[Bug 1779721] Re: systemd-networkd does not configure DHCPv4

2018-08-06 Thread Felix Geyer
This is not really a bug in systemd-networkd. It just adheres more strictly to the standard. In this case the DHCP server doesn't send the Option 51 "IP Address Lease Time" in the DHCPOFFER. RFC2131 declares this a MUST (see Table 3: Fields and options used by DHCP servers). I encountered a

[Bug 1619411] Re: keepass2 databases can't be imported into keepassx

2016-09-01 Thread Felix Geyer
KeePassX supports .kdbx databases starting with version 2.0 (Ubuntu >= 16.04). ** Changed in: keepassx (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1619411

[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
** Patch added: "trusty-security debdiff" https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548197/+files/prosody_0.9.1-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
** Patch added: "wily-security debdiff" https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548198/+files/prosody_0.9.8-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1532943] Re: CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
xenial (0.9.9-1) is already fixed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1532943 Title: CVE-2016-1231 and CVE-2016-1232 To manage notifications about this bug go to:

[Bug 1532943] [NEW] CVE-2016-1231 and CVE-2016-1232

2016-01-11 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: I'll add debdiffs based on the Debian security update: https://lists.debian.org/debian-security-announce/2016/msg7.html ** Affects: prosody (Ubuntu) Importance: Undecided Status: New ** CVE added:

[Bug 1524318] Re: KeePassX Launcher icon is broken

2015-12-09 Thread Felix Geyer
vivid is also affected. Replacing the libmagickcore-extra build-dependency with librsvg2-bin seems to fix it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1524318 Title: KeePassX Launcher icon is

[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-06-25 Thread Felix Geyer
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to kate in Ubuntu. https://bugs.launchpad.net/bugs/1449029 Title: KDEInit could not launch /usr/bin/kate To manage

[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-05-28 Thread Felix Geyer
** Also affects: kate (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: kate (Ubuntu Wily) Importance: Medium Status: Confirmed ** Changed in: kate (Ubuntu Vivid) Status: New = Triaged ** Changed in: kate (Ubuntu Wily) Status: Confirmed =

[Bug 1449029] Re: KDEInit could not launch /usr/bin/kate

2015-05-27 Thread Felix Geyer
I've uploaded a fix to vivid, waiting for approval by the SRU team. wily will be fixed once 15.04 lands (bug is already fixed upstream). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1449029 Title:

[Bug 1446856] Re: Please update quassel to 0.12.1

2015-05-19 Thread Felix Geyer
0.12.2 is in vivid. ** Changed in: quassel (Ubuntu) Status: New = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1446856 Title: Please update quassel to 0.12.1 To manage

[Bug 1455990] Re: quassel-core generates an insecure certificate upon installation

2015-05-18 Thread Felix Geyer
As it's self signed certificate the signature hash algorithm doesn't matter much. 4096 bit seems a bit excessive, no? Slightly offtopic: Quassel stores the md5sum of certs the user has accepted. That's probably a bad idea. -- You received this bug notification because you are a member of

[Bug 1452825] Re: Update to include Wily (and Jessie's release)

2015-05-08 Thread Felix Geyer
** Tags added: verification-done-vivid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1452825 Title: Update to include Wily (and Jessie's release) To manage notifications about this bug go to:

[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390320/+files/unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_4.0.3-1ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390318/+files/unrar-nonfree_4.0.3-1ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390319/+files/unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1451260] Re: Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
I'm not aware of any CVE for this issue. Attached are debdiffs for precise, trusty and utopic. vivid has 5.2.7, so not affected. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451260 Title:

[Bug 1451260] [NEW] Directory traversal vulnerability

2015-05-03 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: unrar-nonfree before version 5.2.7 suffers from a symlink directory traversal vulnerability. More details at: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171 ** Affects: unrar-nonfree (Ubuntu) Importance:

[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-3427 ** Also affects: quassel (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Trusty) Importance: Undecided Status: New -- You received this bug notification because you

[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
** Patch added: quassel_0.10.1-0ubuntu1.2.debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389172/+files/quassel_0.10.1-0ubuntu1.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1448911] Re: Execute initDbSession() on DB reconnects

2015-05-01 Thread Felix Geyer
Attached are debdiffs that fix this vulnerability and CVE-2015-2778/CVE-2015-2779 in trusty and utopic. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2778 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-2779 ** Patch added:

[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.3-2ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387837/+files/pdns_3.3-2ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
debdiffs follow. precise is not affected (only version 3.2 and up). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450037 Title: CVE-2015-1868 To manage notifications about this bug go to:

[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.4.1-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387839/+files/pdns_3.4.1-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1450037] Re: CVE-2015-1868

2015-04-29 Thread Felix Geyer
** Patch added: pdns_3.3.1-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387838/+files/pdns_3.3.1-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1450037] [NEW] CVE-2015-1868

2015-04-29 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: pdns is vulnerable to a label decompression bug can cause crashes on specific platforms: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/ ** Affects: pdns (Ubuntu) Importance: Undecided

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-04-13 Thread Felix Geyer
I have verified that the error message is gone with 5.5.9+dfsg- 1ubuntu4.8 and the php5-fpm logs are rotated correctly. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-04-13 Thread Felix Geyer
I have verified that the error message is gone with 5.5.9+dfsg- 1ubuntu4.8 and the php5-fpm logs are rotated correctly. ** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-18 Thread Felix Geyer
release is automatically redirected to release-proposed nowadays so it doesn't matter which one you use. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to php5 in Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-18 Thread Felix Geyer
release is automatically redirected to release-proposed nowadays so it doesn't matter which one you use. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1230917 Title: [SRU] php5-fpm logrotate errors

[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL

2015-03-17 Thread Felix Geyer
We should probably also add mysql.service next to postgres. Second, neither the systemd unit file nor the upstart script had support for the DAEMON_OPTS variable from /etc/default/quasselcore. This made it difficult for administrators to add extra arguments, which is especially true on

[Bug 1432161] Re: quasselcore.service systemd unit does not depend on PostgreSQL, causing the core to fail to start if it is configured to use PostgreSQL

2015-03-17 Thread Felix Geyer
I'm not sure where you read this. Multiple ExecStart are allowed (but of course not what you actually want). https://fedoraproject.org/wiki/Systemd#How_do_I_customize_a_unit_file.2F_add_a_custom_unit_file.3F says you can add an empty ExecStart= line and then the ExecStart=... you want. The man

[Bug 1431008] Re: Please update quassel to 0.12-rc1

2015-03-17 Thread Felix Geyer
** Changed in: quassel (Ubuntu) Status: New = In Progress ** Changed in: quassel (Ubuntu) Assignee: (unassigned) = Felix Geyer (debfx) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-08 Thread Felix Geyer
Attached is a debdiff that backports the logrotate changes from utopic. ** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff -- You received this bug notification

[Bug 1230917] Re: [SRU] php5-fpm logrotate errors after package switched to upstart

2015-03-08 Thread Felix Geyer
Attached is a debdiff that backports the logrotate changes from utopic. ** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff -- You received this bug notification

[Bug 1422134] Re: please sync virtualbox from debian experimental

2015-02-15 Thread Felix Geyer
** Package changed: virtualbox-guest-additions (Ubuntu) = virtualbox- guest-additions-iso (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422134 Title: please sync virtualbox from debian

[Bug 1404475] Re: Multi-Arch support

2015-01-03 Thread Felix Geyer
Please consider sponsoring the attached changes: * Mark libopus0, libopus-dev and libopus-dbg as Multi-Arch: same. (LP: #1404475) * Update the symbols file. ** Patch added: opus_1.1-0ubuntu2.debdiff

[Bug 1404475] Re: Multi-Arch support

2015-01-03 Thread Felix Geyer
** Changed in: opus (Ubuntu) Status: New = Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1404475 Title: Multi-Arch support To manage notifications about this bug go to:

[Bug 1402175] Re: Please backport pasma-widget-cwp 1.11.1 from utopic

2014-12-21 Thread Felix Geyer
It makes more sense to push this to trusty-updates so everyone benefits from the bugfixes: https://wiki.ubuntu.com/StableReleaseUpdates The changes in 1.11.1 are only related to website parsing so you can basically take the utopic package and add a changelog entry with the version

[Bug 1384355] Re: ownCloud should be removed

2014-12-09 Thread Felix Geyer
Your data is still in /var/lib/owncloud/data/ -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1384355 Title: ownCloud should be removed To manage notifications about this bug go to:

[Bug 1386257] Re: intel-microcode should be installed by default, when the CPU is GenuineIntel

2014-12-02 Thread Felix Geyer
I have strongly mixed feelings about installing intel-microcode by default. Of course it's good to have the latest microcode bugfixes. What worries me is that Intel provides no release notes at all. They didn't even put up a warning for the update that disables the TSX instruction. Removing an

[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk

2014-11-17 Thread Felix Geyer
In one particular case a trusty-utopic failed because the virtuoso- nepomuk package was still present in rc state. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1389320 Title: Ubuntu 12.04 to 14.04

[Bug 1389320] Re: Ubuntu 12.04 to 14.04 upgrade fails - missing LSB comment in virtuoso-nepomuk

2014-11-17 Thread Felix Geyer
virtuoso-nepomuk contains the broken init script. The package has been removed after the precise release. Adding a quirk to release-upgrader to remove the init script is the only option I can think of. SRUing the package in precise wouldn't work since that won't affect systems that have been

[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: utopic debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253035/+files/quassel_0.10.1-0ubuntu1.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: trusty debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253034/+files/quassel_0.10.0-0ubuntu2.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1389296] Re: konversation: out-of-bounds read on a heap-allocated array

2014-11-04 Thread Felix Geyer
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-8483 -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to konversation in Ubuntu. https://bugs.launchpad.net/bugs/1389296 Title: konversation: out-of-bounds read on a

[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-04 Thread Felix Geyer
** Patch added: precise debdiff https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4252994/+files/quassel_0.8.0-0ubuntu1.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1388333] [NEW] CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-01 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138 Check for invalid input in encrypted buffers The ECB Blowfish decryption function assumed that encrypted input would always come in

[Bug 1388333] Re: CVE-2014-8483: out-of-bounds read in ECB Blowfish decryption

2014-11-01 Thread Felix Geyer
** Also affects: quassel (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: quassel (Ubuntu Precise) Importance: Undecided Status: New -- You received this bug notification

[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-10-19 Thread Felix Geyer
I can confirm that removing linux-image-extra keeps the inintramfs image intact now. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available

2014-10-09 Thread Felix Geyer
Public bug reported: In utopic creating a libvirt VM (through virt-manager or virt-install) fails with: internal error: No PCI buses available. This is caused by an Ubuntu patch in the qemu package that changes the default machine type to pc-i440fx-utopic. It also adds an alias ubuntu for

[Bug 1379346] [NEW] Error creating a VM: internal error: No PCI buses available

2014-10-09 Thread Felix Geyer
Public bug reported: In utopic creating a libvirt VM (through virt-manager or virt-install) fails with: internal error: No PCI buses available. This is caused by an Ubuntu patch in the qemu package that changes the default machine type to pc-i440fx-utopic. It also adds an alias ubuntu for

[Bug 1265527] Re: astyle is outdated in Trusty

2014-10-02 Thread Felix Geyer
astyle 2.04 will soon be available in trusty-backports. For trusty-updates usually only fixes targeting specific bugs are allowed. ** Changed in: astyle (Ubuntu) Status: Triaged = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1376611] [NEW] AppArmor: cupsd not allowed to send signals to third_party

2014-10-02 Thread Felix Geyer
Public bug reported: The cups 1.7.5-3 AppArmor profile has this rule which seems to be ineffective: signal (receive, send) peer=third_party, I get this denial log entry when (re)installing cups: audit: type=1400 audit(1412239287.417:110): apparmor=DENIED operation=signal

[Bug 1375310] [NEW] Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
Public bug reported: Situation: linux-image-X-generic and linux-image-extra-X-generic are both installed When you remove linux-image-extra-X-generic (e.g. switching from -generic to -virtual) /boot/initrd.img-X-generic is deleted in linux-image-extra-X-generic's postrm script. This results

[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
This happened with linux-image-extra-3.13.0-36-generic 3.13.0-36.63 but the code in postrm is also present in the latest utopic kernel. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title:

[Bug 1375310] Re: Removing linux-image-extra-X-generic deletes initramfs

2014-09-29 Thread Felix Geyer
No need for logs, it's easy to reproduce. ** Changed in: linux (Ubuntu) Status: Incomplete = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1375310 Title: Removing

[Bug 1374583] Re: Sync libjpeg-turbo 1:1.3.1-3 (main) from Debian unstable (main)

2014-09-28 Thread Felix Geyer
Unsubscribing ubuntu-sponsors as there's nothing to do at the moment. I think now that debian has switched to libjpeg-turbo too there is no reason anymore for an ubuntu delta. You can't say that without actually checking the delta. -- You received this bug notification because you are a

[Bug 1374685] Re: Sync focuswriter 1.5.3-1 (universe) from Debian unstable (main)

2014-09-28 Thread Felix Geyer
This bug was fixed in the package focuswriter - 1.5.3-1 Sponsored for Jackson Doak (noskcaj) --- focuswriter (1.5.3-1) unstable; urgency=medium * New upstream release -- Graeme Gott gra...@gottcode.org Sun, 17 Aug 2014 12:59:45 + ** Changed in: focuswriter (Ubuntu)

[Bug 1373085] Re: Parser error when using regex profile names in IPC rules

2014-09-23 Thread Felix Geyer
Tested with apparmor 2.8.96~2652-0ubuntu5. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1373085 Title: Parser error when using regex profile names in IPC rules To manage notifications about this

[Bug 1373085] [NEW] Parser error when using regex profile names in IPC rules

2014-09-23 Thread Felix Geyer
Public bug reported: I tried to add this rule to the firefox profile: unix (send, receive) type=stream peer=(label=/usr/lib/firefox/firefox\{,\*\[^s\]\[^h\]\}//plugincontainer), apparmor_parser fails with: syntax error, unexpected TOK_CONDID, expecting TOK_EQUALS or TOK_IN When I add quotes

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Please revert the 2.20140913.1ubuntu1 upload. After loading the new microcode lots of processes die with [ 43.611507] traps: systemd[1] trap invalid opcode ip:7f844f84a7ab sp:7fff2ccf7e28 error:0 in libpthread-2.19.so[7f844f839000+18000] [ 44.201798] traps: dbus-daemon[1277] trap invalid

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Full dmesg output: [ 43.606830] microcode: CPU0 sig=0x306c3, pf=0x2, revision=0x1a [ 43.608466] microcode: CPU0 updated to revision 0x1c, date = 2014-07-03 [ 43.608494] microcode: CPU1 sig=0x306c3, pf=0x2, revision=0x1a [ 43.609327] microcode: CPU1 updated to revision 0x1c, date =

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
Both yes and early work fine. However when I set IUCODE_TOOL_INITRAMFS=no, update the initramfs, reboot and then reinstall intel-microcode I get the same trap invalid opcode. I guess no processes that use libpthread run during early boot when the microcode update is applied. early: [

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
It looks like this is the microcode update that disables TSX where it is broken. The hle flag is removed from cpuinfo flags (see attached cpuinfo files). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
** Attachment added: cpuinfo-1a.txt https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206807/+files/cpuinfo-1a.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title:

[Bug 1370352] Re: [Feature] Intel new CPU microcode 20140913

2014-09-17 Thread Felix Geyer
** Attachment added: cpuinfo-1c.txt https://bugs.launchpad.net/intel/+bug/1370352/+attachment/4206812/+files/cpuinfo-1c.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370352 Title:

[Bug 1370228] [NEW] init script returns 0 even after parsing failure

2014-09-16 Thread Felix Geyer
Public bug reported: The apparmor init script (and likely the upstart job, but haven't checked) returns exit code 0 even when a profile can't be loaded. In /lib/apparmor/functions foreach_configured_profile first loads profiles from /etc/apparmor.d and then from /var/lib/apparmor/profiles.

[Bug 1370228] Re: init script returns 0 even after parsing failure

2014-09-16 Thread Felix Geyer
Tested with apparmor 2.8.96~2652-0ubuntu4. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1370228 Title: init script returns 0 even after parsing failure To manage notifications about this bug go

[Bug 1361354] Re: smokegen generates wrong cast function for smokeqt

2014-09-16 Thread Felix Geyer
This has been fixed in smokegen 4:4.14.0-0ubuntu2. ** Changed in: smokegen (Ubuntu Utopic) Status: Confirmed = Fix Released ** Changed in: smokeqt (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Kubuntu Bugs,

[Bug 1367609] [NEW] AppArmor: Prevents connection to system dbus (disconnected path)

2014-09-10 Thread Felix Geyer
Public bug reported: AppArmor seems to prevent cupsd from connecting to the system dbus: Sep 10 09:06:00 callisto kernel: audit: type=1400 audit(1410332760.203:112): apparmor=DENIED operation=connect info=Failed name lookup - disconnected path error=-13 profile=/usr/sbin/cupsd

[Bug 1365163] Re: libvirt-qemu profile needs /dev/shm/spice-* rule for systemd hosts.

2014-09-09 Thread Felix Geyer
The fix is to change the following in debian/apparmor/libvirt-qemu: /run/shm/ r, owner /run/shm/spice.* rw, - /{dev,run}/shm/ r, owner /{dev,run}/shm/spice.* rw, -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1359671] Re: New upstream version 3.13.90

2014-08-22 Thread Felix Geyer
This pygobject update causes virt-manager to crash on startup, see bug #1359815 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1359671 Title: New upstream version 3.13.90 To manage notifications

[Bug 920436] Re: [MIR] yodl

2014-08-12 Thread Felix Geyer
Another month later ... I hope doing parts of the build offline to avoid proper build-dependencies is not considered a permanent solution. If it is a problem to promote these two packages please consider dropping zsh from whatever seed that is pulling it into main. -- You received this bug

[Bug 1227883] Re: Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS

2014-08-01 Thread Felix Geyer
Have you tested that stellarium 0.13.0-2 runs fine on 14.04? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1227883 Title: Please backport Stellarium 0.13.0-2 from Ubuntu 14.10 to 14.04 LTS To

[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
4:4.13.95 already includes the fix. ** Also affects: kde4libs (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: kde4libs (Ubuntu Utopic) Importance: Undecided Status: New ** Also affects: kde4libs (Ubuntu Trusty) Importance: Undecided Status: New

[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
** Patch added: precise debdiff https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166036/+files/kde4libs_4.8.5-0ubuntu0.4.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
I have verified that polkit authentication (changing login manager settings in system settings) still works with the patch. -- You received this bug notification because you are a member of Kubuntu Bugs, which is subscribed to kde4libs in Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title:

[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-30 Thread Felix Geyer
** Patch added: trusty debdiff https://bugs.launchpad.net/ubuntu/utopic/+source/kde4libs/+bug/1350019/+attachment/4166037/+files/kde4libs_4.13.2a-0ubuntu0.3.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1350019] Re: CVE-2014-5033: kauth authentication bypass

2014-07-29 Thread Felix Geyer
I'll work on preparing debdiffs. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1350019 Title: CVE-2014-5033: kauth authentication bypass To manage notifications about this bug go to:

[Bug 1350019] [NEW] CVE-2014-5033: kauth authentication bypass

2014-07-29 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: In kauth: Using the PID for authentication is prone to a PID reuse race condition, and a security issue. https://bugzilla.novell.com/show_bug.cgi?id=864716

[Bug 1206387] Re: openafs-modules-dkms 1.6.1-1+ubuntu0.2: module FTBFS on 3.8.0

2014-07-01 Thread Felix Geyer
If someone with the appropriate permissions can set this back to Confirmed in Precise, that would be appreciated. Done. ** Changed in: openafs (Ubuntu Precise) Status: Fix Released = Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1335597] [NEW] CVE-2014-3755 and CVE-2014-3756

2014-06-29 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: There are two mumble security advisories: http://mumble.info/security/Mumble-SA-2014-005.txt http://mumble.info/security/Mumble-SA-2014-006.txt ** Affects: mumble (Ubuntu) Importance: Undecided Status: New

[Bug 1335597] Re: CVE-2014-3755 and CVE-2014-3756

2014-06-29 Thread Felix Geyer
Attached is a debdiff for trusty. The same changes should probably apply to saucy but I haven't tested it. The patches are not easily adaptable to the version in precise. ** Patch added: mumble_1.2.4-0.2ubuntu1.1.debdiff

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-26 Thread Felix Geyer
3.5 has been synced to utopic, see bug #1323041 ** Changed in: mod-wsgi (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu.

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-26 Thread Felix Geyer
3.5 has been synced to utopic, see bug #1323041 ** Changed in: mod-wsgi (Ubuntu Utopic) Status: Confirmed = Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE

[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: Two vulnerabilities have been discovered in mod-wsgi: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html CVE-2014-0240 affects all Ubuntu releases. CVE-2014-0242 affects = precise. ** Affects:

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no source differences in Ubuntu. -- You received this bug notification because you are a member of Ubuntu Server Team, which is subscribed to mod-wsgi in Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for trusty attached. The same can be applied to saucy. ** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff -- You received this bug notification because you are a

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for precise attached ** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Server Team, which

[Bug 1322338] [NEW] CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: Two vulnerabilities have been discovered in mod-wsgi: http://blog.dscpl.com.au/2014/05/security-release-for-modwsgi-version-35.html CVE-2014-0240 affects all Ubuntu releases. CVE-2014-0242 affects = precise. ** Affects:

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for precise attached ** Patch added: mod-wsgi_3.3-4ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117799/+files/mod-wsgi_3.3-4ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
debdiff for trusty attached. The same can be applied to saucy. ** Patch added: mod-wsgi_3.4-4ubuntu2.1.debdiff https://bugs.launchpad.net/ubuntu/+source/mod-wsgi/+bug/1322338/+attachment/4117797/+files/mod-wsgi_3.4-4ubuntu2.1.debdiff -- You received this bug notification because you are a

[Bug 1322338] Re: CVE 2014-0240 and CVE 2014-0242

2014-05-22 Thread Felix Geyer
mod-wsgi 3.5-1 can be synced to utopic. Despite the version there are no source differences in Ubuntu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1322338 Title: CVE 2014-0240 and CVE 2014-0242

[Bug 1315742] Re: Segmentation fault on tar_extract_all in 14.04/1.2.20-3

2014-05-13 Thread Felix Geyer
Seems like a good candidate for a stable release update, not for backports. ** Changed in: trusty-backports Status: New = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1315742 Title:

[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-16 Thread Felix Geyer
Thanks, here is a debdiff for saucy. ** Patch added: virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1307725/+attachment/4085763/+files/virtualbox_4.2.16-dfsg-3ubuntu0.1.debdiff -- You received this bug notification because you are a

[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-16 Thread Felix Geyer
trusty has the latest VirtualBox release which is not affected by these vulnerabilities. ** Changed in: virtualbox (Ubuntu Trusty) Status: Confirmed = Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1307725] [NEW] Multiple security vulnerabilities

2014-04-14 Thread Felix Geyer
*** This bug is a security vulnerability *** Public security bug reported: VirtualBox has accumulated multiple security vulnerabilities over time. This is a bug to track the progress on fixing them (at least in precise). ** Affects: virtualbox (Ubuntu) Importance: Undecided

[Bug 1307725] Re: Multiple security vulnerabilities

2014-04-14 Thread Felix Geyer
Attached is a debdiff for precise that basically takes all the security fixes from the yet-unreleased wheezy-security 4.1.18-dfsg-2+deb7u3 package. I have performed basic functionality testing (booting Grml into graphical mode in a VM). ** Patch added: virtualbox_4.1.12-dfsg-2ubuntu0.6.debdiff

[Bug 1293704] Re: Kleopatra don't support s/mime

2014-04-07 Thread Felix Geyer
Thanks for testing. Attached is a cleaned up debdiff. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1293704 Title: Kleopatra don't support s/mime To manage notifications about this bug go to:

  1   2   3   4   5   6   7   8   9   10   >