Be nice if you could attach with gdb and see what its doing
** Changed in: ubuntu-system-settings (Ubuntu)
Status: New => Triaged
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: (unassigned) => Jonas G. Drange (jonas-drange)
--
You received this bug notification because you
I was until recently using ubuntu studio quantal 64 bit (now using
trusty) and I happened to run across this in the apparmor profile for
evince:
# evince creates a temporary stream file like '.goutputstream-XX' in the
# directory a file is saved. This allows that behavior.
owner /**/.goutputst
Status changed to 'Confirmed' because the bug affects multiple users.
** Changed in: bird (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1342173
Title:
BIRD
** Changed in: libvirt (Ubuntu)
Status: Incomplete => New
** Summary changed:
- 12.04 guest hangs on a 14.04 host server
+ 12.04 guest hangs on a 14.04 host server with cirrus graphics
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hi,
could you please try adding hyperv to the vm options, as shown here:
https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1308341/comments/10
Please let us know if that helps.
** Changed in: qemu (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you ar
** Changed in: ubuntu-system-settings (Ubuntu)
Status: New => Triaged
** Tags added: rtm14
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1337350
Title:
failed app updates show unreadable err
** Changed in: ubuntu-system-settings (Ubuntu)
Status: New => Confirmed
** Tags added: rtm14
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1324923
Title:
'Pause' button on Updates page gets
Thank you for taking the time to report this bug and helping to make
Ubuntu better. It seems that your bug report is not filed about a
specific source package though, rather it is just filed against Ubuntu
in general. It is important that bug reports be filed about source
packages so that people
This bug is missing log files that will aid in diagnosing the problem.
>From a terminal window please run:
apport-collect 1339609
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a commen
The attachment "Patch to accept data.tar.xz" seems to be a patch. If it
isn't, please remove the "patch" flag from the attachment, remove the
"patch" tag, and if you are a member of the ~ubuntu-reviewers,
unsubscribe the team.
[This is an automated message performed by a Launchpad user owned by
~
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: (unassigned) => Diego Sarmentero (diegosarmentero)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1316933
Title:
Pressing the pause butto
Thanks for reporting this bug. However, it sounds like running anything
remotely heavyweight during the scans would have the same result, so
this is not a bug in qemu. I've marked it as affecting the kernel, as
presumably this is a bug in the io scheduler.
** Changed in: qemu-kvm (Ubuntu)
(Marked invalid against qemu for bookkeeping purposes - please re-set to
open if appropriate)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1339609
Title:
md raid resync causing KVM guests overload
Quoting Tamas Papp (1341...@bugs.launchpad.net):
> On 07/16/2014 09:39 PM, Serge Hallyn wrote
> > I've personally not seen it, and noone on my team, who use a lot of
> > kvm instances, has seen it. Our two current theories are that (a) it
> > has to do with ksm page migration across numa-nodes, or
Sure I can believe this is probably a case where the SIM needs to be
updated too ( as that's where ofono gets the number from ).
This isn't something we support currently. Some quick research shows
that this is something that iOS supports, but not Android ( that I'm
aware of ).
I'm changing the
Rodney can you take a look?
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: (unassigned) => Rodney Dawes (dobey)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1332629
Title:
lrt test
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1339609
Title:
md raid resync causing KVM guests overload
To manage notific
Public bug reported:
On small packages, everything is hunky-dory:
$ apt-get download dpkg-sig
$ ar t dpkg-sig*deb
debian-binary
control.tar.gz
data.tar.gz
$ dpkg-sig --sign builder dpkg-sig_0.13.1+nmu1_all.deb
Processing dpkg-sig_0.13.1+nmu1_all.deb...
Signed deb dpkg-sig_0.13.1+nmu1_all.deb
$ dp
That patch again, attached:
** Patch added: "Patch to accept data.tar.xz"
https://bugs.launchpad.net/ubuntu/+source/dpkg-sig/+bug/1342938/+attachment/4154257/+files/dpkg-sig-xz.patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: (unassigned) => Diego Sarmentero (diegosarmentero)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1308085
Title:
Updates don't happen whe
Other users having the same issue:
http://ubuntuforums.org/showthread.php?t=2234728
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1342586
Title:
[utopic] [proposed] cgmanager breaks lightdm login
T
Hi - you say you normally use LVM. Does the same thing happen if you
use a raw or qcow2 image file?
Can you please post your /etc/libvirt/libvirtd.conf and
/etc/libvirt/qemu.conf?
** Changed in: libvirt (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you
This is in the branch for APN jussi is picking up
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: Jonas G. Drange (jonas-drange) => Jussi Pakkanen (jpakkane)
** Changed in: ubuntu-system-settings (Ubuntu)
Importance: Undecided => High
** Tags added: rtm14
--
You received this
** Changed in: ubuntu-system-settings (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1211804
Title:
Cell data technology preference doesn't change
** Changed in: ubuntu-system-settings (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1288866
Title:
"Display language" icon is huge and has a borde
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: Pat McGowan (pat-mcgowan) => Jussi Pakkanen (jpakkane)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1225174
Title:
Cellular Settings --
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Description changed:
This bug is for tracking the 3.11.0-26.44 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Description changed:
This bug is for tracking the 3.8.0-44.65~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-
** Description changed:
This bug is for tracking the 3.2.0-67.100 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-P
** Description changed:
This bug is for tracking the 3.5.0-54.80~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-
** Description changed:
This bug is for tracking the 3.13.0-32.56~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
** Description changed:
This bug is for tracking the 2.6.32-64.127 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
** Description changed:
This bug is for tracking the 3.11.0-26.44~precise1 upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
** Description changed:
This bug is for tracking the 3.2.0-1636.52 upload package. This bug will
contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-
You have incorrect info in /etc/mythtv/config.xml. Please ensure the
file has the correct information and try the upgrade again.
** Changed in: mythtv (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
On 07/16/2014 09:39 PM, Serge Hallyn wrote
> I've personally not seen it, and noone on my team, who use a lot of
> kvm instances, has seen it. Our two current theories are that (a) it
> has to do with ksm page migration across numa-nodes, or (b) it has to
> do with a race with transparent hugepage
** Description changed:
This bug is for tracking the upload package. This
bug will contain status and testing results related to that upload.
For an explanation of the tasks and the associated workflow see:
https://wiki.ubuntu.com/Kernel/kernel-sru-workflow
kernel-stable-Prepare-packa
@Steve
Pretty sure you're still hitting bug #1321627... That said, I'll answer
a few of your points, and get your opinion on whether we can consider
this a DUP.
First, we did land fixes for the above bug last Friday ( 20140711 ) and
the resulting urfkill package ( 0.6.0~20140708.110711.a0581f3-0
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
For reference, the silo mentioned in comment #21 landed on 20140711.
The first image this package was seeded in was #u127:
http://people.canonical.com/~lzemczak/landing-team/127.commitlog
Also, as I'm still able to re-create the bug ( see comment #23 ),
changed Status back to Triaged.
** Changed
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux-keystone - 3.13.0-7.11
---
linux-keystone (3.13.0-7.11) trusty; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.13.0-32.57
[ Ubuntu: 3.13.0-32.57 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE
This bug was fixed in the package linux-keystone - 3.13.0-7.11
---
linux-keystone (3.13.0-7.11) trusty; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.13.0-32.57
[ Ubuntu: 3.13.0-32.57 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
*** This bug is a duplicate of bug 1338524 ***
https://bugs.launchpad.net/bugs/1338524
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
-
This bug was fixed in the package linux-keystone - 3.13.0-7.11
---
linux-keystone (3.13.0-7.11) trusty; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.13.0-32.57
[ Ubuntu: 3.13.0-32.57 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE
This bug was fixed in the package linux-keystone - 3.13.0-7.11
---
linux-keystone (3.13.0-7.11) trusty; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.13.0-32.57
[ Ubuntu: 3.13.0-32.57 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux - 3.13.0-32.57
---
linux (3.13.0-32.57) trusty; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.13.0-32.56) trusty; urgency=low
[ Luis Henriqu
This bug was fixed in the package linux-keystone - 3.13.0-7.11
---
linux-keystone (3.13.0-7.11) trusty; urgency=low
[ Andy Whitcroft ]
* rebase to Ubuntu-3.13.0-32.57
[ Ubuntu: 3.13.0-32.57 ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow
Status: In Progress => Invalid
** Changed in: kernel-sru-workflow/package-testing
Status: New => Invalid
** Changed in: linux-ppc (Ubuntu Saucy)
Status: New => Invalid
** Changed in: kernel-sru-workflow/prepare-package
Status: New =>
As discussed on lxc-devel (July 10), the centos template has not been
adjusted to support systemd. Michael Warfield will be working on it.
** Changed in: lxc (Ubuntu)
Status: New => Triaged
** Changed in: lxc (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notific
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
*** This bug is a duplicate of bug 1338763 ***
https://bugs.launchpad.net/bugs/1338763
This bug was fixed in the package linux-lowlatency - 3.11.0-26.21
---
linux-lowlatency (3.11.0-26.21) saucy; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* rebase to Ub
*** This bug is a duplicate of bug 1338556 ***
https://bugs.launchpad.net/bugs/1338556
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- L
This bug was fixed in the package linux - 3.11.0-26.45
---
linux (3.11.0-26.45) saucy; urgency=low
[ Upstream Kernel Changes ]
* l2tp: Privilege escalation in ppp over l2tp sockets
- LP: #1341472
- CVE-2014-4943
linux (3.11.0-26.44) saucy; urgency=low
[ Luis Henriques
This bug was fixed in the package linux-lowlatency - 3.11.0-26.21
---
linux-lowlatency (3.11.0-26.21) saucy; urgency=low
[ Andy Whitcroft ]
* pull in missing CVE changelog
* rebase to Ubuntu-3.11.0-26.45
[ Ubuntu: 3.11.0-26.45 ]
* l2tp: Privilege escalation in ppp over l2
** Changed in: mythtv (Ubuntu)
Assignee: (unassigned) => Thomas Mashos (tgm4883)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1342917
Title:
package mythtv-database 2*0.27.0%2Vfixes.20140324.8
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
** Changed in: kernel-sru-workflow/promote-to-security
Status: New => Fix Released
** Changed in: kernel-sru-workflow/promote-to-security
Assignee: Ubuntu Stable Release Updates Team (ubuntu-sru) => Adam Conrad
(adconrad)
** Changed in: kernel-sru-workflow/promote-to-updates
S
sorry did not see it was in progress
** Changed in: ubuntu-system-settings (Ubuntu)
Assignee: Jonas G. Drange (jonas-drange) => William Hua (attente)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
Also, writing back the default values to the /proc/sys/vm/... files
doesn't fix the problem — so far only reboot with avoiding writing bad
values helped.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
** Changed in: ofono (Ubuntu)
Status: New => Confirmed
** Changed in: telephony-service
Status: New => Confirmed
** Changed in: ofono (Ubuntu)
Importance: Undecided => High
** Changed in: telephony-service
Importance: Undecided => High
--
You received this bug notification
301 - 400 of 916 matches
Mail list logo