http://www.ubuntu.com/usn/usn-2449-1/
** Changed in: ntp (Ubuntu Lucid)
Status: In Progress = Fix Released
** Changed in: ntp (Ubuntu Precise)
Status: In Progress = Fix Released
** Changed in: ntp (Ubuntu Trusty)
Status: In Progress = Fix Released
** Changed in: ntp
)
Status: New = Confirmed
** Changed in: openssl (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: postfix (Ubuntu Lucid)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
** Changed in: apparmor (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1354903
Title:
Apparmor crashes when I create a new
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1334618
Title:
Fullscreen apps are displayed on the lock
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Private Security to Public Security
** Changed in: klibc (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to klibc in Ubuntu.
** Bug watch added: Debian Bug tracker #702559
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702559
** Also affects: bash (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702559
Importance: Unknown
Status: Unknown
** Information type changed from Private Security
** Changed in: cups (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: cups (Ubuntu Precise)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: cups (Ubuntu Trusty)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed
** Changed in: cups (Ubuntu Utopic)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1349387
Title:
server settings are inaccessible
@ Forest Bond: Please file a new bug, this bug is closed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1329274
Title:
apt-get source fails to warn on unauthenticated
** Information type changed from Private Security to Public Security
** Package changed: unity (Ubuntu) = gnome-screensaver (Ubuntu)
** Changed in: gnome-screensaver (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
systemd in vivid isn't compiled with apparmor support:
AppArmor:no
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1396270
Title:
specifying
Here is a debdiff to turn on AppArmor support, which appears to have
solved the issue.
** Patch added: systemd_215-6ubuntu2.debdiff
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1396270/+attachment/4268304/+files/systemd_215-6ubuntu2.debdiff
--
You received this bug notification
** Also affects: eglibc (Ubuntu Vivid)
Importance: Undecided
Status: Confirmed
** Also affects: eglibc (Ubuntu Lucid)
Importance: Undecided
Status: New
** Also affects: eglibc (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: eglibc (Ubuntu
** Changed in: eglibc (Ubuntu Lucid)
Importance: Undecided = Medium
** Changed in: eglibc (Ubuntu Lucid)
Status: New = Confirmed
** Changed in: eglibc (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: eglibc (Ubuntu Precise)
Importance
FWIW, the package in utopic-proposed fixes the issue for me.
I'm not marking as verification-done, as I would really like for someone
else who is affected by this bug to test it also.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Public bug reported:
At some point in the development cycle, TextFields stopped rendering
correctly on actual devices and in the emulator.
Attached are two screenshots:
desktop.png is what the textfield look like on the desktop, and
emulator.png is what they look like on the emulator.
Code to
** Attachment added: desktop.png
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1397410/+attachment/4270296/+files/desktop.png
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
** Attachment added: emulator.png
https://bugs.launchpad.net/ubuntu/+source/ubuntu-ui-toolkit/+bug/1397410/+attachment/4270297/+files/emulator.png
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
This issue exists both in the emulator, and on a nexus 4.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-ui-toolkit in
Ubuntu.
https://bugs.launchpad.net/bugs/1397410
Title:
TextField isn't rendering correctly
FYI, I can confirm the device and emulator matched the style of
textfields on the desktop last time I uploaded the app, which was on
August 13th, so something changed since then.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
This is CVE-2014-9092
** Package changed: imagemagick (Ubuntu) = libjpeg-turbo (Ubuntu)
** Changed in: libjpeg-turbo (Ubuntu)
Importance: Undecided = Low
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-9092
** Also affects: libjpeg-turbo (Ubuntu Vivid)
Importance:
)
Importance: Undecided
Status: New
** Also affects: nss (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: nss (Ubuntu Vivid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Utopic)
Assignee: (unassigned) = Marc Deslauriers
Lucid)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Precise)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Trusty
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Have you reported this issue to the upstream bash developers?
** Changed in: bash (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
It's perfectly normal for the script command to give you an
interactive shell prompt, that's what it was designed for.
This behaviour is perfectly normal, and works as expected.
** Changed in: shadow (Ubuntu)
Status: New = Invalid
** Information type changed from Private Security to
ACK on the merge. Looks good, thanks!
I've uploaded it.
** Changed in: nss (Ubuntu)
Status: Confirmed = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
** Changed in: xorg (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1271166
Title:
Gómez Peer under Wine appears on the lock screen
)
Status: New = Confirmed
** Changed in: gnupg (Ubuntu Lucid)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: gnupg (Ubuntu Precise)
Importance: Undecided = Wishlist
** Changed in: gnupg (Ubuntu Precise)
Status: New = Confirmed
** Changed in: gnupg (Ubuntu
apt-add-repository validates that the key that was downloaded is the
right one before importing it, it doesn't blindly trust the key that gpg
downloaded from the keyserver.
This is wishlist simply because it's security hardening. I will include
it in the next gnupg security upload.
--
You
This bug was fixed in the package flac - 1.3.1-1
Sponsored for Jackson Doak (noskcaj)
---
flac (1.3.1-1) experimental; urgency=medium
[ Jackson Doak ]
* Disable silent rules
* Enable hardening
* Add symbols files
[ Fabian Greffrath ]
* Adapt debian/watch file to reflect
Can you try with:
SSLProtocol +TLSv1.1 +TLSv1.2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1400473
Title:
Apache 2.2 on Ubuntu 12.04 LTS only supports TLS1.0 which
(Ubuntu)
Importance: Undecided
Status: Confirmed
** Affects: libav (Ubuntu Precise)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Affects: libav (Ubuntu Trusty)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur
While apache in Ubuntu 12.04 does support TLSv1.2, it doesn't allow
specifying the configuration options to selectively disable TLSv1.0.
The following commit needs to be backported:
https://svn.apache.org/viewvc?view=revisionrevision=1445104
** Package changed: openssl (Ubuntu) = apache2
** Changed in: openssl (Ubuntu)
Status: Expired = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1400473
Title:
Apache 2.2 on Ubuntu 12.04 LTS only
I have always used network-manager, so I'll wait.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1429975
Title:
nfs no longer mounted at boot with systemd
Status in
Public bug reported:
A lot of applications that are currently shipping in vivid display gtk
deprecation warnings. While this is useful to developers, it is a
nuisance for users who are powerless to fix these issues.
For certain graphical applications, printing warnings on the console
isn't much
In case this is helpful:
$ cat /run/systemd/generator/mnt-server.mount
# Automatically generated by systemd-fstab-generator
[Unit]
SourcePath=/etc/fstab
Documentation=man:fstab(5) man:systemd-fstab-generator(8)
Before=remote-fs.target
[Mount]
What=192.x.x.x:/opt/share
Where=/mnt/server
I have now published a new version with the security patches put back in
and the regression fixed:
http://www.ubuntu.com/usn/usn-2522-3/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to icu in Ubuntu.
** Changed in: ca-certificates (Ubuntu)
Status: In Progress = New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1425071
Title:
package ca-certificates
It's been done, thanks.
** Changed in: icu (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to icu in Ubuntu.
https://bugs.launchpad.net/bugs/1425188
Title:
Sync icu 52.1-7.1 (main)
I can reproduce this issue, and will investigate it.
** Changed in: icu (Ubuntu)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to icu in Ubuntu.
https
I confirm the instructions in comment #6 have solved my issue with nfs
mounts at boot.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1430280
Title:
Devices that report a wrong time remaining need to be blacklisted, just
like any other misbehaving hardware device. The fact that such devices
exist is not a valid reason to get rid of a sane and elegant
notification system.
Do you own a mouse with an incorrect time remaining estimate?
--
You
JW,
It will, yes. If your laptop battery is charging, or is discharging, it will
now be shown in preference to your mouse.
If your laptop battery is fully charged, your mouse will be shown.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Devices that report a wrong time remaining need to be blacklisted,
just like any other misbehaving hardware device.
Even if this means most devices will need to be blacklisted? Wouldn't
it require an extreme amount of effort to start blacklisting every mouse
that doesn't work with this feature?
** Bug watch added: GNOME Bug Tracker #723178
https://bugzilla.gnome.org/show_bug.cgi?id=723178
** Changed in: network-manager
Importance: Undecided = Unknown
** Changed in: network-manager
Status: New = Unknown
** Changed in: network-manager
Remote watch: None = GNOME Bug Tracker
Lucid is near end-of-life, we're not going to be fixing this.
** Changed in: gnupg (Ubuntu Lucid)
Status: Confirmed = Won't Fix
** Changed in: gnupg2 (Ubuntu Lucid)
Status: Confirmed = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
This should now be fixed in stable releases also in this update:
http://www.ubuntu.com/usn/usn-2554-1/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnupg in Ubuntu.
https://bugs.launchpad.net/bugs/1371766
Title:
Latest
This bug was filed against a version of Ubuntu that is no longer supported.
I am closing this bug. Please file a new one if the problem is still
reproducible with Ubuntu 14.04 LTS.
** Changed in: software-properties (Ubuntu)
Status: Confirmed = Won't Fix
--
You received this bug
This is fixed in Ubuntu 14.04 LTS and above, and older versions will not get
updated because it may break existing installation.
I'm marking this bug as fixed.
** Changed in: evolution-data-server (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because
I'm not fixing this in the Ubuntu openssl package, go bug upstream if
you want them to change their image format.
** Changed in: openssl (Ubuntu)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Ubuntu 12.10 is no longer supported. I am closing this bug report.
Please file a new one if you can reproduce the issue with Ubuntu 14.04 LTS.
Thank you.
** Changed in: openssl (Ubuntu)
Status: New = Won't Fix
--
You received this bug notification because you are a member of Ubuntu
This bug was filed for an Ubuntu version that is no longer supported. I am
closing this bug.
Please file a new bug if the problem is still present in Ubuntu 14.04 LTS.
** Changed in: network-manager (Ubuntu)
Status: Confirmed = Won't Fix
** Information type changed from Private Security
The version of Ubuntu this bug applied to has been out of support for a
long time now. Closing.
** Changed in: gnome-system-tools (Ubuntu)
Status: Confirmed = Won't Fix
** Changed in: network-manager (Ubuntu)
Status: Confirmed = Won't Fix
** Changed in: policykit-1 (Ubuntu)
*** This bug is a security vulnerability ***
Public security bug reported:
tl;dr; Unity doesn't emit the ActiveChanged signal when the screen is
locked/unlocked
Long version:
unity-settings-daemon's automount plugin has code to detect whether the
screen is locked or not before automatically
** Attachment removed: JournalErrors.txt
https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1438870/+attachment/4362321/+files/JournalErrors.txt
** Also affects: unity (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: unity (Ubuntu Trusty)
Importance: Undecided
Looks to me like the user is in the nopasswdlogin group.
Please remove the user from that group and see if the problem is
resolved.
Thanks!
** Changed in: shadow (Ubuntu)
Status: New = Incomplete
** Information type changed from Private Security to Public Security
--
You received this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Oh! I see, sorry, I got confused as I thought the video was showing the
whole desktop.
That really is a weird bug, and I can't reproduce it on my machines with
the intel driver.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
How are you making Chrome go full-screen like that?
If I maximize it, I still have the global menu at the top and the unity
launcher on the left.
If I hit f11, I no longer have the tabs or the URL bar.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Possibly related to bug 1390234
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1426518
Title:
Windowed fullscreen apps left sided corruption
Status in Unity:
Triaged
ACK on the debdiff.
I've uploaded to vivid.
I've uploaded to trusty and utopic for processing by the SRU team.
Thanks!
** Description changed:
+ A memory leak in policykit causes memory exhaustion over time in
+ kdeinit4.
+
+ [Test Case]
+ 1- check memory usage of kdeinit4 under htop (RES
Here is a patch that implements the preferred sorting order as described
by mpt, and described in comment #12.
** Patch added: lp1315434.patch
https://bugs.launchpad.net/ubuntu/+source/indicator-power/+bug/1315434/+attachment/4334474/+files/lp1315434.patch
--
You received this bug
** Changed in: openssl (Ubuntu Precise)
Status: Confirmed = In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1425914
Title:
DTLS handshake broken -
** Changed in: policykit-1 (Ubuntu Trusty)
Status: New = Confirmed
** Changed in: policykit-1 (Ubuntu Utopic)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
** Changed in: openssl (Ubuntu Utopic)
Status: New = Fix Released
** Changed in: openssl (Ubuntu Vivid)
Status: New = Fix Released
** Changed in: openssl (Ubuntu Precise)
Status: New = Confirmed
** Changed in: openssl (Ubuntu Precise)
Assignee: (unassigned) = Marc
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
In fact, the User Accounts applet in the Settings allows creating a user
with no password by putting it in the nopasswdlogin group, but as soon
as the screen lock comes up, the user is unable to unlock the screen.
So the screen lock definitely needs to honour the nopasswdlogin group,
and this is
The reboot command uses policykit to determine who is allowed to reboot
the computer. The default policy is found in the
/usr/share/polkit-1/actions/org.freedesktop.login1.policy file,
specifically:
action id=org.freedesktop.login1.reboot
descriptionReboot the
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1438758
Title:
User to root privilege escalation
I can't reproduce this, either in a VM, or on real hardware that uses
the nouveau driver.
Are you still able to reproduce this with all current updates applied?
** Changed in: xorg (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tracker in Ubuntu.
https://bugs.launchpad.net/bugs/1440804
Title:
tracker-extract assert failure: tracker-extract:
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Does this happen at the login screen too, or just at the lock screen?
Could you please attach the contents of /etc/pam.d ?
** Information type changed from Private Security to Public Security
** Package changed: gnome-screensaver (Ubuntu) = unity (Ubuntu)
** Changed in: unity (Ubuntu)
Switching package to unity as the screenshot shows unity, not gnome-
screensaver.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubuntu.
https://bugs.launchpad.net/bugs/1447821
Title:
Lockscreen does not ask for
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1437649
Title:
XServer crashes when visiting web page
** Changed in: apparmor (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1444356
Title:
apparmor fails to initialise at startup
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1447078
Title:
Xorg should mark damaged window areas after some
** Information type changed from Private Security to Public Security
** Changed in: tiff (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1449245
Title:
Here is a dump of the same mouse, but running on trusty's kernel 3.13 on
a different laptop (instead of vivid from the previous dump)
** Attachment added: rocketfish-3.13.txt
https://bugs.launchpad.net/ubuntu/+source/upower/+bug/1449051/+attachment/4387130/+files/rocketfish-3.13.txt
--
You
Here is the info dump of another model of bluetooth mouse that displays
the same problem.
** Attachment added: rocketfish.txt
https://bugs.launchpad.net/ubuntu/+source/upower/+bug/1449051/+attachment/4387125/+files/rocketfish.txt
--
You received this bug notification because you are a
Looks like the file layout in /sys/class/bluetooth changed between
kernels 3.13 and 3.16.
** Bug watch added: freedesktop.org Bugzilla #90222
https://bugs.freedesktop.org/show_bug.cgi?id=90222
** Also affects: upower via
https://bugs.freedesktop.org/show_bug.cgi?id=90222
Importance:
** Also affects: sudo (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: policykit-desktop-privileges (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: sudo (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects:
** Changed in: sudo (Ubuntu Precise)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: sudo (Ubuntu Trusty)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed in: sudo (Ubuntu Utopic)
Assignee: (unassigned) = Marc Deslauriers (mdeslaur)
** Changed
101 - 200 of 1108 matches
Mail list logo