Re: [Bug 2076308] [NEW] Allow requesting not running update-ca-certificates during install
From a correctness point of view it feels like a job for equivs to install a stub package instead - after all the data is provided externally. But I can see how we don't have good tooling for that. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2076308 Title: Allow requesting not running update-ca-certificates during install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/2076308/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1718444] [NEW] systemd-sysctl in Xenial is not obeying the order of the sysctls
Public bug reported: systemd-sysctl in Xenial forces itself over procps by shipping a link for procps.service to systemd-sysctl.service. However, it does not obey the order both of the files and also of the sysctls within the files. Instead it uses a simple hashmap. As it turns out that's fixed upstream and systemd master uses an ordered hashmap because of this, which at least preserves order within single files. Traditionally files in sysctl.d have been prefixed with numbers to ensure an order and that's now completely non-deterministic on Xenial. Relevant upstream commit: https://github.com/systemd/systemd/commit/886cf982d3018f7451f0548dadbc05bd2d583bb6 Note that conf_files_list_nulstr in master sorts the configuration files using strcmp, so even order of configuration files should be obeyed. ** Affects: systemd (Ubuntu) Importance: Medium Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1718444 Title: systemd-sysctl in Xenial is not obeying the order of the sysctls To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1718444/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1718444] Re: systemd-sysctl in Xenial is not obeying the order of the sysctls
This is fixed in v232 and up. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1718444 Title: systemd-sysctl in Xenial is not obeying the order of the sysctls To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1718444/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1702550] Re: Several files on ddebs.ubuntu.com have bogus content
Colin, could you help route this? ** Changed in: ubuntu Assignee: (unassigned) => Colin Watson (cjwatson) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1702550 Title: Several files on ddebs.ubuntu.com have bogus content To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1702550/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313311] Re: Broken libscrypt.so symlink
The implication is that packages built against scrypt on trusty link against it statically. It's a grave Debian policy violation for one, it's a terrible thing for a security-related library for another. If there's any update to the library, other packages don't pick it up. It's also clear that it has been fixed in newer Ubuntu versions since over two years with no reported regression. That being said, it's clear that for in-distro packages reverse dependencies of libscrypt would need to be recompiled to pick up the dependency. However, they are of course not easy to identify because they never inherited the shlibs dependency in the first place. Similarly I can make the argument that it does not affect any package in the archive because unless they are recompiled they won't see the updated symlink. In the end it's mostly to help people building their own packages on Ubuntu against libscrypt to do it correct and in the manner you'd expect an Ubuntu system to behave. ** Changed in: libscrypt (Ubuntu Trusty) Status: Incomplete => In Progress -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313311 Title: Broken libscrypt.so symlink To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libscrypt/+bug/1313311/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313311] Re: Broken libscrypt.so symlink
** Changed in: libscrypt (Ubuntu Trusty) Status: Confirmed => In Progress ** Description changed: - libscrypt.so is a broken symlink: + [ Impact ] - $ file /usr/lib/libscrypt.so - /usr/lib/libscrypt.so: broken symbolic link to `debian/tmp/usr/lib/libscrypt.so.0' + libscrypt-dev ships a broken symlink from /usr/lib/libscrypt.so to + debian/tmp/usr/lib/libscrypt.so.0. This causes builds linking with + -lscrypt to pick up its static library /usr/lib/libscrypt.a instead. + This happens silently. - This was reported and fixed in Debian, but the fixed version is not yet - in Ubuntu. + [ Test Case ] + + Check if libscrypt-dev's /usr/lib/libscrypt.so symlink points to + libscrypt.so.0 instead of debian/tmp/usr/lib/libscrypt.so.0. + + [ Regression Potential ] + + None. As we see, even if the symlink is broken, the linker falls back to + something else. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313311 Title: Broken libscrypt.so symlink To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libscrypt/+bug/1313311/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313311] Re: Broken libscrypt.so symlink
Debdiff to fix this in trusty attached. ** Patch added: "libscrypt_1-2ubuntu2_1-2ubuntu2.14.04.1.debdiff" https://bugs.launchpad.net/ubuntu/+source/libscrypt/+bug/1313311/+attachment/4811710/+files/libscrypt_1-2ubuntu2_1-2ubuntu2.14.04.1.debdiff ** Changed in: libscrypt (Ubuntu Trusty) Status: New => Confirmed ** Changed in: libscrypt (Ubuntu Trusty) Assignee: (unassigned) => Philipp Kern (pkern) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313311 Title: Broken libscrypt.so symlink To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libscrypt/+bug/1313311/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1313311] Re: Broken libscrypt.so symlink
As it turns out the side-effect of this is that binaries linking against scrypt are picking it up statically because there's a libscrypt.a that works. ** Also affects: libscrypt (Ubuntu Trusty) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1313311 Title: Broken libscrypt.so symlink To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libscrypt/+bug/1313311/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1496163] Re: i915 firmware is not copied to initrd
Attached is a debdiff for a SRU for trusty. ** Patch added: "initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff" https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1496163/+attachment/4792198/+files/initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff ** Description changed: - On Skylake, the skl_dmc firmware is failing to load. From dmesg: + [ Impact ] + + On Skylake, skl_dmc firmware is not incorporated into the initramfs. + This is because it is a symlink to a versioned blob and the initramfs- + tools hook does not dereference symlinks. As the driver is actually + loaded from the initramfs, the firmware is missing for the lifetime of + the boot, which means that the GPU cannot enter its lowest available + power states plus some hotplugging scenarios are broken. This all + manifests itself as such in dmesg: [0.728803] i915 :00:02.0: Direct firmware load for i915/skl_dmc_ver1.bin failed with error -2 [0.728817] [drm:i915_firmware_load_error_print [i915]] *ERROR* failed to load firmware i915/skl_dmc_ver1.bin (0) - This means the GPU can't enter its lowest available power states, plus - many display hotplugging scenarios (that only the skl_dmc firmware can - handle) are broken. + [ Test Case ] - On a whim I tried some other firmware versions: + After the fix has been applied and the initrd regenerates, the firmware + should load successfully after a reboot. - 1) pointed the skl_dmc_ver1.bin symlink to skl_dmc_ver1_18.bin (instead - of skl_dmc_ver1_19.bin) + [ Regression Potential ] - 2) downloaded the latest (skl_dmc_ver1_21.bin) and pointed the - skl_dmc_ver1.bin symlink to it - - But neither corrected the situation. - - Thanks! - - ProblemType: Bug - DistroRelease: Ubuntu 15.10 - Package: linux-image-4.2.0-10-generic 4.2.0-10.11 - ProcVersionSignature: Ubuntu 4.2.0-10.11-generic 4.2.0 - Uname: Linux 4.2.0-10-generic x86_64 - ApportVersion: 2.18.1-0ubuntu1 - Architecture: amd64 - AudioDevicesInUse: - USERPID ACCESS COMMAND - /dev/snd/controlC0: oem1251 F pulseaudio - CurrentDesktop: Unity - Date: Tue Sep 15 16:21:24 2015 - HibernationDevice: RESUME=UUID=637df075-0afa-420f-a3ca-342be8bf297f - IwConfig: - enp4s0no wireless extensions. - - lono wireless extensions. - Lsusb: - Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub - Bus 001 Device 003: ID 04f2:0833 Chicony Electronics Co., Ltd - Bus 001 Device 002: ID 046d:c05a Logitech, Inc. M90/M100 Optical Mouse - Bus 001 Device 004: ID 058f:6364 Alcor Micro Corp. AU6477 Card Reader Controller - Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub - MachineType: System manufacturer System Product Name - ProcFB: 0 inteldrmfb - ProcKernelCmdLine: BOOT_IMAGE=/boot/vmlinuz-4.2.0-10-generic root=UUID=f967534a-9cc3-4d1a-a7f3-72d28959e3c6 ro i915.verbose_state_checks=1 quiet splash vt.handoff=7 - RelatedPackageVersions: - linux-restricted-modules-4.2.0-10-generic N/A - linux-backports-modules-4.2.0-10-generic N/A - linux-firmware1.147 - RfKill: - - SourcePackage: linux - UdevLog: Error: [Errno 2] No such file or directory: '/var/log/udev' - UpgradeStatus: No upgrade log present (probably fresh install) - dmi.bios.date: 08/19/2015 - dmi.bios.vendor: American Megatrends Inc. - dmi.bios.version: 0403 - dmi.board.asset.tag: Default string - dmi.board.name: Z170-P D3 - dmi.board.vendor: ASUSTeK COMPUTER INC. - dmi.board.version: Rev X.0x - dmi.chassis.asset.tag: Default string - dmi.chassis.type: 3 - dmi.chassis.vendor: Default string - dmi.chassis.version: Default string - dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr0403:bd08/19/2015:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKCOMPUTERINC.:rnZ170-PD3:rvrRevX.0x:cvnDefaultstring:ct3:cvrDefaultstring: - dmi.product.name: System Product Name - dmi.product.version: System Version - dmi.sys.vendor: System manufacturer + Unlikely, as the fix is part of Ubuntu since Wily. ** Tags removed: wily -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1496163 Title: i915 firmware is not copied to initrd To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1496163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1642709] Re: linux-firmware on Trusty is missing i915 binaries
Adding Timo explicitly who said in https://bugs.launchpad.net/ubuntu/+source/linux- firmware/+bug/1624164/comments/5 that kbl_dmc is optional and for power saving, but skl_guc_ver6 is actually needed on Skylake. Skylake devices are what we have and which don't properly work without the firmware. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1642709 Title: linux-firmware on Trusty is missing i915 binaries To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-firmware/+bug/1642709/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1643638] Re: CVE-2016-7406 - remote code execution in dropbear SSH
** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-7406 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1643638 Title: CVE-2016-7406 - remote code execution in dropbear SSH To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dropbear/+bug/1643638/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1643379] [NEW] ca-certificates in xenial still trusts CNNIC
*** This bug is a security vulnerability *** Public security bug reported: CNNIC has been distrusted by Mozilla in April 2015 (https://blog.mozilla.org/security/2015/04/02/distrusting-new-cnnic- certificates/). The technical implementation involves blacklisting by notBefore date, which is unfortunately not replicatable by ca- certificates. There should be some kind of action here of pulling the root certificate at some point rather than continue to provide it with blanket trust. (And it's only one example, Startcom and Wosign are more recent ones.) ** Affects: ca-certificates (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1643379 Title: ca-certificates in xenial still trusts CNNIC To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1643379/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1422795] Re: bash crashes often if inputrc contains revert-all-at-newline
** Tags removed: verification-needed ** Tags added: verification-done -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422795 Title: bash crashes often if inputrc contains revert-all-at-newline To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1422795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1422795] Re: bash crashes often if inputrc contains revert-all-at-newline
** Changed in: bash (Ubuntu Trusty) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422795 Title: bash crashes often if inputrc contains revert-all-at-newline To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1422795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1422795] Re: bash crashes often if inputrc contains revert-all-at-newline
https://launchpadlibrarian.net/221500232/bash-readline-revert.debdiff should still be valid to apply to bash as-is on trusty and the problem has been fixed in utopic and up already. Thanks to Laney to accept the bug nomination, which finally caused this bug to enter the sponsoring queue (http://reqorts.qa.ubuntu.com/reports/sponsoring/index.html). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1422795 Title: bash crashes often if inputrc contains revert-all-at-newline To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/bash/+bug/1422795/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Verified on trusty. Unfortunately I don't have a precise machine anymore. After toggling use_tempaddr not all public addresses disappeared with the new kernel while it happened with the old pre- reboot. ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Thanks, Kamal! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 994931] Re: Altering use_tempaddr drops all IPv6 addresses
Where did this get stuck? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/994931 Title: Altering use_tempaddr drops all IPv6 addresses To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/994931/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1096531] Re: After touch /forcefsck and reboot: Assertion failed in log_clear_unflushed
My attempt to target this bug was obviously in error. I meant to update https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1447756 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1096531 Title: After touch /forcefsck and reboot: Assertion failed in log_clear_unflushed To manage notifications about this bug go to: https://bugs.launchpad.net/upstart/+bug/1096531/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1604209] Re: apache2 in trusty-backports is vulnerable to CVE-2016-5387
Anyone to upload an approved backport to trusty-backports? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1604209 Title: apache2 in trusty-backports is vulnerable to CVE-2016-5387 To manage notifications about this bug go to: https://bugs.launchpad.net/trusty-backports/+bug/1604209/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1604209] Re: apache2 in trusty-backports is vulnerable to CVE-2016-5387
New debdiff attached that can be uploaded as-is. ** Patch added: "apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.1~ubuntu14.04.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1604209/+attachment/4709280/+files/apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.1~ubuntu14.04.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1604209 Title: apache2 in trusty-backports is vulnerable to CVE-2016-5387 To manage notifications about this bug go to: https://bugs.launchpad.net/trusty-backports/+bug/1604209/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1604209] Re: apache2 in trusty-backports is vulnerable to CVE-2016-5387
Ok, as it turns out component ownership is also enforced on backports. Unfortunately that means that my MOTU permissions are not sufficient here and this will require a sponsor to upload. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1604209 Title: apache2 in trusty-backports is vulnerable to CVE-2016-5387 To manage notifications about this bug go to: https://bugs.launchpad.net/trusty-backports/+bug/1604209/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1582864] Re: use after free of BOS in usb_reset_and_verify_device
It'd be helpful if this memory corruption regression could be accelerated. It means that unplugging a USB3 device can mess up the memory enough that file lookups that happen afterwards break if apparmor is enabled - just because the allocation size is similar by chance. The resulting oops is very misleading and it took a long time to track this down. It also causes process hangs. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1582864 Title: use after free of BOS in usb_reset_and_verify_device To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1582864/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1570065] Re: Package cgroup-lite: 1.11~ubuntu14.04.1 being held, unable to install
I don't think that Breaks was intended to hit trusty. ** Changed in: cgroup-lite (Ubuntu) Assignee: (unassigned) => Stéphane Graber (stgraber) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1570065 Title: Package cgroup-lite: 1.11~ubuntu14.04.1 being held, unable to install To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1570065/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
The updated thermald package in trusty-proposed fixed the issue on my machine. Downgrading it brings it back. ** Tags removed: verification-needed ** Tags added: verification-done-trusty verification-needed-wily ** Tags removed: verification-needed-wily ** Tags added: verification-needed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/thermald/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
What about trusty? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
FWIW, regarding platform commonality: We saw this after pushing the microcode update on two HP z440 workstations, one in Munich and one in Tokyo. Specifically both were E5-1650 v3. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
0x2b is known good for me, 0x36 known bad. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
processor : 11 vendor_id : GenuineIntel cpu family : 6 model : 63 model name : Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz stepping: 2 microcode : 0x2b cpu MHz : 1233.339 cache size : 15360 KB physical id : 0 siblings: 12 core id : 5 cpu cores : 6 apicid : 11 initial apicid : 11 fpu : yes fpu_exception : yes cpuid level : 15 wp : yes flags : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 clflush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc arch_perfmon pebs bts rep_good nopl xtopology nonstop_tsc aperfmperf eagerfpu pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 ssse3 fma cx16 xtpr pdcm pcid dca sse4_1 sse4_2 x2apic movbe popcnt tsc_deadline_timer aes xsave avx f16c rdrand lahf_lm abm ida arat epb pln pts dtherm tpr_shadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid cqm xsaveopt cqm_llc cqm_occup_llc bugs: bogomips: 6983.44 clflush size: 64 cache_alignment : 64 address sizes : 46 bits physical, 48 bits virtual power management: -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
I could try briefly next week, but from what I recall from my December attempts setting intel_pstate=0 on the kernel's cmdline did *not* help. I saw a different frequency in cpuinfo (1.2 GHz), but the machine was still incredibly slow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1480349] Re: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
So for E5-1650 v3 specifically: 0x2b works (microcode in trusty). 0x36 works with 3.13, but not with either 3.19 nor 4.3. (Pointing at intel_pstate, I think.) ** Changed in: intel-microcode (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1480349 Title: Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/intel-microcode/+bug/1480349/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1446828] Re: gdb pretty printers do not auto-load on Trusty
doko, could this be SRUed to trusty? (Maybe you already have other fixes lined up?) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1446828 Title: gdb pretty printers do not auto-load on Trusty To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gcc-4.8/+bug/1446828/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 984206] Re: gobby crashed with SIGSEGV in gtk_rc_style_finalize()
gobby has been replaced with gobby-infinote. This bug was not reported there, so let's close this out. ** Changed in: gobby (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/984206 Title: gobby crashed with SIGSEGV in gtk_rc_style_finalize() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/984206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 972208] Re: gobby crashed with SIGABRT in __libc_message()
gobby has been replaced with gobby-infinote. This bug was not reported there, so let's close this out. ** Changed in: gobby (Ubuntu) Status: Incomplete => Fix Released ** Changed in: gnutls26 (Ubuntu) Status: Confirmed => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/972208 Title: gobby crashed with SIGABRT in __libc_message() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/972208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 251489] Re: gobby crashes/hangs while using pref combo box
gobby has been replaced with gobby-infinote. This bug was not reported there, so let's close this out. ** Changed in: gobby (Ubuntu) Status: Confirmed => Fix Released ** Changed in: gobby Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/251489 Title: gobby crashes/hangs while using pref combo box To manage notifications about this bug go to: https://bugs.launchpad.net/gobby/+bug/251489/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1475662] Re: Kernel postrm calls /etc/kernel/postinst.d/*
This is a straightforward coding error that does not require any logs. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1475662 Title: Kernel postrm calls /etc/kernel/postinst.d/* To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1475662/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 253736] Re: please add support for (checking) certificates for gobby
gobby-infinote is the successor to gobby and the latter has been removed. gobby-infinote properly implements this behavior. ** Changed in: gobby (Ubuntu) Status: Triaged => Fix Released ** Changed in: obby (Ubuntu) Status: Triaged => Won't Fix ** Changed in: sobby (Ubuntu) Status: Triaged => Won't Fix ** Changed in: net6 (Ubuntu) Status: Triaged => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/253736 Title: please add support for (checking) certificates for gobby To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/253736/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 666492] Re: Gobby does not auto-reconnect to broken server
** Package changed: gobby-infinote (Ubuntu) => gobby (Ubuntu) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/666492 Title: Gobby does not auto-reconnect to broken server To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/666492/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1475662] [NEW] Kernel postrm calls /etc/kernel/postinst.d/*
Public bug reported: Looking at linux-image-extra-3.19.0-18-generic here, but I expect this to be pretty pervasive. This is its postrm: #!/bin/sh set -e case "$0::$1" in *.postinst::configure|*.postrm::remove) depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic || true for dir in "/etc/kernel/postinst.d" "/etc/kernel/postinst.d/3.19.0-18-generic" do if [ -d "$dir" ]; then run-parts --verbose --exit-on-error --arg="3.19.0-18-generic" --arg="/boot/vmlinuz-3.19.0-18-generic" "$dir" fi done ;; esac As you can see it executes /etc/kernel/postinst.d/* instead of /etc/kernel/postrm.d/* even if it's called as a postrm script. Why? The problem for us is that this re-executes dkms's autoinstaller, which recompiles certain modules even if the kernel is being removed. But I find this behavior pretty surprising regardless of this. ** Affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1475662 Title: Kernel postrm calls /etc/kernel/postinst.d/* To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1475662/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1451613] Re: Unity/compiz crashes when locking screen
Andrea, any idea about this? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1451613 Title: Unity/compiz crashes when locking screen To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1451613/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1450442] Re: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0
What's the ETA for trusty? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1450442 Title: Kernel Oops - unable to handle kernel NULL pointer dereference at (null); Call Trace: [] ? audit_compare_dname_path+0x2b/0xa0 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1450442/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1314653] Re: sysvinit: default cpufreq governor to powersave for intel-pstate driver
Package in -proposed looks good to me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1314653 Title: sysvinit: default cpufreq governor to powersave for intel-pstate driver To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sysvinit/+bug/1314653/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1429503] Re: package kdm-gdmcompat (not installed) failed to install/upgrade: el subproceso instalado el script post-installation devolvió el código de salida de error 1
You shouldn't even need it. It fails to install because kdm is not enabled, but this package is only useful with kdm anyhow. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1429503 Title: package kdm-gdmcompat (not installed) failed to install/upgrade: el subproceso instalado el script post-installation devolvió el código de salida de error 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/kdm-gdmcompat/+bug/1429503/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1398465] Re: Memory allocation failure, presumably in FUSE
Seems fixed in -26. That one didn't crash for me yet while -25 crashed within hours. The changelog looks quite horrible to me with quite a few memory corruptions, including thp (on "always" for me), compound page freeing, FUSE, and vfs. Let's close this unless I see it again on -26. ** Changed in: linux (Ubuntu) Status: Incomplete => Invalid ** Changed in: linux (Ubuntu) Status: Invalid => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1398465 Title: Memory allocation failure, presumably in FUSE To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1398465/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1398465] [NEW] Memory allocation failure, presumably in FUSE
Public bug reported: I just tried out linux-lts-utopic on trusty and hit a few backtraces. We make intensive use of FUSE and the FS operation I conducted on FUSE hung post-backtrace. [ 1951.617813] [ cut here ] [ 1951.617818] kernel BUG at /build/buildd/linux-lts-utopic-3.16.0/mm/slub.c:3380! [ 1951.617819] invalid opcode: [#1] SMP [ 1951.617821] Modules linked in: des_generic nfsv3 nfsv4 vmnet(OE) parport_pc vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) xt_addrtype ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat bridge stp llc aufs netconsole configfs nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_NFLOG xt_comment xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_multiport xt_connmark xt_conntrack nf_conntrack xt_mark cuse iptable_filter ip_tables x_tables rpcsec_gss_krb5 nfnetlink_log nfnetlink autofs4 rfcomm bnep bluetooth 6lowpan_iphc binfmt_misc snd_hda_codec_hdmi hp_wmi sparse_keymap intel_rapl x86_pkg_temp_thermal snd_hda_codec_realtek intel_powerclamp coretemp snd_hda_codec_generic kvm_intel kvm ppdev crct10dif_pclmul crc32_pclmul snd_hda_intel ghash_clmulni_intel aesni_intel snd_hda_controller aes_x86_64 lrw snd_hda_codec gf128mul glue_helper ablk_helper cryptd snd_hwdep lp snd_pcm parport serio_raw sb_edac edac_core snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq nvidia(POE) snd_seq_ device snd_timer lpc_ich snd drm ioatdma dca soundcore wmi tpm_infineon mac_hid nfsd auth_rpcgss nfs_acl nfs lockd sunrpc fscache nls_iso8859_1 hid_generic usbhid hid isci firewire_ohci e1000e psmouse(OE) libsas firewire_core ahci libahci ptp crc_itu_t scsi_transport_sas pps_core [last unloaded: vmnet] [ 1951.617874] CPU: 2 PID: 13631 Comm: srcfsd Tainted: P OE 3.16.0-25-generic #33-Ubuntu [ 1951.617876] Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.65 12/19/2013 [ 1951.617877] task: 88061f5cb2f0 ti: 880800cdc000 task.ti: 880800cdc000 [ 1951.617878] RIP: 0010:[] [] kfree+0x133/0x140 [ 1951.617884] RSP: 0018:880800cdfbf8 EFLAGS: 00010246 [ 1951.617885] RAX: 00000400 RBX: 88007833 RCX: 00018020001f [ 1951.617886] RDX: 0000 RSI: ea0002716f80 RDI: 88007833 [ 1951.617887] RBP: 880800cdfc10 R08: 88009c5bf400 R09: 00018020001f [ 1951.617888] R10: ea0001c0 R11: 812bfd95 R12: 8807addaf800 [ 1951.617889] R13: 812bfda1 R14: 00020010 R15: 880800cdfd58 [ 1951.617890] FS: 7fccdb950700() GS:88082fc4() knlGS: [ 1951.617891] CS: 0010 DS: ES: CR0: 80050033 [ 1951.617892] CR2: 08a89ff0 CR3: 0007c8fb7000 CR4: 000407e0 [ 1951.617893] Stack: [ 1951.617894] 8807a1e296c0 8807addaf800 880800cdfc28 [ 1951.617896] 812bfda1 8807a1e296c0 880800cdfc58 812bfe88 [ 1951.617897] 8807a1e296c0 8807addaf800 812c71c0 00020010 [ 1951.617899] Call Trace: [ 1951.617904] [] fuse_request_free+0x31/0x50 [ 1951.617906] [] fuse_put_request+0xc8/0x110 [ 1951.617908] [] ? fuse_short_read+0x160/0x160 [ 1951.617910] [] request_end+0x10c/0x1c0 [ 1951.617911] [] fuse_dev_do_write+0x826/0xd10 [ 1951.617914] [] ? do_sync_read+0x90/0x90 [ 1951.617916] [] fuse_dev_write+0x69/0x80 [ 1951.617918] [] do_sync_readv_writev+0x4c/0x80 [ 1951.617920] [] do_readv_writev+0x1bd/0x240 [ 1951.617922] [] vfs_writev+0x39/0x50 [ 1951.617924] [] SyS_writev+0x4a/0xd0 [ 1951.617927] [] system_call_fastpath+0x1a/0x1f [ 1951.617928] Code: 49 8b 02 31 f6 f6 c4 40 74 04 41 8b 72 68 4c 89 d7 e8 92 3d fb ff eb 8f 4c 8b 50 30 48 8b 10 80 e6 80 4c 0f 44 d0 e9 32 ff ff ff <0f> 0b 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 66 66 90 55 89 f1 [ 1951.617946] RIP [] kfree+0x133/0x140 [ 1951.617948] RSP [ 1951.617950] ---[ end trace a783e9182f5a2f00 ]--- [ 1953.884500] general protection fault: [#2] SMP [ 1953.884505] Modules linked in: des_generic nfsv3 nfsv4 vmnet(OE) parport_pc vmw_vsock_vmci_transport vsock vmw_vmci vmmon(OE) xt_addrtype ipt_MASQUERADE iptable_nat nf_nat_ipv4 nf_nat bridge stp llc aufs netconsole configfs nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables xt_NFLOG xt_comment xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_multiport xt_connmark xt_conntrack nf_conntrack xt_mark cuse iptable_filter ip_tables x_tables rpcsec_gss_krb5 nfnetlink_log nfnetlink autofs4 rfcomm bnep bluetooth 6lowpan_iphc binfmt_misc snd_hda_codec_hdmi hp_wmi sparse_keymap intel_rapl x86_pkg_temp_thermal snd_hda_codec_realtek intel_powerclamp coretemp snd_hda_codec_generic kvm_intel kvm ppdev crct10dif_pclmul crc32_pclmul snd_hda_intel ghash_clmulni_intel aesni_intel snd_hda_controller aes_x86_64 lrw snd_hda_codec gf128mul glue_helper ablk_helper cryptd snd_hwdep lp snd_pcm parport serio_raw sb_edac edac_core snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq nvidia(POE) snd_seq_ device snd_timer l
[Bug 1396065] [NEW] GPF in lru_put_end called from nfsd_cache_lookup
Public bug reported: https://access.redhat.com/solutions/720473 still applies to the trusty kernel. In fact https://lists.ubuntu.com/archives/kernel- team/2014-July/045459.html did apply one of the two patches to 3.11, but it was not applied to 3.13 and is not present in master-next. The other one is http://kernel.ubuntu.com/git?p=ubuntu/linux.git;a=blobdiff;f=fs/nfsd/nfscache.c;h=e5e4675b7e755fd5c69ea52bc194a25501ef286b;hp=02e8e9ad57502fa2ff294181d6f261425bbc5969;hb=92f9180a0bdcec4a579a4b380cc0fa664f88d47d;hpb=9696a6f0ee3a1ea18b9b705a70eb76883cebe7a0 -- which also landed in 3.11 but didn't make it to 3.13. Please apply both to fix this backtrace: Nov 20 16:41:28 REDACTED kernel: [319683.547563] general protection fault: [#1] SMP Nov 20 16:41:28 REDACTED kernel: [319683.552668] Modules linked in: cts des_generic nfsv3 nfsv4 autofs4 binfmt_misc gpio_ich rpcsec_gss_krb5 nfsd nfs_acl auth_rpcgss nfs fscache lockd sunrpc cdc_acm sb_edac edac_core lpc_ich serio_raw mei_me mei mac_hid lp parport raid10 raid456 async_pq async_xor xor async_memcpy async_raid6_recov raid6_pq async_tx bnx2x mpt2sas raid1 ahci scsi_transport_sas libcrc32c libahci mdio raid_class raid0 multipath linear Nov 20 16:41:28 REDACTED kernel: [319683.590384] CPU: 14 PID: 2576 Comm: nfsd Not tainted 3.13.0-39-generic #66~precise1-Ubuntu Nov 20 16:41:28 REDACTED kernel: [319683.598737] Hardware name: Nov 20 16:41:28 REDACTED kernel: [319683.605802] task: 88202704b000 ti: 882025e7a000 task.ti: 882025e7a000 Nov 20 16:41:28 REDACTED kernel: [319683.613379] RIP: 0010:[] [] lru_put_end+0x20/0x70 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.622040] RSP: 0018:882025e7bd58 EFLAGS: 00010206 Nov 20 16:41:28 REDACTED kernel: [319683.627440] RAX: dead00200200 RBX: 880135386e70 RCX: dead00100100 Nov 20 16:41:28 REDACTED kernel: [319683.634654] RDX: 880135386e80 RSI: 8802c2a9904c RDI: 880135386e70 Nov 20 16:41:28 REDACTED kernel: [319683.641878] RBP: 882025e7bd58 R08: 88207fcd7220 R09: 88103f803b00 Nov 20 16:41:28 REDACTED kernel: [319683.649108] R10: a030c908 R11: 00014480 R12: 882025b6a000 Nov 20 16:41:28 REDACTED kernel: [319683.656332] R13: 0002 R14: 8802c2a9901c R15: 0030 Nov 20 16:41:28 REDACTED kernel: [319683.663565] FS: () GS:88207fcc() knlGS: Nov 20 16:41:28 REDACTED kernel: [319683.671749] CS: 0010 DS: ES: CR0: 80050033 Nov 20 16:41:28 REDACTED kernel: [319683.677581] CR2: 7fc557e3b504 CR3: 01c0d000 CR4: 000407e0 Nov 20 16:41:28 REDACTED kernel: [319683.684799] Stack: Nov 20 16:41:28 REDACTED kernel: [319683.686913] 882025e7bda8 a030c896 8820289c9240 0030 Nov 20 16:41:28 REDACTED kernel: [319683.694477] a0339ff8 882025b6a000 a0339ff8 8802c2a99018 Nov 20 16:41:28 REDACTED kernel: [319683.702026] 001c 8802c2a99000 882025e7bde8 a0300e7a Nov 20 16:41:28 REDACTED kernel: [319683.709575] Call Trace: Nov 20 16:41:28 REDACTED kernel: [319683.712132] [] nfsd_cache_update+0x86/0x150 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.718653] [] nfsd_dispatch+0x1ba/0x230 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.724936] [] svc_process_common+0x345/0x680 [sunrpc] Nov 20 16:41:28 REDACTED kernel: [319683.731812] [] svc_process+0x103/0x160 [sunrpc] Nov 20 16:41:28 REDACTED kernel: [319683.738084] [] nfsd+0xbf/0x130 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.743490] [] ? nfsd_destroy+0x80/0x80 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.749679] [] kthread+0xc9/0xe0 Nov 20 16:41:28 REDACTED kernel: [319683.754640] [] ? flush_kthread_worker+0xb0/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.760932] [] ret_from_fork+0x7c/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.766417] [] ? flush_kthread_worker+0xb0/0xb0 Nov 20 16:41:28 REDACTED kernel: [319683.772697] Code: 5b 5d c3 0f 1f 84 00 00 00 00 00 66 66 66 66 90 48 8b 05 a4 11 a1 e1 55 48 8d 57 10 48 8b 4f 10 48 89 e5 48 89 47 58 48 8b 47 18 <48> 89 41 08 48 89 08 b9 30 75 00 00 48 8b 05 55 0d 03 00 48 c7 Nov 20 16:41:28 REDACTED kernel: [319683.792771] RIP [] lru_put_end+0x20/0x70 [nfsd] Nov 20 16:41:28 REDACTED kernel: [319683.799061] RSP Nov 20 16:41:28 REDACTED kernel: [319683.802679] ---[ end trace e4c61e4b0608416b ]--- ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New ** Affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Affects: linux-lts-trusty (Ubuntu Trusty) Importance: Undecided Status: Invalid ** Also affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu Tru
[Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Reproduced with our configuration before (broken) and after (working). Looks good to me, thanks! ** Tags removed: verification-needed-trusty ** Tags added: verification-done-trusty -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Did this also miss the current cycle? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1368444] Re: Add support for ForcePads found on HP EliteBook Folio 1040
I don't see it in 3.13.11.7 nor in the 3.13.y queue. Are you sure that it'll make it? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1368444 Title: Add support for ForcePads found on HP EliteBook Folio 1040 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1368444/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1371316] Re: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
I confirm that the patched kernel fixes the issue. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1371316] [NEW] Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
Public bug reported: The trusty kernel misses the following patch that already landed in utopic with the recent aufs update: https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67 This unbreaks aufs with IMA (Integrity Measurement Architecture) enabled. When IMA is enabled and mmaps are being tracked, the kernel hits a lock ordering bug because a needed semaphore is already held. This patch fixes this issue by not calling out to IMA for the access to the underlying file. However IMA will still see the access to the file in the merged aufs, which should be good enough. Please cherry-pick above patch. ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New ** Also affects: linux-lts-trusty (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1371316 Title: Please cherry-pick an aufs patch to unbreak it in conjunction with IMA To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1371316/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1362434] Re: [precise-backports] Should be a dependency of microcode.ctl
Not, that's not a bug. It might be a bug for microcode.ctl to be updated to the new packaging that uses it, but there's no requirement that it grows new rdepends in a distro track when it's backported. ** Changed in: iucode-tool (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1362434 Title: [precise-backports] Should be a dependency of microcode.ctl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/iucode-tool/+bug/1362434/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1363482] [NEW] ubuntu-keyring includes 1024D keys
Public bug reported: ubuntu-keyring as shipped in trusty contains old 1024D keys dating back to 2004 which are still being trusted for the main archive: % gpg /usr/share/keyrings/ubuntu-archive-keyring.gpg | grep 1024D pub 1024D/437D05B5 2004-09-12 Ubuntu Archive Automatic Signing Key pub 1024D/FBB75451 2004-12-30 Ubuntu CD Image Automatic Signing Key Given that newer 4096R keys are present and have been in precise (through -updates) and trusty, it seems to be about time to drop the older keys. (In the hope that apt does not chose on signatures it cannot verify, otherwise the publisher would need to stop signing with the old key as well.) ** Affects: ubuntu-keyring (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1363482 Title: ubuntu-keyring includes 1024D keys To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-keyring/+bug/1363482/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1363480] [NEW] ubuntu-keyring imports the Ubuntu CD Signing Key as a key trusted by apt
Public bug reported: Please take this with a grain of salt as I'm not reporting it with a clean trusty install at my fingertips. ubuntu-keyring ships a /usr/share/keyrings/ubuntu-archive-keyring.gpg file that contains the Ubuntu CD Signing Keys (old and new): % gpg /usr/share/keyrings/ubuntu-archive-keyring.gpg pub 1024D/437D05B5 2004-09-12 Ubuntu Archive Automatic Signing Key sub 2048g/79164387 2004-09-12 pub 1024D/FBB75451 2004-12-30 Ubuntu CD Image Automatic Signing Key pub 4096R/C0B21F32 2012-05-11 Ubuntu Archive Automatic Signing Key (2012) pub 4096R/EFE21092 2012-05-11 Ubuntu CD Image Automatic Signing Key (2012) They end up being trusted by apt because the keyring is taken as the initial trusted key set in /etc/apt/trusted.gpg. This is most likely not what we want. ** Affects: ubuntu-keyring (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1363480 Title: ubuntu-keyring imports the Ubuntu CD Signing Key as a key trusted by apt To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-keyring/+bug/1363480/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1135163] Re: d-i can't install against an https mirror
The kernel situation with proposed gave me some grief. Hence my testing last week did not work out. I did a clean installation via an nginx reverse proxy and a custom CA (which is *not* the setup at Google, but I had to fudge something for verification instead of testing against our own archive) and it worked right until after debootstrap. The cert was not copied in the chroot. On the other hand, in the real setup ca- certificates as found in Ubuntu is enough to verify certs. I'm not sure if trusty fails the same way, but it might. So this can be marked verified from our side but there's a caveat for other users. (But this is clearly not a regression over precise as it is now.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1135163 Title: d-i can't install against an https mirror To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt-setup/+bug/1135163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1135163] Re: d-i can't install against an https mirror
It seems that an installer is in -proposed as well: 20101020ubuntu136.19 -- I'll test it next week with our preseeds. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1135163 Title: d-i can't install against an https mirror To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt-setup/+bug/1135163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
Thanks, Dave. I'm deploying it from there then. :) @dkpeall: It's in trusty-proposed, too. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1328908] Re: libreoffice draw / impress crash if user service publishing is disabled in avahi
So I pointed out on the bug this was duplicated to why I did that. I find it tiring that you still chose to fight the duplication without any comment. Can you please provide a rationale? Otherwise I'll dupe it to the other bug again. Thanks. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1328908 Title: libreoffice draw / impress crash if user service publishing is disabled in avahi To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1328908/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1319941] Re: libreoffice draw / impress crash if user service publishing is disabled in avahi
The other report might have a shorter log without bug reporting meta noise, but one actually contains the repro steps. The full retrace for debugging purposes can be found in bug #1328908. Let's resurrect this one from the invalid and mark it as confirmed. Thanks. ** Changed in: libreoffice (Ubuntu) Status: Invalid => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1319941 Title: libreoffice draw / impress crash if user service publishing is disabled in avahi To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1319941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1328908] Re: libreoffice draw / impress crash if user service publishing is disabled in avahi
*** This bug is a duplicate of bug 1319941 *** https://bugs.launchpad.net/bugs/1319941 ** Description changed: - Crash. + Crash report for bug #1319941 ProblemType: Crash DistroRelease: Ubuntu 14.04 Package: libreoffice-core 1:4.2.3~rc3-0ubuntu2 ProcVersionSignature: Ubuntu 3.13.0-24.46-generic 3.13.9 Uname: Linux 3.13.0-24-generic x86_64 ApportVersion: 2.14.1-0ubuntu3 Architecture: amd64 CrashCounter: 1 CurrentDesktop: Unity Date: Thu Apr 17 05:17:06 2014 ExecutablePath: /usr/lib/libreoffice/program/soffice.bin ExecutableTimestamp: 1397067724 InstallationDate: Installed on 2014-04-17 (0 days ago) InstallationMedia: Ubuntu 12.04.4 LTS "Precise Pangolin" - Release amd64 (20140204) ProcCmdline: /usr/lib/libreoffice/program/soffice.bin --draw --splash-pipe=5 ProcCwd: /home/smu ProcEnviron: LANGUAGE=en_US PATH=(custom, no user) XDG_RUNTIME_DIR= LANG=en_US.UTF-8 SHELL=/bin/bash Signal: 6 SourcePackage: libreoffice StacktraceTop: __assert_fail_base (fmt=0x7f0db38b4718 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=assertion@entry=0x7f0da8b2d919 "client", file=file@entry=0x7f0da8b2d910 "client.c", line=line@entry=626, function=function@entry=0x7f0da8b2dfe0 "avahi_client_free") at assert.c:92 __GI___assert_fail (assertion=0x7f0da8b2d919 "client", file=0x7f0da8b2d910 "client.c", line=626, function=0x7f0da8b2dfe0 "avahi_client_free") at assert.c:101 avahi_client_free () from /usr/lib/x86_64-linux-gnu/libavahi-client.so.3 ?? () from /usr/lib/libreoffice/program/../program/libsdlo.so ?? () from /usr/lib/libreoffice/program/../program/libsdlo.so Title: soffice.bin crashed with SIGABRT in __assert_fail_base() UpgradeStatus: No upgrade log present (probably fresh install) UserGroups: adm cdrom dip libvirtd lpadmin plugdev sambashare sudo ** This bug has been marked a duplicate of bug 1319941 libreoffice draw / impress crash if user service publishing is disabled in avahi -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1328908 Title: libreoffice draw / impress crash if user service publishing is disabled in avahi To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/1328908/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1300739] Re: keepalived doesn't load any ipv6 virtual servers
Dave, when is this change going out approximately? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1300739 Title: keepalived doesn't load any ipv6 virtual servers To manage notifications about this bug go to: https://bugs.launchpad.net/keepalived/+bug/1300739/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1323165] Re: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756!
Did the workaround work? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1323165 Title: [HP ProLiant DL380p Gen8] kernel BUG at /build/buildd/linux-3.13.0/mm/memory.c:3756! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1323165/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1302605] Re: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss- sec/2014/q2/377 Another proposed patch for this has been posted here: http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a guard around the array access but also drops syscall auditing for x32 calls. ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2014-3917 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1302605 Title: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1302605/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1302398] Re: package isc-dhcp-client 4.2.4-7ubuntu9 failed to install/upgrade: new script pre-installation subprocess returned exit error 2
*** This bug is a duplicate of bug 1302300 *** https://bugs.launchpad.net/bugs/1302300 ** This bug has been marked a duplicate of bug 1302300 package isc-dhcp-client 4.2.4-7ubuntu9 failed to install/upgrade: subprocess new pre-installation script returned error exit status 2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1302398 Title: package isc-dhcp-client 4.2.4-7ubuntu9 failed to install/upgrade: new script pre-installation subprocess returned exit error 2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1302398/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1298445] Re: stgit 0.17.1-1 needs to be synced from Debian sid main
Synced 0.17.1-1 into trusty-proposed. ** Changed in: stgit (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1298445 Title: stgit 0.17.1-1 needs to be synced from Debian sid main To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/stgit/+bug/1298445/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1284606] Re: dhclient ignores dns-servers handled by dhcp-servers
** Changed in: isc-dhcp (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1284606 Title: dhclient ignores dns-servers handled by dhcp-servers To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1284606/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 462634] Re: user name and passphrase dialogs accept non-ASCII characters
This needs to be assigned to one or multiple packages, not Ubuntu. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/462634 Title: user name and passphrase dialogs accept non-ASCII characters To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/462634/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1296028] [NEW] Sync openclonk 5.4.1-1 (universe) from Debian unstable (main)
Public bug reported: Please sync openclonk 5.4.1-1 (universe) from Debian unstable (main) This is an upstream bugfix release. For various reasons 5.4.0-1 was not excellent and required some packaging polishing. The upstream changelog is as follows: OpenClonk 4.1 changes = + Fix game does not initialize when OS runs for longer than 30 days or so + Delete Issues.ocf, Experimental.ocf and Experimental.ocd on install (#1029) + Fix Mac builds + Fix DarkCastle null pointers and intro (#1034) + Fix selecting the clonks via hotkey (#1031) + Fix possible block in tutorial 2 (#1036) + Fix boomshire's door solidmasks (#1035) + Add option to link Boost dynamically (#1025) + Use pkg-config over CMake to find Freetype (#1024) + Make acid corrode coal and firestone (#1032) + Fix the pickaxe creating huge amounts of earth (#1030) + Fix update via *.ocu on Windows 7 (#870) + Fix issues with Crash.ocs intro (#951) + Fix statistics in player selection dialogues ignore linebreaks (#1027) + Change a LogFatal() to Log() when loading of a player failed (related to #693) + Fix a typo in English translation + Move Dialogue to Helpers.ocd to avoid copies + Fix save as scenario for Dialogue + Removed double Title1.png from Arena.ocf I doubt that this would require an exception, even at this point. Changelog entries since current trusty version 5.4.0-1: openclonk (5.4.1-1) unstable; urgency=medium * Imported Upstream version 5.4.1 (bugfix release). (Closes: #733936) - Drop find-freetype-without-prefix.patch; applied upstream. - Drop do-not-link-boost-statically.patch; now configurable upstream. * Re-add menu support, thanks to Markus Koschany. (Closes: #737992) * Install icons into the data package. * Fix two spelling mistakes in the openclonk manpage. * Install the upstream-provided desktop file. * Do not build-depend on a specific version of boost-regex. * Do not build-depend on a specific version of libupnp. * debian/watch: update source code URL -- Philipp Kern Sun, 16 Mar 2014 17:42:45 +0100 ** Affects: openclonk (Ubuntu) Importance: Wishlist Status: Confirmed ** Changed in: openclonk (Ubuntu) Importance: Undecided => Wishlist ** Changed in: openclonk (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1296028 Title: Sync openclonk 5.4.1-1 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openclonk/+bug/1296028/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1135163] Re: d-i can't install against an https mirror
Try the following: d-i mirror/country string manual d-i mirror/protocol string https d-i mirror/https/hostname string buildhost d-i mirror/https/directory string /Ubuntu-14.04-amd64 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1135163 Title: d-i can't install against an https mirror To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt-setup/+bug/1135163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1221995] Re: Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on ubuntu 13.10
** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1221995 Title: Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on ubuntu 13.10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1221995/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1259570] Re: kexec should get a disabling sysctl
Trying to kexec with the sysctl enabled correctly gives "kexec_load failed: Operation not permitted". Re-enabling it does not work, as expected. With the sysctl untouched kexec works just fine. ** Tags removed: verification-needed-saucy ** Tags added: verification-done-saucy -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1259570 Title: kexec should get a disabling sysctl To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1259570/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1242108] Re: all zsh manpages are missing
Dimitri, any update on this? The package has also not been rebased on the version in sid/testing for trusty (5.0.5). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1242108 Title: all zsh manpages are missing To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/zsh/+bug/1242108/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1244627] Re: Please enable CONFIG_IMA in the ubuntu kernel
Could this be enabled in the saucy LTS backport kernel in precise as well, please? It will take a while until the trusty kernel becomes available there and this blocks our switch to the saucy kernel. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1244627 Title: Please enable CONFIG_IMA in the ubuntu kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1244627/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1257857] Re: cgroup-lite fails to install in container in precise
Another bug has been opened for this regression: https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1266993 — Serge, is the SRU tracked in a bug? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1257857 Title: cgroup-lite fails to install in container in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1257857/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
Friendly ping. :) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
No, next week is fine. ;-) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
Could this be moved to -updates now? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1157943] Re: apt-get update fails hash checks on https repositories when file size changes
I'm also unconvinced of this patch. It drops the If-Range logic altogether which means that it requests a range without specifying what the mtime of the partial file was. It also does not use If-Modified- Since in this case. So you'd still end up with a file that's partially corrupted if the file changed underneath. Curl does not seem to have logic to do If-Range properly. So in this case the return code of the HTTP request will indicate if we got the entire file (200 OK) or a partial snippet (206 Partial Content)[1]. 206 will include the range and last-modified date of the current file, which we can check against what we expect. 200 OK should replace the whole file. (No, I'm not volunteering.) [1] http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1157943 Title: apt-get update fails hash checks on https repositories when file size changes To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1157943/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
root@ale:~# apt-cache policy isc-dhcp-client isc-dhcp-client: Installed: 4.1.ESV-R4-0ubuntu5.8 Candidate: 4.1.ESV-R4-0ubuntu5.8 Version table: 4.1.ESV-R4-0ubuntu5.9 0 400 http://ubuntu-precise.mirror.corp.google.com/ubuntu/ precise-proposed/main amd64 Packages *** 4.1.ESV-R4-0ubuntu5.8 0 600 https://rapture-prod.corp.google.com/ ubuntu-precise-base/main amd64 Packages 100 /var/lib/dpkg/status root@ale:~# tail -n 5 /etc/network/interfaces auto eth0 iface eth0 inet manual iface eth0 inet6 auto dhcp 1 root@ale:~# ifdown eth0; ifup eth0 ifdown: interface eth0 not configured net.ipv6.conf.eth0.accept_ra = 1 net.ipv6.conf.eth0.autoconf = 1 root@ale:~# grep nameserver /etc/resolv.conf nameserver 172.16.xxx.xxx root@ale:~# apt-get install isc-dhcp-client=4.1.ESV-R4-0ubuntu5.9 isc-dhcp-common=4.1.ESV-R4-0ubuntu5.9 Reading package lists... Done Building dependency tree Reading state information... Done Suggested packages: resolvconf avahi-autoipd The following packages will be upgraded: isc-dhcp-client isc-dhcp-common 2 upgraded, 0 newly installed, 0 to remove and 1 not upgraded. Need to get 0 B/637 kB of archives. After this operation, 0 B of additional disk space will be used. (Reading database ... 225378 files and directories currently installed.) Preparing to replace isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 (using .../isc-dhcp-client_4.1.ESV-R4-0ubuntu5.9_amd64.deb) ... Unpacking replacement isc-dhcp-client ... Preparing to replace isc-dhcp-common 4.1.ESV-R4-0ubuntu5.8 (using .../isc-dhcp-common_4.1.ESV-R4-0ubuntu5.9_amd64.deb) ... Unpacking replacement isc-dhcp-common ... Processing triggers for man-db ... Setting up isc-dhcp-common (4.1.ESV-R4-0ubuntu5.9) ... Setting up isc-dhcp-client (4.1.ESV-R4-0ubuntu5.9) ... root@ale:~# ifdown eth0; ifup eth0 Sleeping for 338 seconds ... net.ipv6.conf.eth0.accept_ra = 1 net.ipv6.conf.eth0.autoconf = 1 root@ale:~# grep nameserver /etc/resolv.conf nameserver 2401::::53 (IP addresses edited out.) Works for me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
** Description changed: [Impact] isc-dhcp-client in precise does not do stateless DHCPv6 correctly if it's enabled as "dhcp 1" within "iface inet6 auto" within /etc/network/interfaces. The dhclient-script responsible for updating /etc/resolv.conf exists if it doesn't find an IPv6 address in its environment, which is only true for stateful DHCPv6. [Test Case] * You should have IPv6 on your network segment, make a note of the subnet. * Have a stateless DHCPv6 server listen on the network segment: ** Minimal dhcpd6.conf: authoritative; option dhcp6.name-servers 2001:4860:4860::, 2001:4860:4860::8844; option dhcp6.domain-search "ubuntu.com"; - subnet6 fd7a:4ac2:1751:0::/64 {}; + pid-file-name "/tmp/dhcpd.test.pid"; + subnet6 fd7a:4ac2:1751:0::/64 {} ** Adjust the subnet information to the one you're actually using or the DHCP server will refuse to start. ** Install isc-dhcp-server on a host on the same network segment. + ** Disable apparmor (it will yield losts of EPERM for the test file locations). ** Start up the server there using: /usr/sbin/dhcpd -cf dhcpd.conf -6 -lf /tmp/leases.test * Have network configuration be managed by ifupdown, not network-manager: * Add the following configuration to /etc/network/interfaces: iface eth0 inet6 auto - dhcp 1 - * ifdown eth0 - * ifup eth0 + dhcp 1 + * ifdown eth0 && ifup eth0 (alternatively: dhclient -6 -S -v IFACE) * Check if /etc/resolv.conf contains: - search ubuntu.com + search ubuntu.com. nameserver 2001:4860:4860:: nameserver 2001:4860:4860::8844 [Regression Potential] The suggested change is already present since quantal. The change itself is self-contained [Additional Info] /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 contains the following snippet: BOUND6|RENEW6|REBIND6) if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then exit_with_hooks 2 fi # set leased IP ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ dev ${interface} scope global This assumes that the result of the DHCPv6 transaction is an address with a prefix, which is the case for stateful DHCPv6. For stateless DHCPv6, however, we only get additional information that's not directly address-related. This is fixed since quantal and reads like this: BOUND6|RENEW6|REBIND6) if [ "${new_ip6_address}" ] && [ "${new_ip6_prefixlen}" ]; then # set leased IP ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ dev ${interface} scope global fi It looks like the only change from the diff to the current saucy version we need for it to work correctly. ** Description changed: [Impact] isc-dhcp-client in precise does not do stateless DHCPv6 correctly if it's enabled as "dhcp 1" within "iface inet6 auto" within /etc/network/interfaces. The dhclient-script responsible for updating /etc/resolv.conf exists if it doesn't find an IPv6 address in its environment, which is only true for stateful DHCPv6. [Test Case] * You should have IPv6 on your network segment, make a note of the subnet. * Have a stateless DHCPv6 server listen on the network segment: ** Minimal dhcpd6.conf: authoritative; option dhcp6.name-servers 2001:4860:4860::, 2001:4860:4860::8844; option dhcp6.domain-search "ubuntu.com"; pid-file-name "/tmp/dhcpd.test.pid"; subnet6 fd7a:4ac2:1751:0::/64 {} ** Adjust the subnet information to the one you're actually using or the DHCP server will refuse to start. ** Install isc-dhcp-server on a host on the same network segment. ** Disable apparmor (it will yield losts of EPERM for the test file locations). ** Start up the server there using: /usr/sbin/dhcpd -cf dhcpd.conf -6 -lf /tmp/leases.test * Have network configuration be managed by ifupdown, not network-manager: * Add the following configuration to /etc/network/interfaces: iface eth0 inet6 auto dhcp 1 * ifdown eth0 && ifup eth0 (alternatively: dhclient -6 -S -v IFACE) * Check if /etc/resolv.conf contains: search ubuntu.com. nameserver 2001:4860:4860:: nameserver 2001:4860:4860::8844 + * If the old version of the package is installed, /etc/resolv.conf content will not change. [Regression Potential] The suggested change is already present since quantal. The change itself is self-contained [Additional Info] /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 contains the following snippet: BOUND6|RENEW6|REBIND6) if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then exit_with_hooks 2 fi # set leased IP ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ dev ${interface} scope global This assumes that the result of the DHCPv6 transaction is an address with
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
** Description changed: - /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 - contains the following snippet: + [Impact] + isc-dhcp-client in precise does not do stateless DHCPv6 correctly if it's enabled as "dhcp 1" within "iface inet6 auto" within /etc/network/interfaces. The dhclient-script responsible for updating /etc/resolv.conf exists if it doesn't find an IPv6 address in its environment, which is only true for stateful DHCPv6. - BOUND6|RENEW6|REBIND6) - if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then - exit_with_hooks 2 - fi + [Test Case] + * You should have IPv6 on your network segment, make a note of the subnet. + * Have a stateless DHCPv6 server listen on the network segment: + ** Minimal dhcpd6.conf: + authoritative; + option dhcp6.name-servers 2001:4860:4860::, 2001:4860:4860::8844; + option dhcp6.domain-search "ubuntu.com"; + subnet6 fd7a:4ac2:1751:0::/64 {}; + ** Adjust the subnet information to the one you're actually using or the DHCP server will refuse to start. + ** Install isc-dhcp-server on a host on the same network segment. + ** Start up the server there using: /usr/sbin/dhcpd -cf dhcpd.conf -6 -lf /tmp/leases.test + * Have network configuration be managed by ifupdown, not network-manager: + * Add the following configuration to /etc/network/interfaces: + iface eth0 inet6 auto + dhcp 1 + * ifdown eth0 + * ifup eth0 + * Check if /etc/resolv.conf contains: + search ubuntu.com + nameserver 2001:4860:4860:: + nameserver 2001:4860:4860::8844 - # set leased IP - ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ - dev ${interface} scope global + [Regression Potential] + The suggested change is already present since quantal. The change itself is self-contained + + [Additional Info] + /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 contains the following snippet: + + BOUND6|RENEW6|REBIND6) + if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then + exit_with_hooks 2 + fi + + # set leased IP + ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ + dev ${interface} scope global This assumes that the result of the DHCPv6 transaction is an address with a prefix, which is the case for stateful DHCPv6. For stateless DHCPv6, however, we only get additional information that's not directly - address-related. This is fixed in saucy and reads like this: + address-related. This is fixed since quantal and reads like this: - BOUND6|RENEW6|REBIND6) - if [ "${new_ip6_address}" ] && [ "${new_ip6_prefixlen}" ]; then - # set leased IP - ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ - dev ${interface} scope global - fi + BOUND6|RENEW6|REBIND6) + if [ "${new_ip6_address}" ] && [ "${new_ip6_prefixlen}" ]; then + # set leased IP + ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ + dev ${interface} scope global + fi It looks like the only change from the diff to the current saucy version we need for it to work correctly. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
** Changed in: isc-dhcp (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] Re: Stateless DHCPv6 not working in precise
** Patch added: "Proposed SRU" https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+attachment/3779385/+files/isc-dhcp_4.1.ESV-R4-0ubuntu5.8_4.1.ESV-R4-0ubuntu5.9.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1214385] [NEW] Stateless DHCPv6 not working in precise
Public bug reported: /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8 contains the following snippet: BOUND6|RENEW6|REBIND6) if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then exit_with_hooks 2 fi # set leased IP ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ dev ${interface} scope global This assumes that the result of the DHCPv6 transaction is an address with a prefix, which is the case for stateful DHCPv6. For stateless DHCPv6, however, we only get additional information that's not directly address-related. This is fixed in saucy and reads like this: BOUND6|RENEW6|REBIND6) if [ "${new_ip6_address}" ] && [ "${new_ip6_prefixlen}" ]; then # set leased IP ip -6 addr add ${new_ip6_address}/${new_ip6_prefixlen} \ dev ${interface} scope global fi It looks like the only change from the diff to the current saucy version we need for it to work correctly. ** Affects: isc-dhcp (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1214385 Title: Stateless DHCPv6 not working in precise To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1206817] Re: Sync libinfinity 0.5.4-1 (universe) from Debian unstable (main)
Let's use syncpackage instead of requestsync. ** Changed in: libinfinity (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1206817 Title: Sync libinfinity 0.5.4-1 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libinfinity/+bug/1206817/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1206817] [NEW] Sync libinfinity 0.5.4-1 (universe) from Debian unstable (main)
Public bug reported: Please sync libinfinity 0.5.4-1 (universe) from Debian unstable (main) Changelog entries since current saucy version 0.5.3-1: libinfinity (0.5.4-1) unstable; urgency=low * New upstream release fixing multiple possible crashes. * Delete patches applied upstream: - 0001-Fix-a-few-enumeration-type-registration.patch - 0001-Check-for-libm-for-libinftextgtk.patch - 0001-Fix-a-crash-when-a-connection-goes-down-while-attemp.patch - 0001-Fix-assertion-fail-at-drawing-selection.patch * Refreshed the remaining patches. * Replace unversioned breaks introduced in 0.5.2-6.1 with conflicts. -- Philipp Kern Tue, 30 Jul 2013 23:27:10 +0200 ** Affects: libinfinity (Ubuntu) Importance: Wishlist Status: Invalid ** Changed in: libinfinity (Ubuntu) Importance: Undecided => Wishlist ** Changed in: libinfinity (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1206817 Title: Sync libinfinity 0.5.4-1 (universe) from Debian unstable (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libinfinity/+bug/1206817/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 989417] Re: gnome-terminal doesn't redraw if content in a screen window changens
*** This bug is a duplicate of bug 861268 *** https://bugs.launchpad.net/bugs/861268 ** This bug has been marked a duplicate of bug 861268 text corruption in terminals (xterm, urxvt) and emacs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/989417 Title: gnome-terminal doesn't redraw if content in a screen window changens To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/compiz/+bug/989417/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 45129] Re: FFe: update-manager should have per-package changelog locations (was: uses changelogs.ubuntu.com for all packages)
While the Soyuz task of this bug might be a duplicate, that's not true for the update-manager part and it would hurt to make the information in #45129 invisible, hence unmerged. ** This bug is no longer a duplicate of bug 253119 PPA packages do not show a changelog in update-manager -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/45129 Title: FFe: update-manager should have per-package changelog locations (was: uses changelogs.ubuntu.com for all packages) To manage notifications about this bug go to: https://bugs.launchpad.net/launchpad/+bug/45129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1074621] [NEW] Upgrade from 0.8.16~exp12ubuntu10.3 to 0.8.16~exp12ubuntu10.5 leads to segfault at 6c8b48f8 in libapt-pkg.so.4.12.0
Public bug reported: Description:Ubuntu 12.04.1 LTS Release:12.04 On: amd64 >From the kernel log: [6846551.444387] apt-config[8190]: segfault at 6c8b48f8 ip 7fe84340ef84 sp 7fff76182160 error 6 in libapt-pkg.so.4.12.0[7fe8433d6000+121000] [6846551.445957] apt-config[8191]: segfault at 6c8b48f8 ip 7fc124b41f84 sp 7fffa27470a0 error 6 in libapt-pkg.so.4.12.0[7fc124b09000+121000] [6846551.512757] apt-get[8196]: segfault at 6c8b48f8 ip 7f754558bf84 sp 7fff27275a50 error 6 in libapt-pkg.so.4.12.0[7f7545553000+121000] [6846580.877901] package-data-do[8538]: segfault at 7fe440e96010 ip 7fe3d348cf84 sp 7fff9e8ac0f0 error 6 in libapt-pkg.so.4.12.0[7fe3d3454000+121000] [6869450.441332] apt-config[27050]: segfault at 6c8b48f8 ip 7eff7923bf84 sp 797a1a30 error 6 in libapt-pkg.so.4.12.0[7eff79203000+121000] [6869450.443617] apt-config[27051]: segfault at 6c8b48f8 ip 7f5048b95f84 sp 7fff8a6e9a70 error 6 in libapt-pkg.so.4.12.0[7f5048b5d000+121000] [6869450.497879] apt-config[27095]: segfault at 6c8b48f8 ip 7f9543001f84 sp 7fffd7d0b2c0 error 6 in libapt-pkg.so.4.12.0[7f9542fc9000+121000] [6869450.500143] apt-config[27096]: segfault at 6c8b48f8 ip 7fabaa460f84 sp 7fff82255ac0 error 6 in libapt-pkg.so.4.12.0[7fabaa428000+121000] [6869456.275296] apt-get[27222]: segfault at 6c8b48f8 ip 7fa75199ef84 sp 7fffe2239f40 error 6 in libapt-pkg.so.4.12.0[7fa751966000+121000] Tail of strace apt-get update: mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1efdf71000 mprotect(0x7f1efda1a000, 32768, PROT_READ) = 0 mprotect(0x7f1efdd5a000, 16384, PROT_READ) = 0 mprotect(0x62d000, 4096, PROT_READ) = 0 mprotect(0x7f1efdf82000, 4096, PROT_READ) = 0 munmap(0x7f1efdf78000, 32702) = 0 brk(0) = 0x1cf7000 brk(0x1d18000) = 0x1d18000 open("/dev/null", O_WRONLY|O_CREAT|O_TRUNC, 0666) = 3 open("/usr/lib/locale/locale-archive", O_RDONLY|O_CLOEXEC) = 4 fstat(4, {st_mode=S_IFREG|0644, st_size=4447600, ...}) = 0 mmap(NULL, 4447600, PROT_READ, MAP_PRIVATE, 4, 0) = 0x7f1efc40c000 close(4)= 0 stat("/var/lib/apt/.", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0 --- SIGSEGV (Segmentation fault) @ 0 (0) --- +++ killed by SIGSEGV +++ Segmentation fault Desired=Unknown/Install/Remove/Purge/Hold | Status=Not/Inst/Conf-files/Unpacked/halF-conf/Half-inst/trig-aWait/Trig-pend |/ Err?=(none)/Reinst-required (Status,Err: uppercase=bad) ||/ NameVersion Description +++-===-===-== ii apt 0.8.16~exp12ubuntu10.5 commandline package manager dpkg.log of the recent upgrade from .3 to .5 attached. (I.e. there was also other stuff upgraded at the same time.) ** Affects: apt (Ubuntu) Importance: Undecided Status: New ** Tags: precise ** Attachment added: "dpkg.log upgrade log" https://bugs.launchpad.net/bugs/1074621/+attachment/3422463/+files/dpkg.log ** Description changed: Description: Ubuntu 12.04.1 LTS Release: 12.04 + On: amd64 From the kernel log: [6846551.444387] apt-config[8190]: segfault at 6c8b48f8 ip 7fe84340ef84 sp 7fff76182160 error 6 in libapt-pkg.so.4.12.0[7fe8433d6000+121000] [6846551.445957] apt-config[8191]: segfault at 6c8b48f8 ip 7fc124b41f84 sp 7fffa27470a0 error 6 in libapt-pkg.so.4.12.0[7fc124b09000+121000] [6846551.512757] apt-get[8196]: segfault at 6c8b48f8 ip 7f754558bf84 sp 7fff27275a50 error 6 in libapt-pkg.so.4.12.0[7f7545553000+121000] [6846580.877901] package-data-do[8538]: segfault at 7fe440e96010 ip 7fe3d348cf84 sp 7fff9e8ac0f0 error 6 in libapt-pkg.so.4.12.0[7fe3d3454000+121000] [6869450.441332] apt-config[27050]: segfault at 6c8b48f8 ip 7eff7923bf84 sp 797a1a30 error 6 in libapt-pkg.so.4.12.0[7eff79203000+121000] [6869450.443617] apt-config[27051]: segfault at 6c8b48f8 ip 7f5048b95f84 sp 7fff8a6e9a70 error 6 in libapt-pkg.so.4.12.0[7f5048b5d000+121000] [6869450.497879] apt-config[27095]: segfault at 6c8b48f8 ip 7f9543001f84 sp 7fffd7d0b2c0 error 6 in libapt-pkg.so.4.12.0[7f9542fc9000+121000] [6869450.500143] apt-config[27096]: segfault at 6c8b48f8 ip 7fabaa460f84 sp 7fff82255ac0 error 6 in libapt-pkg.so.4.12.0[7fabaa428000+121000] [6869456.275296] apt-get[27222]: segfault at 6c8b48f8 ip 7fa75199ef84 sp 7fffe2239f40 error 6 in libapt-pkg.so.4.12.0[7fa751966000+121000] Tail of strace apt-get update: mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x7f1efdf71000
[Bug 1042040] Re: Ubuntu doesn't trust debian
AFAIK that's not true for ca-certificates, it does include the Debian CA. The problem is Firefox, which does not use the database found in ca- certificates at all. And Ubuntu is not allowed thanks to trademark rules to change the certificate database of NSS (c.f. iceweasel vs. firefox in Debian). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1042040 Title: Ubuntu doesn't trust debian To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1042040/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1031333] Re: Missing Verisign certs due to broken extract script
I think it would be irresponsible to provide MD2-signed certificates. The discussion is dated 2009. I think ca-certificates should provide neither MD2 nor MD5 root certificates. And MD2 verification should be unsupported in the crypto lib anyway (see CVE-2009-2409). ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2009-2409 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1031333 Title: Missing Verisign certs due to broken extract script To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/1031333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1009918] Re: goddy segfaults when joining session
This does not contain apport information normally attached to a bug report and hence does not contain information useful for debugging. I'm afraid that with this information I cannot help you, and I think running "apport-collect 1009918" will not post the missing information, but I may be wrong. ** Changed in: gobby (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1009918 Title: goddy segfaults when joining session To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/1009918/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 996248] Re: Please add SecureTrust CA certificate
** Changed in: ca-certificates (Ubuntu) Importance: High => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/996248 Title: Please add SecureTrust CA certificate To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ca-certificates/+bug/996248/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 335430] Re: package debian-archive-keyring 2008.04.16+nmu1 failed to install/upgrade: subprocess post-installation script returned error exit status 1 when Ubuntu-keyring is not yet installed
The problem of dino99 is something completely different. (I.e. not being able to fetch a PPA key by not following the instructions.) ** Changed in: debian-archive-keyring (Ubuntu) Status: Confirmed => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/335430 Title: package debian-archive-keyring 2008.04.16+nmu1 failed to install/upgrade: subprocess post-installation script returned error exit status 1 when Ubuntu-keyring is not yet installed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/debian-archive-keyring/+bug/335430/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 838299] Re: Installing debian-archive-keyring does not activate the Debian keyring
Should be fixed with version 2012.1 in quetzal, please test. ** Changed in: debian-archive-keyring (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/838299 Title: Installing debian-archive-keyring does not activate the Debian keyring To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apt/+bug/838299/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 871212] Re: keys are not automatically installed as documentation implies
*** This bug is a duplicate of bug 838299 *** https://bugs.launchpad.net/bugs/838299 ** This bug has been marked a duplicate of bug 838299 Installing debian-archive-keyring does not activate the Debian keyring -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/871212 Title: keys are not automatically installed as documentation implies To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/debian-archive-keyring/+bug/871212/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 912493] Re: libpam-cap: /etc/security/capability.conf reported as obsolete config
Fixed in Debian. (Has a libpam-cap now and the file is removed correctly on purge.) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/912493 Title: libpam-cap: /etc/security/capability.conf reported as obsolete config To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libcap2/+bug/912493/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 984206] Re: gobby crashed with SIGSEGV in gtk_rc_style_finalize()
FWIW there's are public servers like gobby.debian.org and gobby.0x539.de to test with, if you still have it installed. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/984206 Title: gobby crashed with SIGSEGV in gtk_rc_style_finalize() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/984206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 984206] Re: gobby crashed with SIGSEGV in gtk_rc_style_finalize()
Is this reproducible? Does it only happen when at least one document is open on close? Is one sufficient to trigger it? What's your Gtk theme? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/984206 Title: gobby crashed with SIGSEGV in gtk_rc_style_finalize() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gobby/+bug/984206/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 972208] Re: gobby crashed with SIGABRT in __libc_message()
The crash is happening within GnuTLS. Given that the code used to work, I assume some bug in that library. ** Also affects: gnutls26 (Ubuntu) Importance: Undecided Status: New ** Changed in: gobby (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/972208 Title: gobby crashed with SIGABRT in __libc_message() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnutls26/+bug/972208/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs