This is not really a bug in systemd-networkd. It just adheres more
strictly to the standard.
In this case the DHCP server doesn't send the Option 51 "IP Address
Lease Time" in the DHCPOFFER. RFC2131 declares this a MUST (see Table 3:
Fields and options used by DHCP servers).
I encountered a
KeePassX supports .kdbx databases starting with version 2.0 (Ubuntu >=
16.04).
** Changed in: keepassx (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1619411
** Patch added: "trusty-security debdiff"
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548197/+files/prosody_0.9.1-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "wily-security debdiff"
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548198/+files/prosody_0.9.8-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
xenial (0.9.9-1) is already fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943
Title:
CVE-2016-1231 and CVE-2016-1232
To manage notifications about this bug go to:
*** This bug is a security vulnerability ***
Public security bug reported:
I'll add debdiffs based on the Debian security update:
https://lists.debian.org/debian-security-announce/2016/msg7.html
** Affects: prosody (Ubuntu)
Importance: Undecided
Status: New
** CVE added:
vivid is also affected.
Replacing the libmagickcore-extra build-dependency with librsvg2-bin seems to
fix it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1524318
Title:
KeePassX Launcher icon is
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kate in Ubuntu.
https://bugs.launchpad.net/bugs/1449029
Title:
KDEInit could not launch /usr/bin/kate
To manage
** Also affects: kate (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: kate (Ubuntu Wily)
Importance: Medium
Status: Confirmed
** Changed in: kate (Ubuntu Vivid)
Status: New = Triaged
** Changed in: kate (Ubuntu Wily)
Status: Confirmed =
I've uploaded a fix to vivid, waiting for approval by the SRU team.
wily will be fixed once 15.04 lands (bug is already fixed upstream).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1449029
Title:
0.12.2 is in vivid.
** Changed in: quassel (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1446856
Title:
Please update quassel to 0.12.1
To manage
As it's self signed certificate the signature hash algorithm doesn't matter
much.
4096 bit seems a bit excessive, no?
Slightly offtopic:
Quassel stores the md5sum of certs the user has accepted. That's probably a bad
idea.
--
You received this bug notification because you are a member of
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452825
Title:
Update to include Wily (and Jessie's release)
To manage notifications about this bug go to:
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390320/+files/unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Patch added: unrar-nonfree_4.0.3-1ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390318/+files/unrar-nonfree_4.0.3-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390319/+files/unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I'm not aware of any CVE for this issue.
Attached are debdiffs for precise, trusty and utopic.
vivid has 5.2.7, so not affected.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260
Title:
*** This bug is a security vulnerability ***
Public security bug reported:
unrar-nonfree before version 5.2.7 suffers from a symlink directory
traversal vulnerability.
More details at:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171
** Affects: unrar-nonfree (Ubuntu)
Importance:
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3427
** Also affects: quassel (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you
** Patch added: quassel_0.10.1-0ubuntu1.2.debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389172/+files/quassel_0.10.1-0ubuntu1.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Attached are debdiffs that fix this vulnerability and
CVE-2015-2778/CVE-2015-2779 in trusty and utopic.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2778
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2779
** Patch added:
** Patch added: pdns_3.3-2ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387837/+files/pdns_3.3-2ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
debdiffs follow.
precise is not affected (only version 3.2 and up).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037
Title:
CVE-2015-1868
To manage notifications about this bug go to:
** Patch added: pdns_3.4.1-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387839/+files/pdns_3.4.1-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: pdns_3.3.1-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387838/+files/pdns_3.3.1-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
pdns is vulnerable to a label decompression bug can cause crashes on specific
platforms:
https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
** Affects: pdns (Ubuntu)
Importance: Undecided
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
[SRU] php5-fpm
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
[SRU] php5-fpm logrotate errors
We should probably also add mysql.service next to postgres.
Second, neither the systemd unit file nor the upstart script had support for
the
DAEMON_OPTS variable from /etc/default/quasselcore. This made it difficult for
administrators to add extra arguments, which is especially true on
I'm not sure where you read this. Multiple ExecStart are allowed (but of course
not what you actually want).
https://fedoraproject.org/wiki/Systemd#How_do_I_customize_a_unit_file.2F_add_a_custom_unit_file.3F
says you can add an empty ExecStart= line and then the ExecStart=... you want.
The man
** Changed in: quassel (Ubuntu)
Status: New = In Progress
** Changed in: quassel (Ubuntu)
Assignee: (unassigned) = Felix Geyer (debfx)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
Attached is a debdiff that backports the logrotate changes from utopic.
** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff
--
You received this bug notification
Attached is a debdiff that backports the logrotate changes from utopic.
** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff
--
You received this bug notification
** Package changed: virtualbox-guest-additions (Ubuntu) = virtualbox-
guest-additions-iso (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422134
Title:
please sync virtualbox from debian
Please consider sponsoring the attached changes:
* Mark libopus0, libopus-dev and libopus-dbg as Multi-Arch: same.
(LP: #1404475)
* Update the symbols file.
** Patch added: opus_1.1-0ubuntu2.debdiff
** Changed in: opus (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1404475
Title:
Multi-Arch support
To manage notifications about this bug go to:
It makes more sense to push this to trusty-updates so everyone benefits from
the bugfixes:
https://wiki.ubuntu.com/StableReleaseUpdates
The changes in 1.11.1 are only related to website parsing so you can
basically take the utopic package and add a changelog entry with the
version
Your data is still in /var/lib/owncloud/data/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384355
Title:
ownCloud should be removed
To manage notifications about this bug go to:
I have strongly mixed feelings about installing intel-microcode by default.
Of course it's good to have the latest microcode bugfixes.
What worries me is that Intel provides no release notes at all.
They didn't even put up a warning for the update that disables the TSX
instruction.
Removing an
In one particular case a trusty-utopic failed because the virtuoso-
nepomuk package was still present in rc state.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1389320
Title:
Ubuntu 12.04 to 14.04
virtuoso-nepomuk contains the broken init script. The package has been
removed after the precise release.
Adding a quirk to release-upgrader to remove the init script is the only option
I can think of.
SRUing the package in precise wouldn't work since that won't affect systems
that have been
** Patch added: utopic debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253035/+files/quassel_0.10.1-0ubuntu1.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: trusty debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253034/+files/quassel_0.10.0-0ubuntu2.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8483
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to konversation in Ubuntu.
https://bugs.launchpad.net/bugs/1389296
Title:
konversation: out-of-bounds read on a
** Patch added: precise debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4252994/+files/quassel_0.8.0-0ubuntu1.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
Check for invalid input in encrypted buffers
The ECB Blowfish decryption function assumed that encrypted input would
always come in
** Also affects: quassel (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification
I can confirm that removing linux-image-extra keeps the inintramfs image
intact now.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.
This is caused by an Ubuntu patch in the qemu package that changes the default
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for
Public bug reported:
In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.
This is caused by an Ubuntu patch in the qemu package that changes the default
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for
astyle 2.04 will soon be available in trusty-backports.
For trusty-updates usually only fixes targeting specific bugs are allowed.
** Changed in: astyle (Ubuntu)
Status: Triaged = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Public bug reported:
The cups 1.7.5-3 AppArmor profile has this rule which seems to be ineffective:
signal (receive, send) peer=third_party,
I get this denial log entry when (re)installing cups:
audit: type=1400 audit(1412239287.417:110): apparmor=DENIED
operation=signal
Public bug reported:
Situation: linux-image-X-generic and linux-image-extra-X-generic are
both installed
When you remove linux-image-extra-X-generic (e.g. switching from -generic to
-virtual) /boot/initrd.img-X-generic is deleted in
linux-image-extra-X-generic's postrm script.
This results
This happened with linux-image-extra-3.13.0-36-generic 3.13.0-36.63 but
the code in postrm is also present in the latest utopic kernel.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310
Title:
No need for logs, it's easy to reproduce.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1375310
Title:
Removing
Unsubscribing ubuntu-sponsors as there's nothing to do at the moment.
I think now that debian has switched to libjpeg-turbo too there is no
reason anymore for an ubuntu delta.
You can't say that without actually checking the delta.
--
You received this bug notification because you are a
This bug was fixed in the package focuswriter - 1.5.3-1
Sponsored for Jackson Doak (noskcaj)
---
focuswriter (1.5.3-1) unstable; urgency=medium
* New upstream release
-- Graeme Gott gra...@gottcode.org Sun, 17 Aug 2014 12:59:45 +
** Changed in: focuswriter (Ubuntu)
Tested with apparmor 2.8.96~2652-0ubuntu5.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1373085
Title:
Parser error when using regex profile names in IPC rules
To manage notifications about this
Public bug reported:
I tried to add this rule to the firefox profile:
unix (send, receive) type=stream
peer=(label=/usr/lib/firefox/firefox\{,\*\[^s\]\[^h\]\}//plugincontainer),
apparmor_parser fails with:
syntax error, unexpected TOK_CONDID, expecting TOK_EQUALS or TOK_IN
When I add quotes
Please revert the 2.20140913.1ubuntu1 upload.
After loading the new microcode lots of processes die with
[ 43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab
sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000]
[ 44.201798] traps: dbus-daemon[1277] trap invalid
Full dmesg output:
[ 43.606830] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1a
[ 43.608466] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03
[ 43.608494] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1a
[ 43.609327] microcode: CPU1 updated to revision 0x1c, date =
Both yes and early work fine.
However when I set IUCODE_TOOL_INITRAMFS=no, update the initramfs, reboot and
then reinstall intel-microcode I get the same trap invalid opcode.
I guess no processes that use libpthread run during early boot when the
microcode update is applied.
early:
[
It looks like this is the microcode update that disables TSX where it is broken.
The hle flag is removed from cpuinfo flags (see attached cpuinfo files).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: cpuinfo-1a.txt
https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206807/+files/cpuinfo-1a.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352
Title:
** Attachment added: cpuinfo-1c.txt
https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206812/+files/cpuinfo-1c.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370352
Title:
Public bug reported:
The apparmor init script (and likely the upstart job, but haven't
checked) returns exit code 0 even when a profile can't be loaded.
In /lib/apparmor/functions foreach_configured_profile first loads profiles from
/etc/apparmor.d and then from /var/lib/apparmor/profiles.
Tested with apparmor 2.8.96~2652-0ubuntu4.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370228
Title:
init script returns 0 even after parsing failure
To manage notifications about this bug go
This has been fixed in smokegen 4:4.14.0-0ubuntu2.
** Changed in: smokegen (Ubuntu Utopic)
Status: Confirmed = Fix Released
** Changed in: smokeqt (Ubuntu Utopic)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Kubuntu
Bugs,
Public bug reported:
AppArmor seems to prevent cupsd from connecting to the system dbus:
Sep 10 09:06:00 callisto kernel: audit: type=1400 audit(1410332760.203:112):
apparmor=DENIED operation=connect info=Failed name lookup - disconnected
path error=-13 profile=/usr/sbin/cupsd
The fix is to change the following in debian/apparmor/libvirt-qemu:
/run/shm/ r,
owner /run/shm/spice.* rw,
-
/{dev,run}/shm/ r,
owner /{dev,run}/shm/spice.* rw,
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This pygobject update causes virt-manager to crash on startup, see bug
#1359815
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1359671
Title:
New upstream version 3.13.90
To manage notifications
Another month later ...
I hope doing parts of the build offline to avoid proper build-dependencies is
not considered a permanent solution.
If it is a problem to promote these two packages please consider
dropping zsh from whatever seed that is pulling it into main.
--
You received this bug
Have you tested that stellarium 0.13.0-2 runs fine on 14.04?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1227883
Title:
Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS
To
4:4.13.95 already includes the fix.
** Also affects: kde4libs (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: kde4libs (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: kde4libs (Ubuntu Trusty)
Importance: Undecided
Status: New
** Patch added: precise debdiff
https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166036/+files/kde4libs_4.8.5-0ubuntu0.4.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I have verified that polkit authentication (changing login manager
settings in system settings) still works with the patch.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde4libs in Ubuntu.
https://bugs.launchpad.net/bugs/1350019
Title:
** Patch added: trusty debdiff
https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166037/+files/kde4libs_4.13.2a-0ubuntu0.3.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I'll work on preparing debdiffs.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1350019
Title:
CVE-2014-5033: kauth authentication bypass
To manage notifications about this bug go to:
*** This bug is a security vulnerability ***
Public security bug reported:
In kauth:
Using the PID for authentication is prone to a PID reuse race condition, and a
security issue.
https://bugzilla.novell.com/show_bug.cgi?id=864716
If someone with the appropriate permissions can set this back to
Confirmed in Precise, that would be appreciated.
Done.
** Changed in: openafs (Ubuntu Precise)
Status: Fix Released = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
*** This bug is a security vulnerability ***
Public security bug reported:
There are two mumble security advisories:
http://mumble.info/security/Mumble-SA-2014-005.txt
http://mumble.info/security/Mumble-SA-2014-006.txt
** Affects: mumble (Ubuntu)
Importance: Undecided
Status: New
Attached is a debdiff for trusty.
The same changes should probably apply to saucy but I haven't tested it.
The patches are not easily adaptable to the version in precise.
** Patch added: mumble_1.2.4-0.2ubuntu1.1.debdiff
3.5 has been synced to utopic, see bug #1323041
** Changed in: mod-wsgi (Ubuntu Utopic)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
3.5 has been synced to utopic, see bug #1323041
** Changed in: mod-wsgi (Ubuntu Utopic)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338
Title:
CVE
*** This bug is a security vulnerability ***
Public security bug reported:
Two vulnerabilities have been discovered in mod-wsgi:
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html
CVE-2014-0240 affects all Ubuntu releases.
CVE-2014-0242 affects = precise.
** Affects:
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no
source differences in Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to mod-wsgi in Ubuntu.
https://bugs.launchpad.net/bugs/1322338
Title:
CVE 2014-0240
debdiff for trusty attached.
The same can be applied to saucy.
** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff
--
You received this bug notification because you are a
debdiff for precise attached
** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Server Team, which
*** This bug is a security vulnerability ***
Public security bug reported:
Two vulnerabilities have been discovered in mod-wsgi:
http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html
CVE-2014-0240 affects all Ubuntu releases.
CVE-2014-0242 affects = precise.
** Affects:
debdiff for precise attached
** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
debdiff for trusty attached.
The same can be applied to saucy.
** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff
--
You received this bug notification because you are a
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no
source differences in Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1322338
Title:
CVE 2014-0240 and CVE 2014-0242
Seems like a good candidate for a stable release update, not for
backports.
** Changed in: trusty-backports
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1315742
Title:
Thanks, here is a debdiff for saucy.
** Patch added: virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4085763/+files/virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff
--
You received this bug notification because you are a
trusty has the latest VirtualBox release which is not affected by these
vulnerabilities.
** Changed in: virtualbox (Ubuntu Trusty)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
VirtualBox has accumulated multiple security vulnerabilities over time.
This is a bug to track the progress on fixing them (at least in precise).
** Affects: virtualbox (Ubuntu)
Importance: Undecided
Attached is a debdiff for precise that basically takes all the security fixes
from the yet-unreleased wheezy-security 4.1.18-dfsg-2+deb7u3 package.
I have performed basic functionality testing (booting Grml into graphical mode
in a VM).
** Patch added: virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff
Thanks for testing.
Attached is a cleaned up debdiff.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1293704
Title:
Kleopatra don't support s/mime
To manage notifications about this bug go to:
1 - 100 of 2530 matches
Mail list logo