** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1530552
Title:
Segmentation fault on corrupted sqlite3
Christy, can you please include the full relevant DENIED lines from your
logs so that we can best determine which rules need to be added to the
libvirt profiles?
Thanks
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
** Also affects: libvirt (Ubuntu)
Importance: Undecided
** Changed in: libvirt (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: apparmor (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Barki, sudo rm -f /etc/gshadow.lock ; sudo apt-get install -f
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/523896
Title:
useradd: cannot lock /etc/passwd; try
I'm seeing a direct correlation here between the symptom and the kernel
emitting uevents. For example, in the host run:
$ udevadm --monitor
And in another terminal in the host run:
# losetup /dev/loop0 foo
This causes the symptoms even though it has no direct impact on the
container, but
On Wed, Jan 06, 2016 at 02:07:59PM -, msp3k wrote:
> I tried following one of the links to ubuntu.com, but was told "Sorry,
> you are not a member of a group that is allowed to see the data from
> error reports."
Hmm, I thought you'd always be able to view your own reports.
> If you think
** Changed in: openssl (Ubuntu)
Status: Expired => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1475228
Title:
openssl/curl error:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
For the full /boot see a guide like http://askubuntu.com/questions/89710
/how-do-i-free-up-more-space-in-boot for some advice. It'll require a
bit of manual work but isn't terrible..
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
The zeros are probably intentional; the name of abstract unix sockets
allows ascii NULs, and they may or may not be relevant based on the
address length as reported in the C APIs. It's a terrible interface all
around.. (and now that I just now realize that a unix socket with name
@00...00 len=2 is
Looks like this is http://people.canonical.com/~ubuntu-
security/cve/2014/CVE-2014-9512.html
** Information type changed from Private Security to Public Security
** Changed in: rsync (Ubuntu)
Status: New => Confirmed
** CVE added: http://www.cve.mitre.org/cgi-
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
David, the CVE would be strictly for reporting "OK" to a delete command
that did not actually delete anything.
When an admin tries to remove a trusted key, the tools should either
report success when it does, or failure when it cannot.
I'm worried about the "apt-key adv --recv-key" issue; that's
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Another nice find Bernd, but package names are restricted to include
only:
lower case letters (a-z), digits (0-9), plus (+) and minus (-) signs,
and periods (.). They must be at least two characters long and must
start with an alphanumeric character.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I suggest trying:
sudo apt-get update
sudo apt-get -u dist-upgrade
sudo apt-get install -f
sudo apt-get -u dist-upgrade
Chances are good this will unstick whatever is wedged.
Good luck.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Does this issue have a CVE assigned yet? Does it have a Debian bugreport
yet?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1481871
Title:
apt-key del silently fails
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
It may not be making its way to errors.ubuntu.com. If you've got the GUI
installed, you can find a link to reported issues via the control panel,
security & privacy, diagnostics --> "show previous reports". I didn't
see any errors that matched _IO_vfprintf_internal(), though I did notice
that the
Christian, the QRT tests for AppArmor are in http://bazaar.launchpad.net
/~ubuntu-bugcontrol/qa-regression-testing/master/view/head:/scripts
/test-apparmor.py --- it would make sense to have something similar for
openqa, though I don't know how easily that script could be modified or
not. It feels
(The test in question is in QRT, scripts/test-apparmor.py ; I added
apparmor dep just to make sure this doesn't get lost.)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
There's no logging if nc fails to exec and there may not be logging if
nc can't bind the port, and thus isn't running when needed. This may be
just be a random error.
Thanks
** Also affects: apparmor (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification
** Information type changed from Private Security to Public Security
** Changed in: unattended-upgrades (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Attachment added: "Reproducer file"
https://bugs.launchpad.net/ubuntu/+source/grep/+bug/1526548/+attachment/4535328/+files/lightdm-guest-session
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to grep in Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
Christian Boltz discovered that grep 2.22 can be sent into an infinite
loop. 2.21 does not have this issue. The reproducer we have available so
far:
grep -obUa -P '\x04\x08\x00profile\x00\x07' /etc/apparmor.d/cache/*
http://debbugs.gnu.org/cgi/bugreport.cgi?bug=22181
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to grep in Ubuntu.
https://bugs.launchpad.net/bugs/1526548
Title:
grep 2.22 infinite loop
Status in grep package in Ubuntu:
** Tags added: block-proposed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to grep in Ubuntu.
https://bugs.launchpad.net/bugs/1526548
Title:
grep 2.22 infinite loop
Status in grep package in Ubuntu:
New
Bug
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Probably this won't be investigated until mid or late January.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openjpeg in Ubuntu.
https://bugs.launchpad.net/bugs/711061
Title:
[MIR] openjpeg
Status in openjpeg
Changing OpenSSL versions didn't appear to affect the client
** Package changed: openssl (Ubuntu) => kopete (Ubuntu)
** Changed in: kopete (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Can you test with old versions of openssl to find out if this is a
regression in OpenSSL? (I'd be surprised, since OpenSSL hasn't been
updated since June and no one else has reported this issue, but if you
can track down which version broke your setup that would be very
helpful.)
Thanks
**
Which IPs show the errors? It could be that different results may be due
to different TLS terminators at Google. Figuring out one specific IP
that demonstrates the issue may help (assuming Google hasn't done
something crazy like anycast on their search IPs).
--
You received this bug notification
@Amr: We cannot add this firmware to Ubuntu without a license from
Broadcom which allows redistribution. As far as I can see the sources
posted so far do not include such a license. Do you know of any sources
which do?
** Changed in: linux-firmware (Ubuntu)
Status: Confirmed => Incomplete
I think the libuuid postinst hack to fix this introduced regressions:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1491055
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1518151
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Timothy, it'd probably be best to report this to the guitarpro6
packagers; it's plausible they've requested something that apt tried to
satisfy by removing 'sudo', which would leave you with a very difficult
problem.
Thanks
** Changed in: sudo (Ubuntu)
Status: Confirmed => Invalid
--
Public bug reported:
My xenial builder schroot reports libuuid1 cannot be upgraded:
# apt-get update && apt-get -u dist-upgrade
Get:1 http://mirrors.kernel.org xenial InRelease [218 kB]
Get:2 http://mirrors.kernel.org xenial-security InRelease [64.4 kB]
Get:3 http://mirrors.kernel.org
Your other bug report shows removing a surprising number of i386
packages; I wonder why they were installed in the first place, and if
that is related or not. It might be worth investigating that..
For this problem, I think you can make progress with the following
commands:
sudo apt-get install
*** This bug is a duplicate of bug 1516592 ***
https://bugs.launchpad.net/bugs/1516592
** Information type changed from Private Security to Public Security
** This bug has been marked a duplicate of bug 1516592
Multiple buffer overflows
--
You received this bug notification because you
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1516388
Title:
Security bug #1267059 is
** Information type changed from Private Security to Public Security
** Changed in: libpng (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dash in Ubuntu.
https://bugs.launchpad.net/bugs/1516300
Title:
dash command variable assignments remain
This might represent a behaviour that's still unwanted in our dash
packages, especially if Debian's dash packages differ. So I'm setting it
back to 'new' in the hopes that someone from Foundations can give it a
look and decide if this deserves an SRU.
It certainly surprises me.
Thanks
**
mvo, is this suitable for an SRU? Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
https://bugs.launchpad.net/bugs/1267059
Title:
"Unattended-Upgrade::Remove-Unused-Dependencies" does
Public bug reported:
I wanted to test an SRU kernel in -proposed; as suggested by the Wiki
page, I used the following apt preferences to pin the trusty-proposed
pocket to a lower priority:
$ cat /etc/apt/preferences.d/proposed-updates
Package: *
Pin: release a=trusty-proposed
Pin-Priority: 400
Public bug reported:
apparmor_parser -qd is reporting incorrect network family:
$ echo "profile t { network inet6, } " | apparmor_parser -Qd
Warning from stdin (line 1): apparmor_parser: cannot use or update cache,
disable, or force-complain via stdin
- Debugging built structures -
I'm a little surprised this got a CVE number to be honest; allowing
users to edit files via some privileged mechanism when they may control
some portion of the filesystem under consideration is always going to be
dangerous.
sudo cannot actually prevent this -- for example, the patch for this
Ah, the demo program is still illegible only now with pipes. Sigh. I've
attached the program here.
** Attachment added: "o_nofollow.c"
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1512781/+attachment/4512250/+files/o_nofollow.c
--
You received this bug notification because you are a
j. rose, please file a new bug for your issue; this bug is about the
kwallet warning messages which are confusing but otherwise harmless.
Your situation sounds very different.
To file the bug, please run: apport-bug lightdm
Feel free to copy-and-paste the description, it's a great start.
Thanks
** Changed in: linux (Ubuntu)
Importance: Undecided => High
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Seth Forshee (sforshee)
--
You received this bug notification because you are a member
I have a fix, but I will want to run it by upstream before we apply it
to be sure we aren't opening up any security issues. In the meantime
I've put up a test build, please give it a try and verify that the uuid-
runtime upgrade can be successfully installed.
Bug #1509302 is another instance where HookError_ubuntu.txt shows this
bug: https://launchpadlibrarian.net/69771/HookError_ubuntu.txt
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
Public bug reported:
Bug #1509020 is the second instance of an apport-reported bug that
includes the following HookError_ubuntu.txt contents:
Traceback (most recent call last):
File "/usr/lib/python3/dist-packages/apport/report.py", line 197, in _run_hook
symb['add_info'](report, ui)
You've got multiple segmentation violation errors in your system logs;
this many of them for seemingly random programs makes me think you may
have corrupted data on your hard drive or failing memory or other
hardware issues.
Run debsums -as (as root) to see if program files are known to be
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I added apport to this bug because it appears apport assumed that a
binary data source should be encoded UTF-8:
This is from HookError_ubuntu.txt:
UnicodeDecodeError: 'utf-8' codec can't decode byte 0xd0 in position 101:
invalid continuation byte
Thanks
--
You received this bug notification
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Upgrading from an unsupported release after its packages have been
removed from the archives is more work than it could be.
If you're lucky, running sudo do-release-updatewill run to
completion and work for you.
If you can recall the page that gave download links to an unsupported
release,
I'm guessing on ubuntu-touch-session here, if there's a better place to
assign it, please feel free; I'd be curious to know where it is, in that
case.
Thanks
** Also affects: ubuntu-touch-session (Ubuntu)
Importance: Undecided
Status: New
** Information type changed from Private
Losing the state when using the network indicator sounds like a network-
manager bug, so I'm going to change this to affecting that package. The
issue when using a key could be caused by network-manager, the kernel,
or your system firmware depending on how it's implemented for your
machine.
**
** Also affects: apparmor
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1507469
Title:
Evince's Apparmour profile prevents
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mesa in Ubuntu.
https://bugs.launchpad.net/bugs/1424263
Title:
Broken dependencies
Status in mesa package in
I can't imagine the effort involved in hardening all applications to
treat the hostname as untrusted input.
ISPs that sell vservers are really no different from Intel or AMD or
whoever makes your CPU -- you trust them completely and totally with
your data, your executables, and your entire
Roger, nothing needs doing, the error message is describing the
condition _during_ the upgrade but that doesn't affect things once the
upgrade is over.
It's extremely annoying but not harmful enough that anyone's gone to the
effort of fixing it.
Thanks
--
You received this bug notification
** Tags added: poodle
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1505328
Title:
Cups SSL is vulernable to POODLE
Status in cups package in Ubuntu:
New
Bug
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
If your NIC is acting funny, note the following from your dmesg:
[ 97.840034] tg3 :05:02.0: vpd r/w failed. This is likely a
firmware bug on this device. Contact the card vendor for a firmware
update.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
** Package changed: lightdm (Ubuntu) => unity (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Could you run apport-collect 1503787 to collect some logs that may be
useful?
Thanks
** Package changed: ubuntu-docs (Ubuntu) => lightdm (Ubuntu)
** Information type changed from Private Security to Public
** Changed in: lightdm (Ubuntu)
Status: New => Incomplete
--
You received this
Thank you Colin, that's great news.
I think we should have a discussion about which algorithms to deprecate,
when, for the whole distribution. I'd like a consistent approach to when
we stop supporting md5/sha-1/rc4 etc. Of course different protocols may
have different threat models so it may not
Hello, your / and /tmp are completely full; not much will work well
until you fix this.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1502447
Title:
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Your / and /tmp are full, many things will break until you fix these.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1503032
Title:
package
~ubuntu-reviewers, the patch posted here is intended to sketch what a
new patch for this feature may look like and is not intended to be used
as-is in any capacity. Feel free to unsub from this bug.
Thanks
** Tags removed: patch
--
You received this bug notification because you are a member of
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Eldin, you're right that it is time to begin migrating away from
SHA-1 in default OpenSSH configurations. However there is some
historical baggage in parts of the launchpad infrastructure that
prevented upgrading algorithms earlier. (Strictly speaking, the defaults
aren't tied to launchpad
If the kernel pipe mismatch messages keep happening, please also file a
bug against the linux kernel with "ubuntu-bug linux". That feels like a
separate issue that probably needs to be addressed.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1499392
Title:
OpenSSH Security and SHA1
Status in
** Also affects: unity (Ubuntu)
Importance: Undecided
Status: New
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
On a first guess this feels like a bug in a plugin or syntax file; try
looking for the " met c2 = plist" string in your vim addons and
customizations.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to vim in Ubuntu.
I think the web browser is different from the file browser. If you hand
your phone to a stranger, unlocked, with the intention that they can use
the phone to dial someone or view the wikipedia entry for a topic under
debate or check the weather or whatever, you'd really like it to be
difficult for
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1498725
Title:
network manager crashed when removing a usb wifi
1301 - 1400 of 1771 matches
Mail list logo