Public bug reported:
This bug affects rapid release firefox versions and unity-2d in Natty.
Directions:
1) I'm not sure if it matters, but I don't have a ~/.thunderbird
2) Start thunderbird (I started it from the unity launcher)
3) Don't create a new account
- hit cancel in 12.0.1
- hit I
Public bug reported:
When testing firefox 14.0~b9+build1-0ubuntu0.12.04.1~mfn1, I found that
the totem plugin crashes when attempting to play an ogv. I did not
experience this crash when testing ff 14.0 on Natty.
The only way I've been able to trigger the crash is running test-
browser.py from
Public bug reported:
While testing 14.0~b9+build1-0ubuntu0.12.04.1~mfn1 on Precise amd64 with
the IcedTea plugin, I noticed that
http://www.java.com/de/download/help/testvm.xml fails to properly reload
the java applet after refreshing the page. The applet works fine during
the initial page load.
Note that totem itself has no problem playing the ogv. The file can be
found here:
http://bazaar.launchpad.net/~ubuntu-bugcontrol/qa-regression-
testing/master/view/head:/data/rfbproxy-jaunty.ogv
--
You received this bug notification because you are a member of Desktop
Packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Also affects: enigmail (Ubuntu)
Importance: Undecided
Status: New
** Also affects: lightning-extension (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to thunderbird in
** Summary changed:
- Placeholder bug
+ Stable update to Firefox 14.0.1
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1024562
Title:
Stable update to Firefox 14.0.1
Status in
** Summary changed:
- Placeholder bug
+ Stable update to Thunderbird 14.0
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to thunderbird in Ubuntu.
https://bugs.launchpad.net/bugs/1024564
Title:
Stable update to Thunderbird 14.0
Status
Sebastien, the issue does happen with firefox 13. Also not that Micah
mentioned it has been happening at least since firefox 12 in comment #1.
As for the stack trace, is the trace at the bottom of the Mozilla crash
report not sufficient? I've submitted a new crash report based off of
firefox
** Description changed:
+ USN information: http://www.ubuntu.com/usn/usn-1510-1/
+
This is a workflow bug, please don't touch this
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to thunderbird in Ubuntu.
** Description changed:
+ USN information: http://www.ubuntu.com/usn/usn-1509-1/
+
This is a workflow bug, please don't touch this
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
** Also affects: ubufox (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1024562
Title:
Stable update to Firefox 14.0.1
Status in
Hi Gary - I've been unable to reproduce the crash that you reported.
To rule out one of your add-ons (such as LastPass) causing the problem,
can you please see if the crash happens in Firefox's safe mode?
Instructions can be found here:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not directly cause loss of data/privacy.
You can use
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Here's a new crash report sent from firefox
15.0.1+build1-0ubuntu0.12.04.1:
http://crash-stats.mozilla.com/report/index/bp-6a166a97-813a-
4de3-bc32-e47062120911
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to totem in Ubuntu.
On 2012-05-26 14:01:21, Srivatsa wrote:
here is detailed step by step description. i think, we have a
minefield of bugs here!
Thanks for providing more information!
Initial setting:
You are logged in to an admin account.
1. Gear menu - System Settings - User Accounts - create a user
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1004948 ***
https://bugs.launchpad.net/bugs/1004948
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a
This is expected behavior from Firefox.
** Changed in: firefox (Ubuntu)
Status: New = Invalid
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is
Thanks for using Ubuntu and reporting a bug! Unfortunately, this bug
report does not contain enough information for a developer to act upon.
Please try to provide more concise details about the specific problem
that you're facing.
Additionally, this does not sound like a security bug, so I'm
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for using Ubuntu and reporting this bug! I've confirmed it in
Precise.
I disagree that it is a security bug, as invalid passwords are only
accepted if the valid password has previously been saved. I see it as a
UI bug around a feature that happens to relate to security (remote
login). As a
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gdm in Ubuntu.
https://bugs.launchpad.net/bugs/1064584
Title:
Locked gnome session unlocks without password authentication
** Also affects: gnome-shell (Ubuntu)
Importance: Undecided
Status: New
** Changed in: gnome-shell (Ubuntu)
Status: New = Confirmed
** Changed in: gnome-shell (Ubuntu)
Importance: Undecided = Medium
** No longer affects: gdm (Ubuntu)
** Project changed: gdm = gnome-shell
** Changed in: ecryptfs-utils (Ubuntu Oneiric)
Assignee: (unassigned) = Tyler Hicks (tyhicks)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to libreoffice in Ubuntu.
https://bugs.launchpad.net/bugs/745836
Title:
encrypted swap
I can reproduce the general protection fault mentioned in comment #44
pretty easily.
I ftraced the eCryptfs code while triggering the crash and don't see
much going on other than a lookup(), the eCryptfs inode initialization
functions being called, and the a call to ecryptfs_readpage(). This
On 2011-09-30 00:23:31, Rolf Leggewie wrote:
This is a very visible and highly annoying bug that affects a core
package in three releases including the latest LTS. We need to identify
the patch that fixed this and backport it.
I agree.
I've got a feeling that the fix for this is upstream
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
This turned out to be a tricky one. It is definitely an eCryptfs bug.
The upstream fix that I thought would solve this issue ended up not
being the right fix. Instead, it turned out to be the following two
commits:
bd4f0fe8bb7c73c738e1e11bc90d6e2cf9c6e20e
fed8859b3ab94274c986cbdf7d27130e0545f02c
** Patch added: [PATCH] eCryptfs: Clear ECRYPTFS_NEW_FILE flag during truncate
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/745836/+attachment/2524979/+files/0001-eCryptfs-Clear-ECRYPTFS_NEW_FILE-flag-during-truncat.patch
--
You received this bug notification because you are a
I've confirmed this in oneiric (0.9.1.90-0ubuntu6) and precise
(0.9.1.90-0ubuntu7).
I glanced at the network-manager-applet code and believe that wpa-none
should be supported for ad-hoc networks. I don't see any obvious fixes
in the upstream git repo, nor any related upstream bugs. However, I did
** Bug watch removed: GNOME Bug Tracker #654772
https://bugzilla.gnome.org/show_bug.cgi?id=654772
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/905748
Title:
Create WPA2
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** This bug is no longer flagged as a security vulnerability
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-terminal in Ubuntu.
https://bugs.launchpad.net/bugs/880891
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Tags removed: gutsy
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-nettool in Ubuntu.
https://bugs.launchpad.net/bugs/880274
Title:
will not update using 8.10
Status in “gnome-nettool” package in Ubuntu:
New
Bug
Hi Fred - Thanks for taking the time to file this bug report.
If your concern is only about the /media directory, the guest user
should be able to read and search that directory. The guest account
should not be able to write to that directory. I've verified that to be
the case on several freshly
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Tags added: hardy
--
You received this bug notification because you are a member of Desktop
Packages,
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Package changed: ubuntu = nautilus (Ubuntu)
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this bug
report is far too broad to debug further. If you're still having
problems, please open a new bug, addressing only the specific issue
relating to Ubuntu.
**
** Changed in: seahorse (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to seahorse in Ubuntu.
https://bugs.launchpad.net/bugs/970251
Title:
IP thief , takes control of root .
Status in “seahorse”
This functionality is typically available via a firefox addon. Please
browse the available addons to find one that will let you locally save
flash videos, games, etc.
** Changed in: ubuntu
Status: New = Invalid
** Package changed: ubuntu = firefox (Ubuntu)
** Visibility changed to:
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Marking this bug as incomplete since there are no recent comments and it
isn't clear if this is still a bug. If it is still a valid bug, please
provide new information and move the bug status to NEW.
** Changed in: evolution (Ubuntu)
Status: New = Incomplete
--
You received this bug
I believe that this bug has been solved long ago with a lightdm upload.
Marking the ecryptfs-utils task as fix released as this issue seems to
be fixed.
** Changed in: ecryptfs-utils (Ubuntu)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a
Marking the ecryptfs-utils task as invalid. Encryption is a cpu
intensive operation and there's nothing that can be done, from an
eCryptfs standpoint, for this specific bug.
Software depending on hard-coded timeout values is troublesome since the
home directory may be encrypted, may be in an NFS
** Package changed: dbus (Ubuntu) = nautilus (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/1359896
Title:
nautilus crashes after sshfs disconnects
Status in “nautilus”
This bug is very finicky to reproduce. I've been testing with completely
up to date and pristine Saucy virtual machines on both amd64 and i386,
*without* the AppArmor mediation dbus package (so I'm testing dbus
1.6.12.0ubuntu2).
These are throw away VMs that I create and trash as needed. I'll
Here's another data point from another VM:
* dbus 1.6.12-0ubuntu2
* at-spi2-core 2.9.90-0ubuntu1
* ~/.xsession-errors is clean
* at-spi2-core is running:
$ ps aux | grep at-spi2
tyhicks 1444 0.0 0.3 337552 3384 ?Ssl 15:14 0:00
/usr/lib/at-spi2-core/at-spi-bus-launcher
** Changed in: dbus (Ubuntu)
Assignee: Tyler Hicks (tyhicks) = (unassigned)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to at-spi2-core in Ubuntu.
https://bugs.launchpad.net/bugs/1217757
Title:
Error retrieving accessibility bus
On 2013-10-22 18:46:37, Marc Deslauriers wrote:
We'll probably need to also add the following to
data/apparmor/abstractions/lightdm:
# Allow all DBus communications
dbus,
After giving this some more thought, it is best to include the dbus
abstractions:
# Allow all DBus communications
: Undecided = Medium
** Changed in: apparmor (Ubuntu)
Assignee: (unassigned) = Tyler Hicks (tyhicks)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1231778
Title:
wifi not working
** Also affects: apparmor
Importance: Undecided
Status: New
** Changed in: apparmor
Status: New = In Progress
** Changed in: apparmor
Importance: Undecided = Medium
** Changed in: apparmor
Assignee: (unassigned) = Tyler Hicks (tyhicks)
--
You received this bug
The AppArmor abstraction needs some updates due to AppArmor mediation
changes that happened in Saucy. I need to do a little more testing with
the policy changes and then I'll push an updated branch.
--
You received this bug notification because you are a member of Desktop
Packages, which is
I pushed my branch with the AppArmor changes to lp:~tyhicks/lightdm
/guest-wrapper-with-apparmor-changes and proposed a merge into Robert's
branch.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
I manually tested the guest session by viewing pages in firefox and
chromium-browser, opening libreoffice, printing to a PDF, and viewing
the PDF with evince.
I'm not sure how to test the remote sessions. Is that something you
could do, Robert?
--
You received this bug notification because you
AppArmor denial from the accessibility dbus-daemon:
dbus[2835]: apparmor=DENIED operation=dbus_method_call
bus=accessibility name=org.freedesktop.DBus
path=/org/freedesktop/DBus interface=org.freedesktop.DBus
member=Hello mask=send pid=14848 profile=/usr/bin/evince
peer_profile=unconfined
--
** Changed in: evince (Ubuntu)
Importance: Undecided = High
** Changed in: evince (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1226141
Title:
Hello Guy - a fix is currently in progress and should make it into the
Saucy release.
** Changed in: evince (Ubuntu)
Status: Triaged = In Progress
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
)
Importance: Undecided = Medium
** Changed in: apparmor (Ubuntu Saucy)
Status: New = Confirmed
** Changed in: apparmor (Ubuntu Saucy)
Assignee: (unassigned) = Tyler Hicks (tyhicks)
** Changed in: apparmor (Ubuntu T-series)
Importance: Undecided = Medium
** Changed in: apparmor (Ubuntu T
Updated debdiff containing an audio abstraction change for bug #1211380
** Patch added: apparmor_2.8.0-0ubuntu30.debdiff
https://bugs.launchpad.net/apparmor/+bug/1208988/+attachment/3860413/+files/apparmor_2.8.0-0ubuntu30.debdiff
** Patch removed: apparmor_2.8.0-0ubuntu30.debdiff
Here's the debdiff containing fixes for this bug and for bug #1235216.
It has received the following testing:
- Manual verification of this both fixes
+ Viewing PDFs and printing PDFs
- Passed QRT's test-evince.py
** Patch added: evince_3.10.0-0ubuntu2.debdiff
I should have mentioned that jdstrand will be sponsoring this debdiff.
It depends on a change in the apparmor package, which he will also be
sponsoring in a different upload.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in
=session path=/org/freedesktop/DBus
interface=org.freedesktop.DBus member=Hello mask=send
name=org.freedesktop.DBus pid=30726 profile=/usr/bin/evince-
thumbnailer peer_profile=unconfined
** Affects: evince (Ubuntu)
Importance: Medium
Assignee: Tyler Hicks (tyhicks)
Status: In Progress
1 - 100 of 299 matches
Mail list logo