[Bug 1779721] Re: systemd-networkd does not configure DHCPv4

2018-08-06 Thread Felix Geyer
This is not really a bug in systemd-networkd. It just adheres more
strictly to the standard.

In this case the DHCP server doesn't send the Option 51 "IP Address
Lease Time" in the DHCPOFFER. RFC2131 declares this a MUST (see Table 3:
Fields and options used by DHCP servers).

I encountered a similar problem where a DHCP server doesn't send the
"Server identifier" option.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1779721

Title:
  systemd-networkd does not configure DHCPv4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netplan.io/+bug/1779721/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1619411] Re: keepass2 databases can't be imported into keepassx

2016-09-01 Thread Felix Geyer
KeePassX supports .kdbx databases starting with version 2.0 (Ubuntu >=
16.04).

** Changed in: keepassx (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1619411

Title:
  keepass2 databases can't be imported into keepassx

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/keepassx/+bug/1619411/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
** Patch added: "trusty-security debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548197/+files/prosody_0.9.1-1ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943

Title:
  CVE-2016-1231 and CVE-2016-1232

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
** Patch added: "wily-security debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548198/+files/prosody_0.9.8-1ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943

Title:
  CVE-2016-1231 and CVE-2016-1232

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
xenial (0.9.9-1) is already fixed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943

Title:
  CVE-2016-1231 and CVE-2016-1232

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1532943] [NEW] CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

I'll add debdiffs based on the Debian security update:
https://lists.debian.org/debian-security-announce/2016/msg7.html

** Affects: prosody (Ubuntu)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1231

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1232

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943

Title:
  CVE-2016-1231 and CVE-2016-1232

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1524318] Re: KeePassX Launcher icon is broken

2015-12-09 Thread Felix Geyer
vivid is also affected.
Replacing the libmagickcore-extra build-dependency with librsvg2-bin seems to 
fix it.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1524318

Title:
  KeePassX Launcher icon is broken

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/keepassx/+bug/1524318/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-06-25 Thread Felix Geyer
** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kate in Ubuntu.
https://bugs.launchpad.net/bugs/1449029

Title:
  KDEInit could not launch /usr/bin/kate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-05-28 Thread Felix Geyer
** Also affects: kate (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: kate (Ubuntu Wily)
   Importance: Medium
   Status: Confirmed

** Changed in: kate (Ubuntu Vivid)
   Status: New = Triaged

** Changed in: kate (Ubuntu Wily)
   Status: Confirmed = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1449029

Title:
  KDEInit could not launch /usr/bin/kate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-05-27 Thread Felix Geyer
I've uploaded a fix to vivid, waiting for approval by the SRU team.
wily will be fixed once 15.04 lands (bug is already fixed upstream).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1449029

Title:
  KDEInit could not launch /usr/bin/kate

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kate/+bug/1449029/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1446856] Re: Please update quassel to 0.12.1

2015-05-19 Thread Felix Geyer
0.12.2 is in vivid.

** Changed in: quassel (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1446856

Title:
  Please update quassel to 0.12.1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1446856/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1455990] Re: quassel-core generates an insecure certificate upon installation

2015-05-18 Thread Felix Geyer
As it's self signed certificate the signature hash algorithm doesn't matter 
much.
4096 bit seems a bit excessive, no?

Slightly offtopic:
Quassel stores the md5sum of certs the user has accepted. That's probably a bad 
idea.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1455990

Title:
  quassel-core generates an insecure certificate upon installation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1455990/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1452825] Re: Update to include Wily (and Jessie's release)

2015-05-08 Thread Felix Geyer
** Tags added: verification-done-vivid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452825

Title:
  Update to include Wily (and Jessie's release)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/distro-info-data/+bug/1452825/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390320/+files/unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260

Title:
  Directory traversal vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_4.0.3-1ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390318/+files/unrar-nonfree_4.0.3-1ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260

Title:
  Directory traversal vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390319/+files/unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260

Title:
  Directory traversal vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
I'm not aware of any CVE for this issue.

Attached are debdiffs for precise, trusty and utopic.
vivid has 5.2.7, so not affected.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260

Title:
  Directory traversal vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1451260] [NEW] Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

unrar-nonfree before version 5.2.7 suffers from a symlink directory
traversal vulnerability.

More details at:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171

** Affects: unrar-nonfree (Ubuntu)
 Importance: Undecided
 Status: Fix Released

** Affects: unrar-nonfree (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Affects: unrar-nonfree (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: unrar-nonfree (Ubuntu Utopic)
 Importance: Undecided
 Status: New

** Affects: unrar-nonfree (Debian)
 Importance: Unknown
 Status: Unknown

** Bug watch added: Debian Bug tracker #774171
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171

** Also affects: unrar-nonfree (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171
   Importance: Unknown
   Status: Unknown

** Also affects: unrar-nonfree (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: unrar-nonfree (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: unrar-nonfree (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Changed in: unrar-nonfree (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260

Title:
  Directory traversal vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3427

** Also affects: quassel (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: quassel (Ubuntu Trusty)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1448911

Title:
  Execute initDbSession() on DB reconnects

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
** Patch added: quassel_0.10.1-0ubuntu1.2.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389172/+files/quassel_0.10.1-0ubuntu1.2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1448911

Title:
  Execute initDbSession() on DB reconnects

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
Attached are debdiffs that fix this vulnerability and
CVE-2015-2778/CVE-2015-2779 in trusty and utopic.

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2778

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2779

** Patch added: quassel_0.10.0-0ubuntu2.2.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389171/+files/quassel_0.10.0-0ubuntu2.2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1448911

Title:
  Execute initDbSession() on DB reconnects

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.3-2ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387837/+files/pdns_3.3-2ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037

Title:
  CVE-2015-1868

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
debdiffs follow.
precise is not affected (only version 3.2 and up).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037

Title:
  CVE-2015-1868

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.4.1-4ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387839/+files/pdns_3.4.1-4ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037

Title:
  CVE-2015-1868

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.3.1-4ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387838/+files/pdns_3.3.1-4ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037

Title:
  CVE-2015-1868

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1450037] [NEW] CVE-2015-1868

2015-04-29 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

pdns is vulnerable to a label decompression bug can cause crashes on specific 
platforms:
https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/

** Affects: pdns (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: pdns (Ubuntu Trusty)
 Importance: Undecided
 Status: New

** Affects: pdns (Ubuntu Utopic)
 Importance: Undecided
 Status: New

** Affects: pdns (Ubuntu Vivid)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-1868

** Also affects: pdns (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: pdns (Ubuntu Vivid)
   Importance: Undecided
   Status: New

** Also affects: pdns (Ubuntu Utopic)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037

Title:
  CVE-2015-1868

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-04-13 Thread Felix Geyer
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-04-13 Thread Felix Geyer
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.

** Tags removed: verification-needed
** Tags added: verification-done

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-18 Thread Felix Geyer
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-18 Thread Felix Geyer
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL

2015-03-17 Thread Felix Geyer
We should probably also add mysql.service next to postgres.

 Second, neither the systemd unit file nor the upstart script had support for 
 the
 DAEMON_OPTS variable from /etc/default/quasselcore. This made it difficult for
 administrators to add extra arguments, which is especially true on systemd 
 since
 the unit file is silently overwritten every time the package is updated.

Using default files is discouraged so we shouldn't add new options, see:
https://wiki.debian.org/systemd/Packaging#overriding_options_and_.2Fetc.2Fdefault_handling

Changes to systemd units aren't overwritten if you do it right.
You want to call: systemctl edit quasselcore.service
And type something like:
[Service]
ExecStart=...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1432161

Title:
  quasselcore.service systemd unit does not depend on PostgreSQL,
  causing the core to fail to start if it is configured to use
  PostgreSQL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1432161/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL

2015-03-17 Thread Felix Geyer
I'm not sure where you read this. Multiple ExecStart are allowed (but of course 
not what you actually want).
https://fedoraproject.org/wiki/Systemd#How_do_I_customize_a_unit_file.2F_add_a_custom_unit_file.3F
 says you can add an empty ExecStart= line and then the ExecStart=... you want.

The man page says the same:
If the empty string is assigned to this option, the list of commands to start 
is reset, prior assignments of this option will have no effect.

[Service]
ExecStart=
ExecStart=...

Anyway the debdiff looks good. I'll incorporate it into the next upload.

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to quassel in Ubuntu.
https://bugs.launchpad.net/bugs/1432161

Title:
  quasselcore.service systemd unit does not depend on PostgreSQL,
  causing the core to fail to start if it is configured to use
  PostgreSQL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1432161/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1431008] Re: Please update quassel to 0.12-rc1

2015-03-17 Thread Felix Geyer
** Changed in: quassel (Ubuntu)
   Status: New = In Progress

** Changed in: quassel (Ubuntu)
 Assignee: (unassigned) = Felix Geyer (debfx)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1431008

Title:
  Please update quassel to 0.12-rc1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1431008/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-08 Thread Felix Geyer
Attached is a debdiff that backports the logrotate changes from utopic.

** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-08 Thread Felix Geyer
Attached is a debdiff that backports the logrotate changes from utopic.

** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917

Title:
  [SRU] php5-fpm logrotate errors after package switched to upstart

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1422134] Re: please sync virtualbox from debian experimental

2015-02-15 Thread Felix Geyer
** Package changed: virtualbox-guest-additions (Ubuntu) = virtualbox-
guest-additions-iso (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422134

Title:
  please sync virtualbox from debian experimental

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1422134/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1404475] Re: Multi-Arch support

2015-01-03 Thread Felix Geyer
Please consider sponsoring the attached changes:

  * Mark libopus0, libopus-dev and libopus-dbg as Multi-Arch: same.
(LP: #1404475)
  * Update the symbols file.

** Patch added: opus_1.1-0ubuntu2.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+attachment/4291589/+files/opus_1.1-0ubuntu2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1404475

Title:
  Multi-Arch support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1404475] Re: Multi-Arch support

2015-01-03 Thread Felix Geyer
** Changed in: opus (Ubuntu)
   Status: New = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1404475

Title:
  Multi-Arch support

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/opus/+bug/1404475/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1402175] Re: Please backport pasma-widget-cwp 1.11.1 from utopic

2014-12-21 Thread Felix Geyer
It makes more sense to push this to trusty-updates so everyone benefits from 
the bugfixes:
https://wiki.ubuntu.com/StableReleaseUpdates

The changes in 1.11.1 are only related to website parsing so you can
basically take the utopic package and add a changelog entry with the
version  1.11.1-1~ubuntu14.04.1.

** Project changed: trusty-backports = plasma-widget-cwp (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1402175

Title:
  Please backport pasma-widget-cwp 1.11.1 from utopic

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/plasma-widget-cwp/+bug/1402175/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1384355] Re: ownCloud should be removed

2014-12-09 Thread Felix Geyer
Your data is still in /var/lib/owncloud/data/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384355

Title:
  ownCloud should be removed

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/owncloud/+bug/1384355/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1386257] Re: intel-microcode should be installed by default, when the CPU is GenuineIntel

2014-12-02 Thread Felix Geyer
I have strongly mixed feelings about installing intel-microcode by default.
Of course it's good to have the latest microcode bugfixes.
What worries me is that Intel provides no release notes at all.
They didn't even put up a warning for the update that disables the TSX 
instruction.
Removing an instruction while processes are already running is of course highly 
problematic, see bug #1370352.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1386257

Title:
  intel-microcode should be installed by default, when the CPU is
  GenuineIntel

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1386257/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk

2014-11-17 Thread Felix Geyer
In one particular case a trusty-utopic failed because the virtuoso-
nepomuk package was still present in rc state.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1389320

Title:
  Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-
  nepomuk

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1389320/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk

2014-11-17 Thread Felix Geyer
virtuoso-nepomuk contains the broken init script. The package has been
removed after the precise release.

Adding a quirk to release-upgrader to remove the init script is the only option 
I can think of.
SRUing the package in precise wouldn't work since that won't affect systems 
that have been upgraded from precise to trusty.

** Changed in: ubuntu-release-upgrader (Ubuntu)
   Status: Incomplete = Triaged

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1389320

Title:
  Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-
  nepomuk

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1389320/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: utopic debdiff
   
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253035/+files/quassel_0.10.1-0ubuntu1.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1388333

Title:
  CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: trusty debdiff
   
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253034/+files/quassel_0.10.0-0ubuntu2.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1388333

Title:
  CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1389296] Re: konversation: out-of-bounds read on a heap-allocated array

2014-11-04 Thread Felix Geyer
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8483

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to konversation in Ubuntu.
https://bugs.launchpad.net/bugs/1389296

Title:
  konversation: out-of-bounds read on a heap-allocated array

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/konversation/+bug/1389296/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: precise debdiff
   
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4252994/+files/quassel_0.8.0-0ubuntu1.2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1388333

Title:
  CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1388333] [NEW] CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-01 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138

 Check for invalid input in encrypted buffers

 The ECB Blowfish decryption function assumed that encrypted input would
 always come in blocks of 12 characters, as specified. However, buggy
 clients or annoying people may not adhere to that assumption, causing
 the core to crash while trying to process the invalid base64 input.

** Affects: quassel (Ubuntu)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8483

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1388333

Title:
  CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-01 Thread Felix Geyer
** Also affects: quassel (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Also affects: quassel (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: quassel (Ubuntu Precise)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to quassel in Ubuntu.
https://bugs.launchpad.net/bugs/1388333

Title:
  CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-10-19 Thread Felix Geyer
I can confirm that removing linux-image-extra keeps the inintramfs image
intact now.

** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310

Title:
  Removing linux-image-extra-X-generic deletes initramfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available

2014-10-09 Thread Felix Geyer
Public bug reported:

In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.

This is caused by an Ubuntu patch in the qemu package that changes the default 
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for pc-i440fx-utopic. This seems to be the one 
actually used.

libvirt has some rules hard-coded how to set up the PCI bus depending on the 
machine type.
Obviously it doesn't check for ubuntu.

Attached is a patch that extend the libvirt checks for the ubuntu
machine type.

** Affects: libvirt (Ubuntu)
 Importance: Undecided
 Status: New

** Patch added: ubuntu_machine_type.patch
   
https://bugs.launchpad.net/bugs/1379346/+attachment/4229595/+files/ubuntu_machine_type.patch

** Summary changed:

- Erro create a VM: internal error: No PCI buses available
+ Error creating a VM: internal error: No PCI buses available

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to libvirt in Ubuntu.
https://bugs.launchpad.net/bugs/1379346

Title:
  Error creating a VM: internal error: No PCI buses available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1379346/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available

2014-10-09 Thread Felix Geyer
Public bug reported:

In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.

This is caused by an Ubuntu patch in the qemu package that changes the default 
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for pc-i440fx-utopic. This seems to be the one 
actually used.

libvirt has some rules hard-coded how to set up the PCI bus depending on the 
machine type.
Obviously it doesn't check for ubuntu.

Attached is a patch that extend the libvirt checks for the ubuntu
machine type.

** Affects: libvirt (Ubuntu)
 Importance: Undecided
 Status: New

** Patch added: ubuntu_machine_type.patch
   
https://bugs.launchpad.net/bugs/1379346/+attachment/4229595/+files/ubuntu_machine_type.patch

** Summary changed:

- Erro create a VM: internal error: No PCI buses available
+ Error creating a VM: internal error: No PCI buses available

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1379346

Title:
  Error creating a VM: internal error: No PCI buses available

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1379346/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1265527] Re: astyle is outdated in Trusty

2014-10-02 Thread Felix Geyer
astyle 2.04 will soon be available in trusty-backports.
For trusty-updates usually only fixes targeting specific bugs are allowed.

** Changed in: astyle (Ubuntu)
   Status: Triaged = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1265527

Title:
  astyle is outdated in Trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/astyle/+bug/1265527/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1376611] [NEW] AppArmor: cupsd not allowed to send signals to third_party

2014-10-02 Thread Felix Geyer
Public bug reported:

The cups 1.7.5-3 AppArmor profile has this rule which seems to be ineffective:
  signal (receive, send) peer=third_party,

I get this denial log entry when (re)installing cups:
audit: type=1400 audit(1412239287.417:110): apparmor=DENIED 
operation=signal profile=/usr/sbin/cupsd pid=28964 comm=cupsd 
requested_mask=send denied_mask=send signal=term 
peer=/usr/sbin/cupsd//third_party

Changing it to the absolute profile name seems to work:
  signal (receive, send) peer=/usr/sbin/cupsd//third_party,

I guess apparmor_parser can't distinguish between a profile named
third_party and a subprofile named third_party.

** Affects: cups (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apparmor

** Tags added: apparmor

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1376611

Title:
  AppArmor: cupsd not allowed to send signals to third_party

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1376611/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1375310] [NEW] Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
Public bug reported:

Situation: linux-image-X-generic and linux-image-extra-X-generic are
both installed

When you remove linux-image-extra-X-generic (e.g. switching from -generic to 
-virtual) /boot/initrd.img-X-generic is deleted in 
linux-image-extra-X-generic's postrm script.
This results into broken boot. At least when / is on LVM etc.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310

Title:
  Removing linux-image-extra-X-generic deletes initramfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
This happened with linux-image-extra-3.13.0-36-generic 3.13.0-36.63 but
the code in postrm is also present in the latest utopic kernel.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310

Title:
  Removing linux-image-extra-X-generic deletes initramfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
No need for logs, it's easy to reproduce.

** Changed in: linux (Ubuntu)
   Status: Incomplete = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310

Title:
  Removing linux-image-extra-X-generic deletes initramfs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1375310/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1374583] Re: Sync libjpeg-turbo 1:1.3.1-3 (main) from Debian unstable (main)

2014-09-28 Thread Felix Geyer
Unsubscribing ubuntu-sponsors as there's nothing to do at the moment.

 I think now that debian has switched to libjpeg-turbo too there is no
 reason anymore for an ubuntu delta.

You can't say that without actually checking the delta.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1374583

Title:
  Sync libjpeg-turbo 1:1.3.1-3 (main) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libjpeg-turbo/+bug/1374583/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1374685] Re: Sync focuswriter 1.5.3-1 (universe) from Debian unstable (main)

2014-09-28 Thread Felix Geyer
This bug was fixed in the package focuswriter - 1.5.3-1
Sponsored for Jackson Doak (noskcaj)

---
focuswriter (1.5.3-1) unstable; urgency=medium

  * New upstream release

 -- Graeme Gott gra...@gottcode.org  Sun, 17 Aug 2014 12:59:45 +

** Changed in: focuswriter (Ubuntu)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1374685

Title:
  Sync focuswriter 1.5.3-1 (universe) from Debian unstable (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/focuswriter/+bug/1374685/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1373085] Re: Parser error when using regex profile names in IPC rules

2014-09-23 Thread Felix Geyer
Tested with apparmor 2.8.96~2652-0ubuntu5.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1373085

Title:
  Parser error when using regex profile names in IPC rules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1373085/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1373085] [NEW] Parser error when using regex profile names in IPC rules

2014-09-23 Thread Felix Geyer
Public bug reported:

I tried to add this rule to the firefox profile:
unix (send, receive) type=stream 
peer=(label=/usr/lib/firefox/firefox\{,\*\[^s\]\[^h\]\}//plugincontainer),

apparmor_parser fails with:
syntax error, unexpected TOK_CONDID, expecting TOK_EQUALS or TOK_IN

When I add quotes around the label the parser fails with:
Found unexpected character: ''

I found this minimal test case:
unix peer=(label=\{,\}),
and
unix peer=(label=\{,\}),

** Affects: apparmor (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1373085

Title:
  Parser error when using regex profile names in IPC rules

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1373085/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Please revert the 2.20140913.1ubuntu1 upload.

After loading the new microcode lots of processes die with
[   43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab 
sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000]
[   44.201798] traps: dbus-daemon[1277] trap invalid opcode ip:7f848d2f67ab 
sp:7fff8f3c3bb8 error:0 in libpthread-2.19.so[7f848d2e5000+18000]
[   44.202077] traps: systemd-logind[1287] trap invalid opcode ip:7f8c4bf887ab 
sp:7fff58f13178 error:0 in libpthread-2.19.so[7f8c4bf77000+18000
[   44.202101] traps: thermald[1269] trap invalid opcode ip:7fdf60f0c7ab 
sp:7fffa55068e8 error:0 in libpthread-2.19.so[7fdf60efb000+18000]

It's fine after a reboot so it seems to be a problem with upgrading from
the 2.20140624.1ubuntu1 microcode to 2.20140913.1ubuntu1.


% cat /proc/cpuinfo 
processor   : 0
vendor_id   : GenuineIntel
cpu family  : 6
model   : 60
model name  : Intel(R) Core(TM) i5-4570 CPU @ 3.20GHz
stepping: 3
microcode   : 0x1c
cpu MHz : 800.000
cache size  : 6144 KB
physical id : 0
siblings: 4
core id : 0
cpu cores   : 4
apicid  : 0
initial apicid  : 0
fpu : yes
fpu_exception   : yes
cpuid level : 13
wp  : yes
flags   : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov 
pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb 
rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology 
nonstop_tsc aperfmperf eagerfpu pni pclmulqdq dtes64 monitor ds_cpl vmx smx est 
tm2 ssse3 fma cx16 xtpr pdcm pcid sse4_1 sse4_2 x2apic movbe popcnt 
tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm ida arat epb xsaveopt 
pln pts dtherm tpr_shadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 
avx2 smep bmi2 erms invpcid
bogomips: 6385.61
clflush size: 64
cache_alignment : 64
address sizes   : 39 bits physical, 48 bits virtual
power management:
[...]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Full dmesg output:
[   43.606830] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1a
[   43.608466] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03
[   43.608494] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1a
[   43.609327] microcode: CPU1 updated to revision 0x1c, date = 2014-07-03
[   43.609352] do_trap: 267 callbacks suppressed
[   43.609354] traps: rs:main Q:Reg[1343] trap invalid opcode ip:7f32abd0b7ab 
sp:7f32a9062848 error:0
[   43.609355] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x1a
[   43.609358]  in libpthread-2.19.so[7f32abcfa000+18000]
[   43.610204] microcode: CPU2 updated to revision 0x1c, date = 2014-07-03
[   43.610225] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x1a
[   43.611081] microcode: CPU3 updated to revision 0x1c, date = 2014-07-03
[   43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab 
sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000]
[...]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Both yes and early work fine.
However when I set IUCODE_TOOL_INITRAMFS=no, update the initramfs, reboot and 
then reinstall intel-microcode I get the same trap invalid opcode.

I guess no processes that use libpthread run during early boot when the
microcode update is applied.

early:
[0.00] CPU0 microcode updated early to revision 0x1c, date = 2014-07-03
[0.083506] CPU1 microcode updated early to revision 0x1c, date = 2014-07-03
[0.097821] CPU2 microcode updated early to revision 0x1c, date = 2014-07-03
[0.112006] CPU3 microcode updated early to revision 0x1c, date = 2014-07-03
[0.547442] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1c
[0.547513] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1c
[0.547587] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x1c
[0.547661] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x1c

yes:
[0.557422] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x16
[0.557496] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x16
[0.557569] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x16
[0.557643] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x16
[2.725811] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x16
[2.727303] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03
[2.727352] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x16
[2.728156] microcode: CPU1 updated to revision 0x1c, date = 2014-07-03
[2.728182] microcode: CPU2 sig=0x306c3, pf=0x2, revision=0x16
[2.728954] microcode: CPU2 updated to revision 0x1c, date = 2014-07-03
[2.728996] microcode: CPU3 sig=0x306c3, pf=0x2, revision=0x16
[2.729867] microcode: CPU3 updated to revision 0x1c, date = 2014-07-03

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
It looks like this is the microcode update that disables TSX where it is broken.
The hle flag is removed from cpuinfo flags (see attached cpuinfo files).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
** Attachment added: cpuinfo-1a.txt
   
https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206807/+files/cpuinfo-1a.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
** Attachment added: cpuinfo-1c.txt
   
https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206812/+files/cpuinfo-1c.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352

Title:
  [Feature] Intel new CPU microcode 20140913

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1370352/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370228] [NEW] init script returns 0 even after parsing failure

2014-09-16 Thread Felix Geyer
Public bug reported:

The apparmor init script (and likely the upstart job, but haven't
checked) returns exit code 0 even when a profile can't be loaded.

In /lib/apparmor/functions foreach_configured_profile first loads profiles from 
/etc/apparmor.d and then from /var/lib/apparmor/profiles.
Parsing errors in the first dir are ignored.

The attached patch returns the first non-zero return code or zero if
there are no errors.

** Affects: apparmor (Ubuntu)
 Importance: Undecided
 Status: New

** Patch added: apparmor_init_exit_code.diff
   
https://bugs.launchpad.net/bugs/1370228/+attachment/4205841/+files/apparmor_init_exit_code.diff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370228

Title:
  init script returns 0 even after parsing failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1370228/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1370228] Re: init script returns 0 even after parsing failure

2014-09-16 Thread Felix Geyer
Tested with apparmor 2.8.96~2652-0ubuntu4.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370228

Title:
  init script returns 0 even after parsing failure

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1370228/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1361354] Re: smokegen generates wrong cast function for smokeqt

2014-09-16 Thread Felix Geyer
This has been fixed in smokegen 4:4.14.0-0ubuntu2.

** Changed in: smokegen (Ubuntu Utopic)
   Status: Confirmed = Fix Released

** Changed in: smokeqt (Ubuntu Utopic)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to smokegen in Ubuntu.
https://bugs.launchpad.net/bugs/1361354

Title:
  smokegen generates wrong cast function for smokeqt

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/smokegen/+bug/1361354/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1367609] [NEW] AppArmor: Prevents connection to system dbus (disconnected path)

2014-09-10 Thread Felix Geyer
Public bug reported:

AppArmor seems to prevent cupsd from connecting to the system dbus:

Sep 10 09:06:00 callisto kernel: audit: type=1400 audit(1410332760.203:112): 
apparmor=DENIED operation=connect info=Failed name lookup - disconnected 
path error=-13 profile=/usr/sbin/cupsd name=run/dbus/system_bus_socket 
pid=3608 comm=cupsd requested_mask=rw denied_mask=rw fsuid=0 ouid=0
Sep 10 09:06:31 callisto cupsd[3608]: process 3608: arguments to 
dbus_connection_unref() were incorrect, assertion connection != NULL failed 
in file ../../dbus/dbus-connection.c line 2794.
Sep 10 09:06:31 callisto cupsd[3608]: This is normally a bug in some 
application using the D-Bus library.

I got these errors since upgrading to utopic (Aug 22).
Might be worth noting that I'm using systemd as init.

Adding flags=(attach_disconnected) to the /usr/sbin/cupsd profile seems
to fix this problem.

** Affects: cups (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: apparmor

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1367609

Title:
  AppArmor: Prevents connection to system dbus (disconnected path)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1367609/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1365163] Re: libvirt-qemu profile needs /dev/shm/spice-* rule for systemd hosts.

2014-09-09 Thread Felix Geyer
The fix is to change the following in debian/apparmor/libvirt-qemu:

  /run/shm/ r,
  owner /run/shm/spice.* rw,
-
  /{dev,run}/shm/ r,
  owner /{dev,run}/shm/spice.* rw,

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1365163

Title:
  libvirt-qemu profile needs /dev/shm/spice-* rule for systemd hosts.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1365163/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1359671] Re: New upstream version 3.13.90

2014-08-22 Thread Felix Geyer
This pygobject update causes virt-manager to crash on startup, see bug
#1359815

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359671

Title:
  New upstream version 3.13.90

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pygobject/+bug/1359671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 920436] Re: [MIR] yodl

2014-08-12 Thread Felix Geyer
Another month later ...
I hope doing parts of the build offline to avoid proper build-dependencies is 
not considered a permanent solution.

If it is a problem to promote these two packages please consider
dropping zsh from whatever seed that is pulling it into main.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/920436

Title:
  [MIR] yodl

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/icmake/+bug/920436/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1227883] Re: Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS

2014-08-01 Thread Felix Geyer
Have you tested that stellarium 0.13.0-2 runs fine on 14.04?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1227883

Title:
  Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS

To manage notifications about this bug go to:
https://bugs.launchpad.net/trusty-backports/+bug/1227883/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
4:4.13.95 already includes the fix.

** Also affects: kde4libs (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Utopic)
   Importance: Undecided
   Status: New

** Also affects: kde4libs (Ubuntu Trusty)
   Importance: Undecided
   Status: New

** Changed in: kde4libs (Ubuntu Utopic)
   Status: New = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
** Patch added: precise debdiff
   
https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166036/+files/kde4libs_4.8.5-0ubuntu0.4.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
I have verified that polkit authentication (changing login manager
settings in system settings) still works with the patch.

-- 
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde4libs in Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
kubuntu-bugs mailing list
kubuntu-b...@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/kubuntu-bugs


[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
** Patch added: trusty debdiff
   
https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166037/+files/kde4libs_4.13.2a-0ubuntu0.3.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-29 Thread Felix Geyer
I'll work on preparing debdiffs.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1350019] [NEW] CVE-2014-5033: kauth authentication bypass

2014-07-29 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

In kauth:
Using the PID for authentication is prone to a PID reuse race condition, and a 
security issue. 

https://bugzilla.novell.com/show_bug.cgi?id=864716
http://quickgit.kde.org/?p=kdelibs.gita=commith=e4e7b53b71e2659adaf52691d4accc3594203b23

** Affects: kde4libs (Ubuntu)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-5033

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019

Title:
  CVE-2014-5033: kauth authentication bypass

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kde4libs/+bug/1350019/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1206387] Re: openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0

2014-07-01 Thread Felix Geyer
 If someone with the appropriate permissions can set this back to
Confirmed in Precise, that would be appreciated.

Done.

** Changed in: openafs (Ubuntu Precise)
   Status: Fix Released = Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1206387

Title:
  openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/precise-backports/+bug/1206387/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1335597] [NEW] CVE-2014-3755 and CVE-2014-3756

2014-06-29 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

There are two mumble security advisories:
http://mumble.info/security/Mumble-SA-2014-005.txt
http://mumble.info/security/Mumble-SA-2014-006.txt

** Affects: mumble (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: mumble (Debian)
 Importance: Unknown
 Status: Unknown

** Bug watch added: Debian Bug tracker #748189
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748189

** Also affects: mumble (Debian) via
   http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=748189
   Importance: Unknown
   Status: Unknown

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3755

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3756

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1335597

Title:
  CVE-2014-3755 and CVE-2014-3756

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1335597] Re: CVE-2014-3755 and CVE-2014-3756

2014-06-29 Thread Felix Geyer
Attached is a debdiff for trusty.
The same changes should probably apply to saucy but I haven't tested it.

The patches are not easily adaptable to the version in precise.

** Patch added: mumble_1.2.4-0.2ubuntu1.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+attachment/4141925/+files/mumble_1.2.4-0.2ubuntu1.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1335597

Title:
  CVE-2014-3755 and CVE-2014-3756

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mumble/+bug/1335597/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-26 Thread Felix Geyer
3.5 has been synced to utopic, see bug #1323041

** Changed in: mod-wsgi (Ubuntu Utopic)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-26 Thread Felix Geyer
3.5 has been synced to utopic, see bug #1323041

** Changed in: mod-wsgi (Ubuntu Utopic)
   Status: Confirmed = Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

Two vulnerabilities have been discovered in mod-wsgi:
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html

CVE-2014-0240 affects all Ubuntu releases.
CVE-2014-0242 affects = precise.

** Affects: mod-wsgi (Ubuntu)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0240

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0242

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no
source differences in Ubuntu.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for trusty attached.
The same can be applied to saucy.

** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for precise attached

** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs


[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

Two vulnerabilities have been discovered in mod-wsgi:
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html

CVE-2014-0240 affects all Ubuntu releases.
CVE-2014-0242 affects = precise.

** Affects: mod-wsgi (Ubuntu)
 Importance: Undecided
 Status: New

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0240

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-0242

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for precise attached

** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for trusty attached.
The same can be applied to saucy.

** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no
source differences in Ubuntu.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338

Title:
  CVE 2014-0240 and CVE 2014-0242

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1315742] Re: Segmentation fault on tar_extract_all in 14.04/1.2.20-3

2014-05-13 Thread Felix Geyer
Seems like a good candidate for a stable release update, not for
backports.

** Changed in: trusty-backports
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1315742

Title:
  Segmentation fault on tar_extract_all in 14.04/1.2.20-3

To manage notifications about this bug go to:
https://bugs.launchpad.net/trusty-backports/+bug/1315742/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-16 Thread Felix Geyer
Thanks, here is a debdiff for saucy.

** Patch added: virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4085763/+files/virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1307725

Title:
  Multiple security vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-16 Thread Felix Geyer
trusty has the latest VirtualBox release which is not affected by these
vulnerabilities.

** Changed in: virtualbox (Ubuntu Trusty)
   Status: Confirmed = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1307725

Title:
  Multiple security vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1307725] [NEW] Multiple security vulnerabilities

2014-04-14 Thread Felix Geyer
*** This bug is a security vulnerability ***

Public security bug reported:

VirtualBox has accumulated multiple security vulnerabilities over time.
This is a bug to track the progress on fixing them (at least in precise).

** Affects: virtualbox (Ubuntu)
 Importance: Undecided
 Status: Invalid

** Affects: virtualbox (Ubuntu Precise)
 Importance: Undecided
 Status: New

** Also affects: virtualbox (Ubuntu Precise)
   Importance: Undecided
   Status: New

** Changed in: virtualbox (Ubuntu)
   Status: New = Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1307725

Title:
  Multiple security vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-14 Thread Felix Geyer
Attached is a debdiff for precise that basically takes all the security fixes 
from the yet-unreleased wheezy-security 4.1.18-dfsg-2+deb7u3 package.
I have performed basic functionality testing (booting Grml into graphical mode 
in a VM).

** Patch added: virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff
   
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4083882/+files/virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1307725

Title:
  Multiple security vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1293704] Re: Kleopatra don't support s/mime

2014-04-07 Thread Felix Geyer
Thanks for testing.

Attached is a cleaned up debdiff.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293704

Title:
  Kleopatra don't support s/mime

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gpgme1.0/+bug/1293704/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


  1   2   3   4   5   6   7   8   9   10   >