cgi?id=284117

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/503841

Title:
  Ktorrent uses masses of memory after some time running

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1344535]

2014-10-11 Thread Brian Johnson
I second Forest's comments.  The right click edits launchers feature
breaks the right-button behavior I've relied on for years.  I'd greatly
appreciate it if this feature were removed, or some method were provided
to disable it.  A gui-less item in the settings editor would be
sufficient.

Other than this, the changes in XFCE 4.10 (as shipped in XUbuntu 14.04)
are great:  it's a complete, reliable, easy-to-use desktop UI.  Keep up
the good work!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1344535

Title:
  New right click edits launchers feature breaks show applications
  menu on desktop right click

To manage notifications about this bug go to:
https://bugs.launchpad.net/xfdesktop/+bug/1344535/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1358921] Re: [Acer AO 751h] Laptop requires a hard reset to recover from suspend state

2014-10-11 Thread Gonmator
Following the instructions, I couldn't identify any mailing list to send
the bug report, so I email it to the  maintainer of the presumable
affected module who suggested me to report it to the Kernel Bug Tracker:

https://bugzilla.kernel.org/show_bug.cgi?id=86031

** Bug watch added: Linux Kernel Bug Tracker #86031
   http://bugzilla.kernel.org/show_bug.cgi?id=86031

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1358921

Title:
  [Acer AO 751h] Laptop requires a hard reset to recover from  suspend
  state

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1358921/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379021] Re: after utopic upgrade: boot delays for 2 minutes

2014-10-11 Thread Dylan Borg
Strangely, after purging teh configs of my removed packages (that still
had upstart jobs on my machine) I did nto have to wait 2 mins for
network while my machine booted this morning. I am hoping that this
fixed state keeps repeating.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379021

Title:
  after utopic upgrade: boot delays for 2 minutes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1379021/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1316278] Re: Cannot change mac with --random

2014-10-11 Thread Andreas Marc
I confirm this is the problem, it says constantly it's the same mac,
also now -A and -a are doing the same thing, changing by using -a or -A
you obtain the same change to the mac, the last 24 bits remain the same.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316278

Title:
  Cannot change mac with --random

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/macchanger/+bug/1316278/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1374771] Re: black background in resources tab

2014-10-11 Thread netanelf
This bug seems to be fixed in one of the last utopic updates.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1374771

Title:
  black background in resources tab

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-system-monitor/+bug/1374771/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380046] [NEW] [AV200 - Xonar STX, playback] Loud pop when switching to headphones

2014-10-11 Thread Michael Lawton
Public bug reported:

When switching the port to either headphone ports from the speaker port
there is a loud pop in the headphones. When I am playing music through
the speakers at 100% volume and then switch, I can hear the music at a
very loud volume through the headphones for a fraction of a second
before dropping to the proper headphones volume which is much lower.
Even if I mute the output before switching ports there is still a pop
although not nearly as loud.

I believe this is a driver issue (oxygen/virtuoso). The Essense STX uses
a relay to switch between the speaker and headphones ports. I am
guessing the the power for the speaker (line out) port is much higher
than that used for the headphones port and the drivers need to mute the
sound at a hardware level before switching to elmininate the pop. On
Windows when switching to and from speaker and headphones port the
output would be muted for almost a second as the port was switched so
there was no pop. On Ubuntu there is no delay when switching ports. I
have looked at the driver source code and there is an anti_pop_delay of
800 milliseconds used on the Xonar init method. I think this same delay
should probably be added when switching to the headphone ports.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: alsa-base 1.0.25+dfsg-0ubuntu4
ProcVersionSignature: Ubuntu 3.13.0-37.64-generic 3.13.11.7
Uname: Linux 3.13.0-37-generic x86_64
NonfreeKernelModules: fglrx
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
AudioDevicesInUse:
 USERPID ACCESS COMMAND
 /dev/snd/controlC2:  michael   20842 F pulseaudio
 /dev/snd/controlC0:  michael   20842 F pulseaudio
 /dev/snd/pcmC0D0p:   michael   20842 F...m pulseaudio
 /dev/snd/controlC1:  michael   20842 F pulseaudio
CurrentDesktop: Unity
Date: Sat Oct 11 22:50:15 2014
InstallationDate: Installed on 2014-10-07 (3 days ago)
InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.2)
PackageArchitecture: all
SourcePackage: alsa-driver
Symptom: audio
Symptom_AlsaPlaybackTest: ALSA playback test through plughw:STX successful
Symptom_Card: HD Webcam C910 - USB Device 0x46d:0x821
Symptom_PulsePlaybackTest: PulseAudio playback test successful
Symptom_Type: None of the above
Title: [AV200 - Xonar STX, playback] Playback problem
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 08/20/2013
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 1401
dmi.board.asset.tag: To be filled by O.E.M.
dmi.board.name: P8H77-M PRO
dmi.board.vendor: ASUSTeK COMPUTER INC.
dmi.board.version: Rev X.0x
dmi.chassis.asset.tag: Asset-1234567890
dmi.chassis.type: 3
dmi.chassis.vendor: Chassis Manufacture
dmi.chassis.version: Chassis Version
dmi.modalias: 
dmi:bvnAmericanMegatrendsInc.:bvr1401:bd08/20/2013:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnP8H77-MPRO:rvrRevX.0x:cvnChassisManufacture:ct3:cvrChassisVersion:
dmi.product.name: System Product Name
dmi.product.version: System Version
dmi.sys.vendor: System manufacturer

** Affects: alsa-driver (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug third-party-packages trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380046

Title:
  [AV200 - Xonar STX, playback] Loud pop when switching to headphones

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1380046/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1377007] Re: Delay in response to user actions in Ubuntu 14.10 on cards AMD

2014-10-11 Thread Tamir
on the kernel 3.16.0-21-generic # 28-Ubuntu SMP Mon Oct 6 16:00:43 UTC
2014 x86_64 x86_64 x86_64 GNU / Linux to normal  :) - no delay/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1377007

Title:
  Delay in response to user actions in Ubuntu 14.10 on cards AMD

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1377007/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380045] [NEW] macchanger invalid options, -A and -a doing the same thing

2014-10-11 Thread Andreas Marc
Public bug reported:

Hello,

I am using macchanger 1.7.0-1 on Ubuntu 14.04, when I try to change the
mac using -A, I get the same result as -a, the last 24 bits (serial
number) are not changed even if they should be, or at least I don't see
the logic of these two options.

  -a,  --anotherSet random vendor MAC of the same kind
  -ASet random vendor MAC of any kind

This, combined with bug 1316278, which does not allow you to randomly
set a mac address, makes this program useless, and a potential security
vulnerability for those who are using it to conceal their identity, and
I am not talking here about wifi crackers, I am talking about
dissidents, politically oppressed individual that can be easily
identified as the serial number of the device is preserved.

** Affects: macchanger (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380045

Title:
  macchanger invalid options, -A and -a doing the same thing

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/macchanger/+bug/1380045/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 33883] Re: hidden files not included in directory 'properties'

2014-10-11 Thread marco.pallotta
Confirmed on 14.04 too.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/33883

Title:
  hidden files not included in directory 'properties'

To manage notifications about this bug go to:
https://bugs.launchpad.net/nautilus/+bug/33883/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1315898] Re: Light-Locker not working in Lubuntu 14.04

2014-10-11 Thread Josep Pujadas-Jubany
Tested with Lubuntu 14.04 (32 bit  64 bit) up to date.

I think the interaction between light-locker, xfce4-power-manager and X
is quite confusing.

I had to disable the screensaver for a notebook connected that plays
music to an audio amplifier.

It was hard to disable it...

Finally I did:

1. Moved to the left (never) the screensaver buttons at light-locker-settings. 
Apply button.


This generated:

~/.config/autostart/light-locker.desktop

with this Exec line:

Exec=light-locker --lock-after-screensaver=0 --no-lock-on-suspend --no-
late-locking

However, if I disable light-locker with light-locker-settings the Exec
line has nothing

Exec=

I think this is a bug, because in this case light-locker runs on my
system (despite the Exec=) with its defaults.

~/.config/autostart/screensaver-settings-desktop is also generated. This
file controls the X screensaver settings. The Exec line says:

Exec=xset s 0 dpms 0 0 0

So, the screensaver for the X will be disabled and dpms will not be
applied for the screen (man xset).

2. Move to the left (never) the screensaver buttons (OnAC/Screen, 
OnBattery/Screen) at xfce4-power-manager-settings
===
 

If I don't make this second step, screensaver continues to working and
the screen is also locked.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1315898

Title:
  Light-Locker not working in Lubuntu 14.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/light-locker/+bug/1315898/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370859] Re: Error! Bad return status for module build on kernel: 3.16.0-16-generic (x86_64)

2014-10-11 Thread dino99
Still getting that error:

cd /var/lib/dkms/nvidia-331/331.89/build; make module 
SYSSRC=/lib/modules/3.16.0-22-generic/build 
SYSOUT=/lib/modules/3.16.0-22-generic/build 
KBUILD_EXTMOD=/var/lib/dkms/nvidia-331/331.89/build
make[1]: Entering directory '/var/lib/dkms/nvidia-331/331.89/build'
NVIDIA: calling KBUILD...
make[2]: Entering directory '/usr/src/linux-headers-3.16.0-22-generic'
test -e include/generated/autoconf.h -a -e include/config/auto.conf || (
\
echo 2;   \
echo 2   ERROR: Kernel configuration is invalid.;   \
echo 2  include/generated/autoconf.h or include/config/auto.conf are 
missing.;\
echo 2  Run 'make oldconfig  make prepare' on kernel src to fix 
it.;  \
echo 2 ;  

Could not this be fixed ? That issue is met by many users.

Devtalk: https://devtalk.nvidia.com/default/topic/769055/dkms-fails-to-
compile-nvidia-modules-340-32-343-13-during-kernel-3-16-1-compile-
process-on-debia/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370859

Title:
  Error! Bad return status for module build on kernel: 3.16.0-16-generic
  (x86_64)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-331/+bug/1370859/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 503841] Re: kio_file uses masses of memory after some time running

2014-10-11 Thread gaara
I have created a new bug, because I'm not sure the the link at #3 is the same.
https://bugs.kde.org/show_bug.cgi?id=339871

** Summary changed:

- Ktorrent uses masses of memory after some time running
+ kio_file uses masses of memory after some time running

** Bug watch added: KDE Bug Tracking System #339871
   https://bugs.kde.org/show_bug.cgi?id=339871

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/503841

Title:
  kio_file uses masses of memory after some time running

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dolphin/+bug/503841/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1306917] Re: light-locker: screen always automatically locked

2014-10-11 Thread Josep Pujadas-Jubany
I think the interaction between light-locker, xfce4-power-manager and X
is quite confusing.

Please see https://bugs.launchpad.net/ubuntu/+source/light-
locker/+bug/1315898/comments/9

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1306917

Title:
  light-locker: screen always automatically locked

To manage notifications about this bug go to:
https://bugs.launchpad.net/light-locker-settings/+bug/1306917/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379431] Re: Eclipse crashes very often because of problems with GTK

2014-10-11 Thread JPTTEST
see https://bugs.eclipse.org/bugs/show_bug.cgi?id=430736

** Bug watch added: Eclipse bugs #430736
   https://bugs.eclipse.org/bugs/show_bug.cgi?id=430736

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379431

Title:
  Eclipse crashes very often because of problems with GTK

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eclipse/+bug/1379431/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


Re: [Bug 1265192] Re: Install/reinstall wipes out all/other partitions

2014-10-11 Thread sachit
+1 for what @Bruno said. The before after is definitely a good idea. Will
it be very hard to put in considering it was once a part of the installer?

On Sat, Oct 11, 2014 at 12:39 AM, Bruno Nova 1265...@bugs.launchpad.net
wrote:

 In my humble opinion, besides fixing the OS detection and ambiguous
 labels, a final confirmation step should be added after the
 simple/advanced partitioning step (like others have suggested).

 That step should detail the partitioning changes and warn the user that
 clicking Install Now will write the changes to disk and ask for
 confirmation.
 Something like the Ubuntu installer used to have:
 http://linux4us.org/images/ubuntu_8.10/install7.png

 It could also display the before and after disk(s) partitions in
 that step, or before in the simple partitioning step like it used to:
 http://www.dedoimedo.com/images/computers_new_1/ubuntu-install-
 partitioning.jpg

 The older versions of the Ubuntu installer made a better job here.

 --
 You received this bug notification because you are subscribed to the bug
 report.
 https://bugs.launchpad.net/bugs/1265192

 Title:
   Install/reinstall wipes out all/other partitions

 Status in elementary OS:
   Triaged
 Status in “ubiquity” package in Ubuntu:
   Confirmed
 Status in “ubuntu-livecd-image” package in Ubuntu:
   Confirmed
 Status in “ubiquity” source package in Trusty:
   Triaged
 Status in “ubuntu-livecd-image” source package in Trusty:
   Confirmed

 Bug description:
   Brand new Samsung laptop with UEFI. I had installed 13.04 Ubuntu but on
 reboot I never saw the 'grub' style menu. It just kept going into Windows
 8.1.  So I got the 13.10 version (64 bit) and choose Reinstall Ubuntu
 (That may not be the exact text)
   It removed all the partiions including the recovery partitions. I do
 have a backup for the windows install, but I was very surprised that this
 happened.
   On a positive note I now have Ububtu up and running on my machine.
   This is not my first time with Ubuntu. I have installed Ubuntu alongside
 WinXp, Vista and Windows 7. I've used Ubuntu desktop for over 6 years.
   If you would like me to try something to replicate this. .. I could
 shrink my existing partion make another one - reinstall and see if it
 whacks that one. I can do this now .. I'm still moving into this laptop so
 starting over is not so bad.

   Steve Devine

 To manage notifications about this bug go to:
 https://bugs.launchpad.net/elementaryos/+bug/1265192/+subscriptions


-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1265192

Title:
  Install/reinstall wipes out all/other partitions

To manage notifications about this bug go to:
https://bugs.launchpad.net/elementaryos/+bug/1265192/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1296487] Re: Initial zoom level is slightly under 100%

2014-10-11 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: ubuntu-themes (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1296487

Title:
  Initial zoom level is slightly under 100%

To manage notifications about this bug go to:
https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1296487] Re: Initial zoom level is slightly under 100%

2014-10-11 Thread Launchpad Bug Tracker
Status changed to 'Confirmed' because the bug affects multiple users.

** Changed in: ubuntu-themes (Ubuntu)
   Status: New = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1296487

Title:
  Initial zoom level is slightly under 100%

To manage notifications about this bug go to:
https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1296487] Re: Initial zoom level is slightly under 100%

2014-10-11 Thread Nobuto MURATA
** Package changed: light-themes (Ubuntu) = ubuntu-themes (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1296487

Title:
  Initial zoom level is slightly under 100%

To manage notifications about this bug go to:
https://bugs.launchpad.net/eog/+bug/1296487/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 874283]

2014-10-11 Thread Vincent Fortier
Issue still present using Ubuntu 14.04.  While this may be related to a
wrong behaviour from the server side it works flawlessly using pidgin.

Related launchpad bug: https://bugs.launchpad.net/ubuntu/+source
/telepathy-gabble/+bug/874283

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/874283

Title:
  Empathy IM Client does not connect to Zimbra via XMPP

To manage notifications about this bug go to:
https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 727041] Re: unity-window-decorator crashed with SIGSEGV in g_closure_invoke()

2014-10-11 Thread Christopher
It seems to have resurfaced in 14.10. Mine crashes on boot, then
restores itself.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/727041

Title:
  unity-window-decorator crashed with SIGSEGV in g_closure_invoke()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/compiz/+bug/727041/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 874283]

2014-10-11 Thread Vincent Fortier
And may be related or duplicate of this as well:
https://bugs.freedesktop.org/show_bug.cgi?id=39931

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/874283

Title:
  Empathy IM Client does not connect to Zimbra via XMPP

To manage notifications about this bug go to:
https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380051] [NEW] characters in svg images wiggle

2014-10-11 Thread Andreas E.
Public bug reported:

When zooming an SVG image that contains texts, the positions of
characters wiggle. The characters move sidewards closer together or
farer away, as if the kerning would be different at every zoom level.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: eog 3.10.2-0ubuntu5
ProcVersionSignature: Ubuntu 3.13.0-32.57-generic 3.13.11.4
Uname: Linux 3.13.0-32-generic x86_64
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
CurrentDesktop: Unity
Date: Sat Oct 11 12:51:15 2014
EcryptfsInUse: Yes
InstallationDate: Installed on 2014-02-02 (250 days ago)
InstallationMedia: Ubuntu-GNOME 14.04 Trusty Tahr - Alpha amd64 (20140201)
SourcePackage: eog
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: eog (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug third-party-packages trusty

** Attachment added: video showing the issue
   
https://bugs.launchpad.net/bugs/1380051/+attachment/4231424/+files/eog-svg-text.mp4

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380051

Title:
  characters in svg images wiggle

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/eog/+bug/1380051/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380050] [NEW] Ubuntu boots to a black screen

2014-10-11 Thread Paolo
Public bug reported:

Ubuntu boots to a black screen. I can hear the opening chimes, but I
cannot see anything until I switch my screen off and on again. Then I
can see the login screen.

ProblemType: Bug
DistroRelease: Ubuntu 14.04
Package: xorg 1:7.7+1ubuntu8
ProcVersionSignature: Ubuntu 3.13.0-36.63-generic 3.13.11.6
Uname: Linux 3.13.0-36-generic x86_64
.tmp.unity.support.test.0:
 
ApportVersion: 2.14.1-0ubuntu3.5
Architecture: amd64
CompizPlugins: No value set for 
`/apps/compiz-1/general/screen0/options/active_plugins'
CompositorRunning: compiz
CompositorUnredirectDriverBlacklist: '(nouveau|Intel).*Mesa 8.0'
CompositorUnredirectFSW: true
Date: Sat Oct 11 12:49:21 2014
DistUpgraded: Fresh install
DistroCodename: trusty
DistroVariant: ubuntu
ExtraDebuggingInterest: Yes, if not too technical
GraphicsCard:
 Advanced Micro Devices, Inc. [AMD/ATI] RV610 [Radeon HD 2400 PRO] [1002:94c3] 
(prog-if 00 [VGA controller])
   Subsystem: Micro-Star International Co., Ltd. [MSI] Device [1462:1041]
InstallationDate: Installed on 2014-09-26 (14 days ago)
InstallationMedia: Ubuntu 14.04.1 LTS Trusty Tahr - Release amd64 (20140722.2)
MachineType: HP-Pavilion KA869AA-ABZ a6335.it
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-3.13.0-36-generic 
root=/dev/mapper/ubuntu--vg-root ro plymouth:debug drm.debug=0xe
SourcePackage: xorg
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 10/29/2007
dmi.bios.vendor: Phoenix Technologies, LTD
dmi.bios.version: 5.13
dmi.board.name: NARRA2
dmi.board.vendor: ASUSTek Computer INC.
dmi.board.version: 2.00
dmi.chassis.type: 3
dmi.chassis.vendor: Hewlett-Packard
dmi.chassis.version: Chassis Version
dmi.modalias: 
dmi:bvnPhoenixTechnologies,LTD:bvr5.13:bd10/29/2007:svnHP-Pavilion:pnKA869AA-ABZa6335.it:pvr:rvnASUSTekComputerINC.:rnNARRA2:rvr2.00:cvnHewlett-Packard:ct3:cvrChassisVersion:
dmi.product.name: KA869AA-ABZ a6335.it
dmi.sys.vendor: HP-Pavilion
version.compiz: compiz 1:0.9.11.2+14.04.20140714-0ubuntu1
version.ia32-libs: ia32-libs N/A
version.libdrm2: libdrm2 2.4.52-1
version.libgl1-mesa-dri: libgl1-mesa-dri 10.1.3-0ubuntu0.1
version.libgl1-mesa-dri-experimental: libgl1-mesa-dri-experimental N/A
version.libgl1-mesa-glx: libgl1-mesa-glx 10.1.3-0ubuntu0.1
version.xserver-xorg-core: xserver-xorg-core 2:1.15.1-0ubuntu2.1
version.xserver-xorg-input-evdev: xserver-xorg-input-evdev 1:2.8.2-1ubuntu2
version.xserver-xorg-video-ati: xserver-xorg-video-ati 1:7.3.0-1ubuntu3.1
version.xserver-xorg-video-intel: xserver-xorg-video-intel 2:2.99.910-0ubuntu1.1
version.xserver-xorg-video-nouveau: xserver-xorg-video-nouveau 1:1.0.10-1ubuntu2
xserver.bootTime: Sat Oct 11 12:48:11 2014
xserver.configfile: default
xserver.devices:
 inputPower Button KEYBOARD, id 6
 inputPower Button KEYBOARD, id 7
 inputMLK Trust Keyboard 14909 KEYBOARD, id 8
 inputMLK Trust Keyboard 14909 KEYBOARD, id 9
xserver.errors:
 
xserver.logfile: /var/log/Xorg.0.log
xserver.version: 2:1.15.1-0ubuntu2.1
xserver.video_driver: radeon

** Affects: xorg (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-bug compiz-0.9 trusty ubuntu

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380050

Title:
  Ubuntu boots to a black screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1380050/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 874283] Re: Empathy IM Client does not connect to Zimbra via XMPP

2014-10-11 Thread Bug Watch Updater
** Bug watch added: freedesktop.org Bugzilla #39931
   https://bugs.freedesktop.org/show_bug.cgi?id=39931

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/874283

Title:
  Empathy IM Client does not connect to Zimbra via XMPP

To manage notifications about this bug go to:
https://bugs.launchpad.net/telepathy-gabble/+bug/874283/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379965] Re: linking error with cmake

2014-10-11 Thread James Stone
Sorry about this - seems it may be a problem with the static library I
was using. Will do some more investigation before re-reporting.

** Changed in: opencv (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379965

Title:
  linking error with cmake

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/opencv/+bug/1379965/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 859560] Re: Gedit line number margin doesn't scale with font size

2014-10-11 Thread Joseph Mansigian
I can confirm the Gedit line number does not scale with font size
problem reported by Paul Duke.  This is a serious issue that forces me
to keep a magnifying glass by my machine when I work.   There has been
insensitivity to this problem.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/859560

Title:
  Gedit line number margin doesn't scale with font size

To manage notifications about this bug go to:
https://bugs.launchpad.net/gedit/+bug/859560/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380053] [NEW] package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5

2014-10-11 Thread Jamie Lawler
Public bug reported:

This just happened when trying to upgrade on utopic

ProblemType: Package
DistroRelease: Ubuntu 14.10
Package: nvidia-prime 0.6.6
ProcVersionSignature: Ubuntu 3.16.0-21.28-generic 3.16.4
Uname: Linux 3.16.0-21-generic x86_64
NonfreeKernelModules: nvidia
ApportVersion: 2.14.7-0ubuntu5
Architecture: amd64
Date: Sat Oct 11 11:58:01 2014
DuplicateSignature: package:nvidia-prime:0.6.6:subprocess new pre-removal 
script returned error exit status 5
ErrorMessage: subprocess new pre-removal script returned error exit status 5
InstallationDate: Installed on 2014-06-24 (108 days ago)
InstallationMedia: Ubuntu 14.04 LTS Trusty Tahr - Release amd64 (20140417)
SourcePackage: nvidia-prime
Title: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new 
pre-removal script returned error exit status 5
UpgradeStatus: No upgrade log present (probably fresh install)

** Affects: nvidia-prime (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: amd64 apport-package utopic

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380053

Title:
  package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new
  pre-removal script returned error exit status 5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1380053/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1251469] Re: Update Extreme Tux Racer package to new 0.6 version

2014-10-11 Thread Mantas Kriaučiūnas
** Summary changed:

- [Create Package] Extreme Tux Racer 0.6 (New version)
+ Update Extreme Tux Racer package to new 0.6 version

** Also affects: extremetuxracer (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1251469

Title:
  Update Extreme Tux Racer package to new 0.6 version

To manage notifications about this bug go to:
https://bugs.launchpad.net/getdeb.net/+bug/1251469/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380053] Re: package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new pre-removal script returned error exit status 5

2014-10-11 Thread Apport retracing service
** Tags removed: need-duplicate-check

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380053

Title:
  package nvidia-prime 0.6.6 failed to install/upgrade: subprocess new
  pre-removal script returned error exit status 5

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-prime/+bug/1380053/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1378245] Re: citrain could use a more accurate way to upgrade from silos

2014-10-11 Thread Antti Kaijanmäki
How much effort would it be to actually build pristine images per silo
that contain the packages in the silo?

Each time we have to make the images writable and add silo ppa's
manually and run apt-get we effectively taint the testing results as
they don't match the state that a released image would have.

Simple case: as the root is made writable we would not catch the
situation where a component is actually depending on write access which
would not be possible under ro root.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1378245

Title:
  citrain could use a more accurate way to upgrade from silos

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/phablet-tools/+bug/1378245/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1380054] Re: On mako, when you have a big circle about activity in a day, it's show in the pin unlock screen

2014-10-11 Thread Riccardo Padovani
** Attachment added: 2.png
   
https://bugs.launchpad.net/ubuntu/+source/unity-greeter/+bug/1380054/+attachment/4231436/+files/2.png

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1380054

Title:
  On mako, when you have a big circle about activity in a day, it's show
  in the pin unlock screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unity-greeter/+bug/1380054/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   3   4   5   >