[Bug 1779721] Re: systemd-networkd does not configure DHCPv4
This is not really a bug in systemd-networkd. It just adheres more strictly to the standard. In this case the DHCP server doesn't send the Option 51 "IP Address Lease Time" in the DHCPOFFER. RFC2131 declares this a MUST (see Table 3: Fields and options used by DHCP servers). I encountered a similar problem where a DHCP server doesn't send the "Server identifier" option. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1779721 Title: systemd-networkd does not configure DHCPv4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1779721/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1619411] Re: keepass2 databases can't be imported into keepassx
KeePassX supports .kdbx databases starting with version 2.0 (Ubuntu >= 16.04). ** Changed in: keepassx (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1619411 Title: keepass2 databases can't be imported into keepassx To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keepassx/+bug/1619411/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232
** Patch added: "trusty-security debdiff" https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548197/+files/prosody_0.9.1-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1532943 Title: CVE-2016-1231 and CVE-2016-1232 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232
** Patch added: "wily-security debdiff" https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548198/+files/prosody_0.9.8-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1532943 Title: CVE-2016-1231 and CVE-2016-1232 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232
xenial (0.9.9-1) is already fixed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1532943 Title: CVE-2016-1231 and CVE-2016-1232 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1532943] [NEW] CVE-2016-1231 and CVE-2016-1232
*** This bug is a security vulnerability *** Public security bug reported: I'll add debdiffs based on the Debian security update: https://lists.debian.org/debian-security-announce/2016/msg7.html ** Affects: prosody (Ubuntu) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-1231 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-1232 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1532943 Title: CVE-2016-1231 and CVE-2016-1232 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1524318] Re: KeePassX Launcher icon is broken
vivid is also affected. Replacing the libmagickcore-extra build-dependency with librsvg2-bin seems to fix it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1524318 Title: KeePassX Launcher icon is broken To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/keepassx/+bug/1524318/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to kate in Ubuntu. https://bugs.launchpad.net/bugs/1449029 Title: KDEInit could not launch /usr/bin/kate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate
** Also affects: kate (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: kate (Ubuntu Wily) Importance: Medium Status: Confirmed ** Changed in: kate (Ubuntu Vivid) Status: New = Triaged ** Changed in: kate (Ubuntu Wily) Status: Confirmed = Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1449029 Title: KDEInit could not launch /usr/bin/kate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate
I've uploaded a fix to vivid, waiting for approval by the SRU team. wily will be fixed once 15.04 lands (bug is already fixed upstream). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1449029 Title: KDEInit could not launch /usr/bin/kate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1446856] Re: Please update quassel to 0.12.1
0.12.2 is in vivid. ** Changed in: quassel (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1446856 Title: Please update quassel to 0.12.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1446856/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1455990] Re: quassel-core generates an insecure certificate upon installation
As it's self signed certificate the signature hash algorithm doesn't matter much. 4096 bit seems a bit excessive, no? Slightly offtopic: Quassel stores the md5sum of certs the user has accepted. That's probably a bad idea. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1455990 Title: quassel-core generates an insecure certificate upon installation To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1455990/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1452825] Re: Update to include Wily (and Jessie's release)
** Tags added: verification-done-vivid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1452825 Title: Update to include Wily (and Jessie's release) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/distro-info-data/+bug/1452825/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451260] Re: Directory traversal vulnerability
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390320/+files/unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title: Directory traversal vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451260] Re: Directory traversal vulnerability
** Patch added: unrar-nonfree_4.0.3-1ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390318/+files/unrar-nonfree_4.0.3-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title: Directory traversal vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451260] Re: Directory traversal vulnerability
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390319/+files/unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title: Directory traversal vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451260] Re: Directory traversal vulnerability
I'm not aware of any CVE for this issue. Attached are debdiffs for precise, trusty and utopic. vivid has 5.2.7, so not affected. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title: Directory traversal vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451260] [NEW] Directory traversal vulnerability
*** This bug is a security vulnerability *** Public security bug reported: unrar-nonfree before version 5.2.7 suffers from a symlink directory traversal vulnerability. More details at: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171 ** Affects: unrar-nonfree (Ubuntu) Importance: Undecided Status: Fix Released ** Affects: unrar-nonfree (Ubuntu Precise) Importance: Undecided Status: New ** Affects: unrar-nonfree (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: unrar-nonfree (Ubuntu Utopic) Importance: Undecided Status: New ** Affects: unrar-nonfree (Debian) Importance: Unknown Status: Unknown ** Bug watch added: Debian Bug tracker #774171 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171 ** Also affects: unrar-nonfree (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171 Importance: Unknown Status: Unknown ** Also affects: unrar-nonfree (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: unrar-nonfree (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: unrar-nonfree (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: unrar-nonfree (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title: Directory traversal vulnerability To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1448911] Re: Execute initDbSession() on DB reconnects
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-3427 ** Also affects: quassel (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Trusty) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448911 Title: Execute initDbSession() on DB reconnects To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1448911] Re: Execute initDbSession() on DB reconnects
** Patch added: quassel_0.10.1-0ubuntu1.2.debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389172/+files/quassel_0.10.1-0ubuntu1.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448911 Title: Execute initDbSession() on DB reconnects To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1448911] Re: Execute initDbSession() on DB reconnects
Attached are debdiffs that fix this vulnerability and CVE-2015-2778/CVE-2015-2779 in trusty and utopic. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2778 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2779 ** Patch added: quassel_0.10.0-0ubuntu2.2.debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389171/+files/quassel_0.10.0-0ubuntu2.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1448911 Title: Execute initDbSession() on DB reconnects To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450037] Re: CVE-2015-1868
** Patch added: pdns_3.3-2ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387837/+files/pdns_3.3-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450037] Re: CVE-2015-1868
debdiffs follow. precise is not affected (only version 3.2 and up). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450037] Re: CVE-2015-1868
** Patch added: pdns_3.4.1-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387839/+files/pdns_3.4.1-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450037] Re: CVE-2015-1868
** Patch added: pdns_3.3.1-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387838/+files/pdns_3.3.1-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450037] [NEW] CVE-2015-1868
*** This bug is a security vulnerability *** Public security bug reported: pdns is vulnerable to a label decompression bug can cause crashes on specific platforms: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/ ** Affects: pdns (Ubuntu) Importance: Undecided Status: New ** Affects: pdns (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: pdns (Ubuntu Utopic) Importance: Undecided Status: New ** Affects: pdns (Ubuntu Vivid) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-1868 ** Also affects: pdns (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: pdns (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: pdns (Ubuntu Utopic) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
I have verified that the error message is gone with 5.5.9+dfsg- 1ubuntu4.8 and the php5-fpm logs are rotated correctly. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
I have verified that the error message is gone with 5.5.9+dfsg- 1ubuntu4.8 and the php5-fpm logs are rotated correctly. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
release is automatically redirected to release-proposed nowadays so it doesn't matter which one you use. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
release is automatically redirected to release-proposed nowadays so it doesn't matter which one you use. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL
We should probably also add mysql.service next to postgres. Second, neither the systemd unit file nor the upstart script had support for the DAEMON_OPTS variable from /etc/default/quasselcore. This made it difficult for administrators to add extra arguments, which is especially true on systemd since the unit file is silently overwritten every time the package is updated. Using default files is discouraged so we shouldn't add new options, see: https://wiki.debian.org/systemd/Packaging#overriding_options_and_.2Fetc.2Fdefault_handling Changes to systemd units aren't overwritten if you do it right. You want to call: systemctl edit quasselcore.service And type something like: [Service] ExecStart=... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1432161 Title: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1432161/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL
I'm not sure where you read this. Multiple ExecStart are allowed (but of course not what you actually want). https://fedoraproject.org/wiki/Systemd#How_do_I_customize_a_unit_file.2F_add_a_custom_unit_file.3F says you can add an empty ExecStart= line and then the ExecStart=... you want. The man page says the same: If the empty string is assigned to this option, the list of commands to start is reset, prior assignments of this option will have no effect. [Service] ExecStart= ExecStart=... Anyway the debdiff looks good. I'll incorporate it into the next upload. -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to quassel in Ubuntu. https://bugs.launchpad.net/bugs/1432161 Title: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1432161/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1431008] Re: Please update quassel to 0.12-rc1
** Changed in: quassel (Ubuntu) Status: New = In Progress ** Changed in: quassel (Ubuntu) Assignee: (unassigned) = Felix Geyer (debfx) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1431008 Title: Please update quassel to 0.12-rc1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1431008/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
Attached is a debdiff that backports the logrotate changes from utopic. ** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart
Attached is a debdiff that backports the logrotate changes from utopic. ** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors after package switched to upstart To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1422134] Re: please sync virtualbox from debian experimental
** Package changed: virtualbox-guest-additions (Ubuntu) = virtualbox- guest-additions-iso (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422134 Title: please sync virtualbox from debian experimental To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1422134/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1404475] Re: Multi-Arch support
Please consider sponsoring the attached changes: * Mark libopus0, libopus-dev and libopus-dbg as Multi-Arch: same. (LP: #1404475) * Update the symbols file. ** Patch added: opus_1.1-0ubuntu2.debdiff https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+attachment/4291589/+files/opus_1.1-0ubuntu2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1404475 Title: Multi-Arch support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1404475] Re: Multi-Arch support
** Changed in: opus (Ubuntu) Status: New = Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1404475 Title: Multi-Arch support To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1402175] Re: Please backport pasma-widget-cwp 1.11.1 from utopic
It makes more sense to push this to trusty-updates so everyone benefits from the bugfixes: https://wiki.ubuntu.com/StableReleaseUpdates The changes in 1.11.1 are only related to website parsing so you can basically take the utopic package and add a changelog entry with the version 1.11.1-1~ubuntu14.04.1. ** Project changed: trusty-backports = plasma-widget-cwp (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1402175 Title: Please backport pasma-widget-cwp 1.11.1 from utopic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/plasma-widget-cwp/+bug/1402175/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1384355] Re: ownCloud should be removed
Your data is still in /var/lib/owncloud/data/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384355 Title: ownCloud should be removed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/owncloud/+bug/1384355/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1386257] Re: intel-microcode should be installed by default, when the CPU is GenuineIntel
I have strongly mixed feelings about installing intel-microcode by default. Of course it's good to have the latest microcode bugfixes. What worries me is that Intel provides no release notes at all. They didn't even put up a warning for the update that disables the TSX instruction. Removing an instruction while processes are already running is of course highly problematic, see bug #1370352. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1386257 Title: intel-microcode should be installed by default, when the CPU is GenuineIntel To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1386257/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk
In one particular case a trusty-utopic failed because the virtuoso- nepomuk package was still present in rc state. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1389320 Title: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso- nepomuk To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1389320/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk
virtuoso-nepomuk contains the broken init script. The package has been removed after the precise release. Adding a quirk to release-upgrader to remove the init script is the only option I can think of. SRUing the package in precise wouldn't work since that won't affect systems that have been upgraded from precise to trusty. ** Changed in: ubuntu-release-upgrader (Ubuntu) Status: Incomplete = Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1389320 Title: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso- nepomuk To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1389320/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption
** Patch added: utopic debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253035/+files/quassel_0.10.1-0ubuntu1.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1388333 Title: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption
** Patch added: trusty debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253034/+files/quassel_0.10.0-0ubuntu2.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1388333 Title: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1389296] Re: konversation: out-of-bounds read on a heap-allocated array
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8483 -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to konversation in Ubuntu. https://bugs.launchpad.net/bugs/1389296 Title: konversation: out-of-bounds read on a heap-allocated array To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/konversation/+bug/1389296/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption
** Patch added: precise debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4252994/+files/quassel_0.8.0-0ubuntu1.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1388333 Title: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1388333] [NEW] CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption
*** This bug is a security vulnerability *** Public security bug reported: https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 Check for invalid input in encrypted buffers The ECB Blowfish decryption function assumed that encrypted input would always come in blocks of 12 characters, as specified. However, buggy clients or annoying people may not adhere to that assumption, causing the core to crash while trying to process the invalid base64 input. ** Affects: quassel (Ubuntu) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8483 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1388333 Title: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption
** Also affects: quassel (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Precise) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to quassel in Ubuntu. https://bugs.launchpad.net/bugs/1388333 Title: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs
I can confirm that removing linux-image-extra keeps the inintramfs image intact now. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title: Removing linux-image-extra-X-generic deletes initramfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available
Public bug reported: In utopic creating a libvirt VM (through virt-manager or virt-install) fails with: internal error: No PCI buses available. This is caused by an Ubuntu patch in the qemu package that changes the default machine type to pc-i440fx-utopic. It also adds an alias ubuntu for pc-i440fx-utopic. This seems to be the one actually used. libvirt has some rules hard-coded how to set up the PCI bus depending on the machine type. Obviously it doesn't check for ubuntu. Attached is a patch that extend the libvirt checks for the ubuntu machine type. ** Affects: libvirt (Ubuntu) Importance: Undecided Status: New ** Patch added: ubuntu_machine_type.patch https://bugs.launchpad.net/bugs/1379346/+attachment/4229595/+files/ubuntu_machine_type.patch ** Summary changed: - Erro create a VM: internal error: No PCI buses available + Error creating a VM: internal error: No PCI buses available -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to libvirt in Ubuntu. https://bugs.launchpad.net/bugs/1379346 Title: Error creating a VM: internal error: No PCI buses available To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1379346/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available
Public bug reported: In utopic creating a libvirt VM (through virt-manager or virt-install) fails with: internal error: No PCI buses available. This is caused by an Ubuntu patch in the qemu package that changes the default machine type to pc-i440fx-utopic. It also adds an alias ubuntu for pc-i440fx-utopic. This seems to be the one actually used. libvirt has some rules hard-coded how to set up the PCI bus depending on the machine type. Obviously it doesn't check for ubuntu. Attached is a patch that extend the libvirt checks for the ubuntu machine type. ** Affects: libvirt (Ubuntu) Importance: Undecided Status: New ** Patch added: ubuntu_machine_type.patch https://bugs.launchpad.net/bugs/1379346/+attachment/4229595/+files/ubuntu_machine_type.patch ** Summary changed: - Erro create a VM: internal error: No PCI buses available + Error creating a VM: internal error: No PCI buses available -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1379346 Title: Error creating a VM: internal error: No PCI buses available To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1379346/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1265527] Re: astyle is outdated in Trusty
astyle 2.04 will soon be available in trusty-backports. For trusty-updates usually only fixes targeting specific bugs are allowed. ** Changed in: astyle (Ubuntu) Status: Triaged = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1265527 Title: astyle is outdated in Trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/astyle/+bug/1265527/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1376611] [NEW] AppArmor: cupsd not allowed to send signals to third_party
Public bug reported: The cups 1.7.5-3 AppArmor profile has this rule which seems to be ineffective: signal (receive, send) peer=third_party, I get this denial log entry when (re)installing cups: audit: type=1400 audit(1412239287.417:110): apparmor=DENIED operation=signal profile=/usr/sbin/cupsd pid=28964 comm=cupsd requested_mask=send denied_mask=send signal=term peer=/usr/sbin/cupsd//third_party Changing it to the absolute profile name seems to work: signal (receive, send) peer=/usr/sbin/cupsd//third_party, I guess apparmor_parser can't distinguish between a profile named third_party and a subprofile named third_party. ** Affects: cups (Ubuntu) Importance: Undecided Status: New ** Tags: apparmor ** Tags added: apparmor -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1376611 Title: AppArmor: cupsd not allowed to send signals to third_party To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1376611/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1375310] [NEW] Removing linux-image-extra-X-generic deletes initramfs
Public bug reported: Situation: linux-image-X-generic and linux-image-extra-X-generic are both installed When you remove linux-image-extra-X-generic (e.g. switching from -generic to -virtual) /boot/initrd.img-X-generic is deleted in linux-image-extra-X-generic's postrm script. This results into broken boot. At least when / is on LVM etc. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title: Removing linux-image-extra-X-generic deletes initramfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs
This happened with linux-image-extra-3.13.0-36-generic 3.13.0-36.63 but the code in postrm is also present in the latest utopic kernel. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title: Removing linux-image-extra-X-generic deletes initramfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs
No need for logs, it's easy to reproduce. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title: Removing linux-image-extra-X-generic deletes initramfs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374583] Re: Sync libjpeg-turbo 1:1.3.1-3 (main) from Debian unstable (main)
Unsubscribing ubuntu-sponsors as there's nothing to do at the moment. I think now that debian has switched to libjpeg-turbo too there is no reason anymore for an ubuntu delta. You can't say that without actually checking the delta. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374583 Title: Sync libjpeg-turbo 1:1.3.1-3 (main) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libjpeg-turbo/+bug/1374583/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1374685] Re: Sync focuswriter 1.5.3-1 (universe) from Debian unstable (main)
This bug was fixed in the package focuswriter - 1.5.3-1 Sponsored for Jackson Doak (noskcaj) --- focuswriter (1.5.3-1) unstable; urgency=medium * New upstream release -- Graeme Gott gra...@gottcode.org Sun, 17 Aug 2014 12:59:45 + ** Changed in: focuswriter (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1374685 Title: Sync focuswriter 1.5.3-1 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/focuswriter/+bug/1374685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373085] Re: Parser error when using regex profile names in IPC rules
Tested with apparmor 2.8.96~2652-0ubuntu5. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373085 Title: Parser error when using regex profile names in IPC rules To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1373085/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1373085] [NEW] Parser error when using regex profile names in IPC rules
Public bug reported: I tried to add this rule to the firefox profile: unix (send, receive) type=stream peer=(label=/usr/lib/firefox/firefox\{,\*\[^s\]\[^h\]\}//plugincontainer), apparmor_parser fails with: syntax error, unexpected TOK_CONDID, expecting TOK_EQUALS or TOK_IN When I add quotes around the label the parser fails with: Found unexpected character: '' I found this minimal test case: unix peer=(label=\{,\}), and unix peer=(label=\{,\}), ** Affects: apparmor (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373085 Title: Parser error when using regex profile names in IPC rules To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1373085/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
Please revert the 2.20140913.1ubuntu1 upload. After loading the new microcode lots of processes die with [ 43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000] [ 44.201798] traps: dbus-daemon[1277] trap invalid opcode ip:7f848d2f67ab sp:7fff8f3c3bb8 error:0 in libpthread-2.19.so[7f848d2e5000+18000] [ 44.202077] traps: systemd-logind[1287] trap invalid opcode ip:7f8c4bf887ab sp:7fff58f13178 error:0 in libpthread-2.19.so[7f8c4bf77000+18000 [ 44.202101] traps: thermald[1269] trap invalid opcode ip:7fdf60f0c7ab sp:7fffa55068e8 error:0 in libpthread-2.19.so[7fdf60efb000+18000] It's fine after a reboot so it seems to be a problem with upgrading from the 2.20140624.1ubuntu1 microcode to 2.20140913.1ubuntu1. % cat /proc/cpuinfo processor : 0 vendor_id : GenuineIntel cpu family : 6 model : 60 model name : Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz stepping: 3 microcode : 0x1c cpu MHz : 800.000 cache size : 6144 KB physical id : 0 siblings: 4 core id : 0 cpu cores : 4 apicid : 0 initial apicid : 0 fpu : yes fpu_exception : yes cpuid level : 13 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf eagerfpu pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm ida arat epb xsaveopt pln pts dtherm tpr_shadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid bogomips: 6385.61 clflush size: 64 cache_alignment : 64 address sizes : 39 bits physical, 48 bits virtual power management: [...] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
Full dmesg output: [ 43.606830] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1a [ 43.608466] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03 [ 43.608494] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1a [ 43.609327] microcode: CPU1 updated to revision 0x1c, date = 2014-07-03 [ 43.609352] do_trap: 267 callbacks suppressed [ 43.609354] traps: rs:main Q:Reg[1343] trap invalid opcode ip:7f32abd0b7ab sp:7f32a9062848 error:0 [ 43.609355] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x1a [ 43.609358] in libpthread-2.19.so[7f32abcfa000+18000] [ 43.610204] microcode: CPU2 updated to revision 0x1c, date = 2014-07-03 [ 43.610225] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x1a [ 43.611081] microcode: CPU3 updated to revision 0x1c, date = 2014-07-03 [ 43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000] [...] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
Both yes and early work fine. However when I set IUCODE_TOOL_INITRAMFS=no, update the initramfs, reboot and then reinstall intel-microcode I get the same trap invalid opcode. I guess no processes that use libpthread run during early boot when the microcode update is applied. early: [0.00] CPU0 microcode updated early to revision 0x1c, date = 2014-07-03 [0.083506] CPU1 microcode updated early to revision 0x1c, date = 2014-07-03 [0.097821] CPU2 microcode updated early to revision 0x1c, date = 2014-07-03 [0.112006] CPU3 microcode updated early to revision 0x1c, date = 2014-07-03 [0.547442] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1c [0.547513] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1c [0.547587] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x1c [0.547661] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x1c yes: [0.557422] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x16 [0.557496] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x16 [0.557569] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x16 [0.557643] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x16 [2.725811] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x16 [2.727303] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03 [2.727352] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x16 [2.728156] microcode: CPU1 updated to revision 0x1c, date = 2014-07-03 [2.728182] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x16 [2.728954] microcode: CPU2 updated to revision 0x1c, date = 2014-07-03 [2.728996] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x16 [2.729867] microcode: CPU3 updated to revision 0x1c, date = 2014-07-03 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
It looks like this is the microcode update that disables TSX where it is broken. The hle flag is removed from cpuinfo flags (see attached cpuinfo files). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
** Attachment added: cpuinfo-1a.txt https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206807/+files/cpuinfo-1a.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913
** Attachment added: cpuinfo-1c.txt https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206812/+files/cpuinfo-1c.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title: [Feature] Intel new CPU microcode 20140913 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370228] [NEW] init script returns 0 even after parsing failure
Public bug reported: The apparmor init script (and likely the upstart job, but haven't checked) returns exit code 0 even when a profile can't be loaded. In /lib/apparmor/functions foreach_configured_profile first loads profiles from /etc/apparmor.d and then from /var/lib/apparmor/profiles. Parsing errors in the first dir are ignored. The attached patch returns the first non-zero return code or zero if there are no errors. ** Affects: apparmor (Ubuntu) Importance: Undecided Status: New ** Patch added: apparmor_init_exit_code.diff https://bugs.launchpad.net/bugs/1370228/+attachment/4205841/+files/apparmor_init_exit_code.diff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370228 Title: init script returns 0 even after parsing failure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1370228/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1370228] Re: init script returns 0 even after parsing failure
Tested with apparmor 2.8.96~2652-0ubuntu4. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370228 Title: init script returns 0 even after parsing failure To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1370228/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1361354] Re: smokegen generates wrong cast function for smokeqt
This has been fixed in smokegen 4:4.14.0-0ubuntu2. ** Changed in: smokegen (Ubuntu Utopic) Status: Confirmed = Fix Released ** Changed in: smokeqt (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to smokegen in Ubuntu. https://bugs.launchpad.net/bugs/1361354 Title: smokegen generates wrong cast function for smokeqt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/smokegen/+bug/1361354/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1367609] [NEW] AppArmor: Prevents connection to system dbus (disconnected path)
Public bug reported: AppArmor seems to prevent cupsd from connecting to the system dbus: Sep 10 09:06:00 callisto kernel: audit: type=1400 audit(1410332760.203:112): apparmor=DENIED operation=connect info=Failed name lookup - disconnected path error=-13 profile=/usr/sbin/cupsd name=run/dbus/system_bus_socket pid=3608 comm=cupsd requested_mask=rw denied_mask=rw fsuid=0 ouid=0 Sep 10 09:06:31 callisto cupsd[3608]: process 3608: arguments to dbus_connection_unref() were incorrect, assertion connection != NULL failed in file ../../dbus/dbus-connection.c line 2794. Sep 10 09:06:31 callisto cupsd[3608]: This is normally a bug in some application using the D-Bus library. I got these errors since upgrading to utopic (Aug 22). Might be worth noting that I'm using systemd as init. Adding flags=(attach_disconnected) to the /usr/sbin/cupsd profile seems to fix this problem. ** Affects: cups (Ubuntu) Importance: Undecided Status: New ** Tags: apparmor -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1367609 Title: AppArmor: Prevents connection to system dbus (disconnected path) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1367609/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1365163] Re: libvirt-qemu profile needs /dev/shm/spice-* rule for systemd hosts.
The fix is to change the following in debian/apparmor/libvirt-qemu: /run/shm/ r, owner /run/shm/spice.* rw, - /{dev,run}/shm/ r, owner /{dev,run}/shm/spice.* rw, -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1365163 Title: libvirt-qemu profile needs /dev/shm/spice-* rule for systemd hosts. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1365163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1359671] Re: New upstream version 3.13.90
This pygobject update causes virt-manager to crash on startup, see bug #1359815 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1359671 Title: New upstream version 3.13.90 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pygobject/+bug/1359671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 920436] Re: [MIR] yodl
Another month later ... I hope doing parts of the build offline to avoid proper build-dependencies is not considered a permanent solution. If it is a problem to promote these two packages please consider dropping zsh from whatever seed that is pulling it into main. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/920436 Title: [MIR] yodl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/icmake/+bug/920436/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1227883] Re: Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS
Have you tested that stellarium 0.13.0-2 runs fine on 14.04? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1227883 Title: Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS To manage notifications about this bug go to: https://bugs.launchpad.net/trusty-backports/+bug/1227883/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass
4:4.13.95 already includes the fix. ** Also affects: kde4libs (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: kde4libs (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: kde4libs (Ubuntu Trusty) Importance: Undecided Status: New ** Changed in: kde4libs (Ubuntu Utopic) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass
** Patch added: precise debdiff https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166036/+files/kde4libs_4.8.5-0ubuntu0.4.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass
I have verified that polkit authentication (changing login manager settings in system settings) still works with the patch. -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to kde4libs in Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- kubuntu-bugs mailing list kubuntu-b...@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs
[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass
** Patch added: trusty debdiff https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166037/+files/kde4libs_4.13.2a-0ubuntu0.3.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass
I'll work on preparing debdiffs. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1350019] [NEW] CVE-2014-5033: kauth authentication bypass
*** This bug is a security vulnerability *** Public security bug reported: In kauth: Using the PID for authentication is prone to a PID reuse race condition, and a security issue. https://bugzilla.novell.com/show_bug.cgi?id=864716 http://quickgit.kde.org/?p=kdelibs.gita=commith=e4e7b53b71e2659adaf52691d4accc3594203b23 ** Affects: kde4libs (Ubuntu) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-5033 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1206387] Re: openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0
If someone with the appropriate permissions can set this back to Confirmed in Precise, that would be appreciated. Done. ** Changed in: openafs (Ubuntu Precise) Status: Fix Released = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1206387 Title: openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0 To manage notifications about this bug go to: https://bugs.launchpad.net/precise-backports/+bug/1206387/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1335597] [NEW] CVE-2014-3755 and CVE-2014-3756
*** This bug is a security vulnerability *** Public security bug reported: There are two mumble security advisories: http://mumble.info/security/Mumble-SA-2014-005.txt http://mumble.info/security/Mumble-SA-2014-006.txt ** Affects: mumble (Ubuntu) Importance: Undecided Status: New ** Affects: mumble (Debian) Importance: Unknown Status: Unknown ** Bug watch added: Debian Bug tracker #748189 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748189 ** Also affects: mumble (Debian) via http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748189 Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3755 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3756 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1335597 Title: CVE-2014-3755 and CVE-2014-3756 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1335597] Re: CVE-2014-3755 and CVE-2014-3756
Attached is a debdiff for trusty. The same changes should probably apply to saucy but I haven't tested it. The patches are not easily adaptable to the version in precise. ** Patch added: mumble_1.2.4-0.2ubuntu1.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+attachment/4141925/+files/mumble_1.2.4-0.2ubuntu1.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1335597 Title: CVE-2014-3755 and CVE-2014-3756 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
3.5 has been synced to utopic, see bug #1323041 ** Changed in: mod-wsgi (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
3.5 has been synced to utopic, see bug #1323041 ** Changed in: mod-wsgi (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242
*** This bug is a security vulnerability *** Public security bug reported: Two vulnerabilities have been discovered in mod-wsgi: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html CVE-2014-0240 affects all Ubuntu releases. CVE-2014-0242 affects = precise. ** Affects: mod-wsgi (Ubuntu) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0240 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0242 -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no source differences in Ubuntu. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
debdiff for trusty attached. The same can be applied to saucy. ** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
debdiff for precise attached ** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- Ubuntu-server-bugs mailing list Ubuntu-server-bugs@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs
[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242
*** This bug is a security vulnerability *** Public security bug reported: Two vulnerabilities have been discovered in mod-wsgi: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html CVE-2014-0240 affects all Ubuntu releases. CVE-2014-0242 affects = precise. ** Affects: mod-wsgi (Ubuntu) Importance: Undecided Status: New ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0240 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-0242 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
debdiff for precise attached ** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
debdiff for trusty attached. The same can be applied to saucy. ** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no source differences in Ubuntu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1315742] Re: Segmentation fault on tar_extract_all in 14.04/1.2.20-3
Seems like a good candidate for a stable release update, not for backports. ** Changed in: trusty-backports Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1315742 Title: Segmentation fault on tar_extract_all in 14.04/1.2.20-3 To manage notifications about this bug go to: https://bugs.launchpad.net/trusty-backports/+bug/1315742/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1307725] Re: Multiple security vulnerabilities
Thanks, here is a debdiff for saucy. ** Patch added: virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4085763/+files/virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1307725 Title: Multiple security vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1307725] Re: Multiple security vulnerabilities
trusty has the latest VirtualBox release which is not affected by these vulnerabilities. ** Changed in: virtualbox (Ubuntu Trusty) Status: Confirmed = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1307725 Title: Multiple security vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1307725] [NEW] Multiple security vulnerabilities
*** This bug is a security vulnerability *** Public security bug reported: VirtualBox has accumulated multiple security vulnerabilities over time. This is a bug to track the progress on fixing them (at least in precise). ** Affects: virtualbox (Ubuntu) Importance: Undecided Status: Invalid ** Affects: virtualbox (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: virtualbox (Ubuntu Precise) Importance: Undecided Status: New ** Changed in: virtualbox (Ubuntu) Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1307725 Title: Multiple security vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1307725] Re: Multiple security vulnerabilities
Attached is a debdiff for precise that basically takes all the security fixes from the yet-unreleased wheezy-security 4.1.18-dfsg-2+deb7u3 package. I have performed basic functionality testing (booting Grml into graphical mode in a VM). ** Patch added: virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4083882/+files/virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1307725 Title: Multiple security vulnerabilities To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1293704] Re: Kleopatra don't support s/mime
Thanks for testing. Attached is a cleaned up debdiff. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1293704 Title: Kleopatra don't support s/mime To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gpgme1.0/+bug/1293704/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs