This was fixed in ubuntu-ui-toolkit (1.1.1188+14.10.20140813.4-0ubuntu1)
by
http://bazaar.launchpad.net/~ubuntu-sdk-team/ubuntu-ui-toolkit/staging/revision/1182
** Information type changed from Private Security to Public Security
** Changed in: ubuntu-ui-toolkit (Ubuntu Utopic)
Status:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1358251
Title:
unity-panel-service crashed with SIGSEGV in
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1185665
Title:
unity-panel-service crashed with signal 7
Status
Mathieu,
Do you have any idea what this could be?
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-keyboard in Ubuntu.
https://bugs.launchpad.net/bugs/1366314
Title:
security issue? auto suggest seems to
This also affects the xserver-xorg-video-vmware driver when running
utopic in a VM.
** Also affects: xserver-xorg-video-vmware (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
CVE-2014-1949 was assigned to cinnamon-screensaver.
The fix for this issue actually lies in gtk+3.0, in the following
commit:
https://git.gnome.org/browse/gtk+/commit/?id=1691bb741d50c90ee938f0b73fe81b0ca9bfd6d4
gtk+3.0 is already fixed in utopic, and we only have connamon-
screensaver in
** Attachment added: logs
https://bugs.launchpad.net/ubuntu/+source/lightdm/+bug/1365336/+attachment/4199604/+files/mdeslaur-logs.tar.gz
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
Id=seat0
ActiveSession=c1
CanMultiSession=yes
CanTTY=yes
CanGraphical=no
Sessions=c1
IdleHint=no
IdleSinceHint=1410263200256000
IdleSinceHintMonotonic=394137924
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in
Here are my logs with utopic installed in kvm with the vmvga driver:
seat0
Sessions: *c1
Devices:
├─/sys/devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
│ input:input0 Power Button
: Undecided
Status: Confirmed
** Affects: libav (Ubuntu Precise)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Affects: libav (Ubuntu Trusty)
Importance: Undecided
Status: Confirmed
** Affects: libav (Ubuntu Utopic
** Changed in: apt (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: apt (Ubuntu Precise)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: apt (Ubuntu Trusty)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
--
You received
Thanks for testing these updates, I will be releasing them on tuesday
after they have been through our QA process.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1371058
Title:
This is an upstream decision. In fact, they've now limited the size of
ElGamal keys to 4096 with the following commit:
http://git.gnupg.org/cgi-
bin/gitweb.cgi?p=gnupg.git;a=commit;h=aae7ec516b79e20938c56fd48fc0bc9d2116426c
Another relevant Debian bug: https://bugs.debian.org/cgi-
*** This bug is a security vulnerability ***
Public security bug reported:
NSS in stable releases is at 3.15.4, which contains outdated CA
certificates.
** Affects: nss (Ubuntu)
Importance: Undecided
Status: Fix Released
** Affects: nss (Ubuntu Lucid)
Importance: Undecided
Updated have now been released: http://www.ubuntu.com/usn/usn-2350-1/
** Changed in: nss (Ubuntu Lucid)
Status: New = Fix Released
** Changed in: nss (Ubuntu Precise)
Status: New = Fix Released
** Changed in: nss (Ubuntu Trusty)
Status: New = Fix Released
--
You received
NSS has now been updated to 3.17 in all supported releases:
http://www.ubuntu.com/usn/usn-2350-1/
As such, I am closing this bug. Feel free to reopen it if the update
didn't solve the issue.
** Changed in: nss (Ubuntu)
Status: New = Fix Released
--
You received this bug notification
Please report this issue to the gnupg project at the following link, and
link the bug here:
https://bugs.g10code.com/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnupg in Ubuntu.
https://bugs.launchpad.net/bugs/1371766
** Changed in: apt (Ubuntu Trusty)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1371058
Title:
Regression: Latest apt security
It's much too late in the 14.10 cycle to merge this. I will look at it
again once 15.04 opens.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1354110
Title:
Merge openssl
Ubuntu 9.04 has been end-of-life for a long time now. I'm closing this
bug, please feel free to open a new one if you can reproduce this issue
with a current version of Ubuntu.
** Changed in: nss (Ubuntu)
Status: New = Won't Fix
--
You received this bug notification because you are a
** Bug watch added: Debian Bug tracker #505382
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505382
** Also affects: nss (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505382
Importance: Unknown
Status: Unknown
--
You received this bug notification because you
*** This bug is a duplicate of bug 523113 ***
https://bugs.launchpad.net/bugs/523113
** Bug watch added: Debian Bug tracker #505382
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505382
** Also affects: nss (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=505382
Are you able to reproduce this with Ubuntu 14.04 LTS?
** Changed in: nss (Ubuntu)
Status: New = Incomplete
** Changed in: taxbird (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
This was reported using a version of Ubuntu that has been out of support
for a long time. As such, I am closing this bug.
Please feel free to open a new bug if you can reproduce the issue with
Ubuntu 14.04 LTS.
** Changed in: nspr (Ubuntu)
Status: Confirmed = Won't Fix
--
You received
This bug was reported against an ancient version of nss, and it was
reported fixed against nspr 4.7.5. We currently have 4.10.7 in all
supported Ubuntu release. As such, I am closing this bug. If you can
reproduce with a current version, please file a new bug.
Thanks!
** Changed in: nspr
nspr has been updated to 4.10.7 in all supported versions of Ubuntu. Are
you still able to reproduce this issue?
** Changed in: nspr (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
We now have nspr 4.10.7 in all supported versions of Ubuntu.
** Changed in: nspr (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nspr in Ubuntu.
nss has been updated to 3.17 in all supported versions of Ubuntu. Are
you able to reproduce this issue with 3.17?
** Changed in: nss (Ubuntu)
Status: Confirmed = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
This bug was fixed in the package libxml2 - 2.9.1+dfsg1-4
Sponsored for Aron Xu (happyaron)
---
libxml2 (2.9.1+dfsg1-4) unstable; urgency=low
[ Christian Svensson ]
* Do not build-depend on readline (Closes: #742350)
[ Daniel Schepler ]
* Patch to bootstrap without python
You need to install your security updates to get unity
7.2.2+14.04.20140714-0ubuntu1.1
See: http://www.ubuntu.com/usn/usn-2303-1/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
** Package changed: unity (Ubuntu) = xorg (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1351616
Title:
Ubuntu 14.04: multi-touch screen can cause desktop to unlock
** Changed in: eglibc (Ubuntu)
Assignee: TJ (tj) = Marc Deslauriers (mdeslaur)
** Also affects: eglibc (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: eglibc (Ubuntu Utopic)
Importance: Critical
Assignee: Marc Deslauriers (mdeslaur)
Status
in: eglibc (Ubuntu Utopic)
Importance: Critical = Undecided
** Changed in: eglibc (Ubuntu Utopic)
Assignee: Marc Deslauriers (mdeslaur) = (unassigned)
** Changed in: eglibc (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
--
You received this bug notification
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1352504
Title:
Regression in 2.11.1-0ubuntu7.14; segfault in
I am currently preparing an updated package, and will put it in the
following PPA:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it is built, as soon as someone can test it and make sure it solves
the issue, I will publish it.
Does anyone have steps to
Is everyone that is hitting this issue running nscd with ldap?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1352504
Title:
Regression in 2.11.1-0ubuntu7.14; segfault in
The amd64 packages have finished building in the following PPA:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Could someone who can reproduce please test them and see if they solve
the issue?
--
You received this bug notification because you are a member of
Thanks for testing everyone!
As soon as all the build are finished, I'll release it as a security
regression fix.
Sorry for the inconvenience.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
The regression will be announced on the ubuntu-security-announce mailing
list.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1352504
Title:
Regression in
You need to wait until the packages are available in the
archive...probably in ~20 minutes, then the regular update and dist-
upgrade should work after you're stopped nscd.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
you need to run apt-get update to refresh the list of packages from
the mirror, and then apt-get dist-upgrade to install all available
updates.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
This bug is now fixed in both trusty and utopic. Please install your
updates.
If you see an issue after making sure all updates are applied and
restarting your computer, please file a new bug.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
This bug was fixed in the package krb5 - 1.12.1+dfsg-7
Sponsored for Sam Hartman (hartmans)
---
krb5 (1.12.1+dfsg-7) unstable; urgency=high
* Apply upstream's patch for CVE-2014-4345 (MITKRB5-SA-2014-001), buffer
overrun in kadmind with LDAP backend, Closes: #757416
--
Ah, yes, I seem to have forgotten to update libav-extra once again. I'll
push out an update in a few minutes.
** Changed in: libav-extra (Ubuntu Precise)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: libav (Ubuntu Trusty)
Status: In Progress = Fix Released
OK, updated libav-extra has been published.
** Changed in: libav-extra (Ubuntu Precise)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
So from the irc discussion:
two servers, one Ubuntu 10.04, and one Ubuntu 12.04. Both are using
postfix. The 12.04 server is running postfix 2.9.6-1~12.04.1.
10.04 is running openssl 0.9.8k-7ubuntu8.20 and 12.04 is running openssl
1.0.1-4ubuntu5.17.
The 10.04 is sending mail to the 12.04
@laney: The patches have already been submitted and reviewed upstream
here:
https://bugs.freedesktop.org/show_bug.cgi?id=75113
** Bug watch added: freedesktop.org Bugzilla #75113
https://bugs.freedesktop.org/show_bug.cgi?id=75113
--
You received this bug notification because you are a
The 10.04 server is running postfix 2.7.0-1ubuntu0.2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1356843
Title:
ccs received early
Status in “openssl” package in
I have reproduced this issue. It looks like something may be wrong with
openssl in Ubuntu 12.04.
Attached is a packet capture that shows 12.04 sending a CCS before a
Server Key Exchange for some reason.
** Attachment added: problem.pcap
Actually, I believe I'm reading that wrong, disregard my last comment.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1356843
Title:
ccs received early
Status in
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to evolution-data-server in
Ubuntu.
https://bugs.launchpad.net/bugs/1382133
Title:
Issue with servers with SSLv3
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This should be fixed now by:
http://www.ubuntu.com/usn/usn-2380-1/
** Changed in: bash (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
@khaled-blah: please file a new bug, you are not supposed to see reboot
notifications when openssl gets upgraded on a desktop system.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
** Description changed:
Currently, the clipboard is implemented such that all apps can access
the contents at any time. The clipboard contents should only be given to
apps based on user driven input (eg, a paste operation).
Attack scenario:
1. user launches malicious app 'baz' that
Unfortunately, ntp autokey is broken and insecure, it can't be used to
provide any additional security.
http://zero-entropy.de/autokey_analysis.pdf
The only solution for the moment is for system administrators to set up
their own symmetric keys with their own ntp server.
--
You received this
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to android-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1382559
Title:
adbd does not check the screen state before
** Changed in: bash (Ubuntu)
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1358827
Title:
/etc/bash.bashrc checks for admin instead of
Introduced by:
https://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a
Fixed by:
https://git.gnome.org/browse/libxml2/commit/dict.c?id=379ebc1d774865fa92f2a8d80cc4da65cbe19998
about using sudo in the terminal, but since the flag file
isn't being created, the blurb always gets printed.
** Affects: sudo (Ubuntu)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: New
** Changed in: sudo (Ubuntu)
Assignee: (unassigned) = Marc
What desktop environment is this with? Could you attach your dpkg.log
file?
** Changed in: dbus (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
Did you also get the libdbus packages?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1373270
Title:
Ubuntu 14.04 fails to pass login screen after
Proposed patch for CVE-2014-7169 here:
http://www.openwall.com/lists/oss-security/2014/09/25/10
I am building bash updates for Ubuntu containing the proposed fix here
and will publish them once the fix has been made official:
https://launchpad.net/~ubuntu-security-
There was a build issue with the Ubuntu 14.04 package, and I am in the
process of fixing it now. An update will be released within the hour.
The other releases should be ok.
** Changed in: bash (Ubuntu)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Also affects: bash (Ubuntu
Fumihito YOSHIDA (hito),
We are awaiting comments from the upstream bash developer about the OOB
memory fixes, and the variable isolation hardening. We will address
those in a later bash update.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
@dino99: both your test cases look good to me. What results were you
expecting?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1373781
Title:
bash incomplete fix for
do you perhaps have a left-over file called 'echo' in that directory?
If so, you need to delete it before running the test.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
This is now fixed:
http://www.ubuntu.com/usn/usn-2364-1/
** Changed in: bash (Ubuntu Precise)
Status: Confirmed = Fix Released
** Changed in: bash (Ubuntu Trusty)
Status: Confirmed = Fix Released
** Changed in: bash (Ubuntu Lucid)
Status: Confirmed = Fix Released
--
You
** Changed in: bash (Ubuntu Utopic)
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1374375
Title:
CVE-2014-7186: bash crashed
What desktop environment are you using?
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1375271
Title:
desktop
Status: Invalid
** Affects: openssl (Ubuntu Precise)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Also affects: openssl (Ubuntu Precise)
Importance: Undecided
Status: New
** Changed in: openssl (Ubuntu)
Status: New = Invalid
This is brought to our attention here:
https://twitter.com/andreasdotorg/status/517328756365873152
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1376447
Title:
When
That USN doesn't re-enable TLSv1.2 by default for clients in Ubuntu
12.04. It simply fixes an issue if someone _forced_ TLSv1.2 to be
enabled.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Thanks for the debdiffs, I'll prepare security updates.
** Changed in: apt (Ubuntu Trusty)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: apt (Ubuntu Precise)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: apt (Ubuntu Precise)
Status
http://www.ubuntu.com/usn/usn-2370-1/
** Changed in: apt (Ubuntu Precise)
Status: Confirmed = Fix Released
** Changed in: apt (Ubuntu Trusty)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
@khaled-blah: yes, on a server, it should do the usual and add a reboot
required blurb to the motd.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/244250
Title:
Spurious
Public bug reported:
1.20141026-1ubuntu1 introduced support for guessing dependencies from
the egginfo file:
* Add support for guessing dependencies from egg-info files (closes:
756378)
But this is mishandling gi.introspection dependencies. The pasaffe
package, which compiles fine on Utopic, is
This is CVE-2014-1422
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1422
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to location-service in
Ubuntu.
https://bugs.launchpad.net/bugs/1387734
Title:
This is CVE-2014-1424
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-1424
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1390592
Title:
'ptrace
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to signon in Ubuntu.
https://bugs.launchpad.net/bugs/1392380
Title:
OA gives out all tokens to any app
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mountall in Ubuntu.
https://bugs.launchpad.net/bugs/1390183
Title:
EFI directory is insecure by default
** Bug watch added: Debian Bug tracker #770033
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770033
** Also affects: partman-efi (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=770033
Importance: Unknown
Status: Unknown
--
You received this bug notification
Thanks for reporting it! :)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mountall in Ubuntu.
https://bugs.launchpad.net/bugs/1390183
Title:
EFI directory is insecure by default
Status in “mountall” package in Ubuntu:
*** This bug is a duplicate of bug 1384502 ***
https://bugs.launchpad.net/bugs/1384502
** This bug has been marked a duplicate of bug 1384502
fstab entry for nfs /home fails to mount on boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
*** This bug is a duplicate of bug 1384502 ***
https://bugs.launchpad.net/bugs/1384502
** This bug has been marked a duplicate of bug 1384502
fstab entry for nfs /home fails to mount on boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
Ok, I've investigated this, and it turn out:
statd-mounting.conf intercepts nfs mounts and waits for the statd daemon to be
run
statd.conf starts on (virtual-filesystems and started portmap ON_BOOT=y)
rpcbind.conf is what emits the started portmap event:
# For compatibility with older upstart
** This bug is no longer a duplicate of bug 1384502
fstab entry for nfs /home fails to mount on boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mountall in Ubuntu.
https://bugs.launchpad.net/bugs/1389164
Title:
Please disregard the last comment, that was unfortunately for a
different bug that affects 14.10 only.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mountall in Ubuntu.
https://bugs.launchpad.net/bugs/1384502
Title:
Upstart shouldn't require an INSTANCE variable for that to work, and
nfs-utils shouldn't be waiting on the portmap job, as that is for legacy
compatibility only.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to upstart in
Ok, I've investigated this, and it turns out:
statd-mounting.conf intercepts nfs mounts and waits for the statd daemon to be
run
statd.conf starts on (virtual-filesystems and started portmap ON_BOOT=y)
rpcbind.conf is what emits the started portmap event:
# For compatibility with older upstart
(Ubuntu Utopic)
Importance: Undecided
Status: New
** Changed in: nfs-utils (Ubuntu Utopic)
Status: New = Confirmed
** Changed in: upstart (Ubuntu Utopic)
Status: New = Confirmed
** Changed in: nfs-utils (Ubuntu Utopic)
Assignee: (unassigned) = Marc Deslauriers
** Description changed:
+ [SRU Request]
+
+ Due to a change in Upstart behaviour, the statd daemon no longer starts
+ automatically at boot, resulting in nfs mounts not being mounted at
+ boot.
+
+ This has been corrected by modifying the statd upstart job to wait for
+ the rpcbind job to
Apache 2.2 on 12.04 LTS does support TLSv1.1 and TLSv1.2 just fine.
Could you describe why you think it's not supported?
** Changed in: openssl (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Apache2 in 12.04 supports TLSv1.2 just fine, I've been running test
scripts against it.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1256576
Title:
Ubuntu 12.04 LTS:
** Package changed: light-locker (Ubuntu) = unity (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1396151
Title:
password not checked on screen unlock
Status in
By default, saslauthd caches credentials.
The cache and timeout are set by the -c and -t command line options.
You can disable caching by removing the -c from /etc/default/saslauthd,
or adjust the timeout from the default 28800 seconds by adding -t to it.
** Information type changed from
This happens from time to time when a mirror is out of sync.
** Information type changed from Private Security to Public
** Package changed: thunderbird (Ubuntu) = apt (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
1 - 100 of 1108 matches
Mail list logo