This is not really a bug in systemd-networkd. It just adheres more
strictly to the standard.
In this case the DHCP server doesn't send the Option 51 "IP Address
Lease Time" in the DHCPOFFER. RFC2131 declares this a MUST (see Table 3:
Fields and options used by DHCP servers).
I encountered a
KeePassX supports .kdbx databases starting with version 2.0 (Ubuntu >=
16.04).
** Changed in: keepassx (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1619411
** Patch added: "trusty-security debdiff"
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548197/+files/prosody_0.9.1-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "wily-security debdiff"
https://bugs.launchpad.net/ubuntu/+source/prosody/+bug/1532943/+attachment/4548198/+files/prosody_0.9.8-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
xenial (0.9.9-1) is already fixed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1532943
Title:
CVE-2016-1231 and CVE-2016-1232
To manage notifications about this bug go to:
*** This bug is a security vulnerability ***
Public security bug reported:
I'll add debdiffs based on the Debian security update:
https://lists.debian.org/debian-security-announce/2016/msg7.html
** Affects: prosody (Ubuntu)
Importance: Undecided
Status: New
** CVE added:
vivid is also affected.
Replacing the libmagickcore-extra build-dependency with librsvg2-bin seems to
fix it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1524318
Title:
KeePassX Launcher icon is
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kate in Ubuntu.
https://bugs.launchpad.net/bugs/1449029
Title:
KDEInit could not launch /usr/bin/kate
To manage
** Also affects: kate (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: kate (Ubuntu Wily)
Importance: Medium
Status: Confirmed
** Changed in: kate (Ubuntu Vivid)
Status: New = Triaged
** Changed in: kate (Ubuntu Wily)
Status: Confirmed =
I've uploaded a fix to vivid, waiting for approval by the SRU team.
wily will be fixed once 15.04 lands (bug is already fixed upstream).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1449029
Title:
Accepted into backports.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
** Changed in: vivid-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of
0.12.2 is in vivid.
** Changed in: quassel (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1446856
Title:
Please update quassel to 0.12.1
To manage
As it's self signed certificate the signature hash algorithm doesn't matter
much.
4096 bit seems a bit excessive, no?
Slightly offtopic:
Quassel stores the md5sum of certs the user has accepted. That's probably a bad
idea.
--
You received this bug notification because you are a member of
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452825
Title:
Update to include Wily (and Jessie's release)
To manage notifications about this bug go to:
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390320/+files/unrar-nonfree_5.0.10-1ubuntu0.14.10.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Patch added: unrar-nonfree_4.0.3-1ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390318/+files/unrar-nonfree_4.0.3-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Patch added: unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/unrar-nonfree/+bug/1451260/+attachment/4390319/+files/unrar-nonfree_5.0.10-1ubuntu0.14.04.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
I'm not aware of any CVE for this issue.
Attached are debdiffs for precise, trusty and utopic.
vivid has 5.2.7, so not affected.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451260
Title:
*** This bug is a security vulnerability ***
Public security bug reported:
unrar-nonfree before version 5.2.7 suffers from a symlink directory
traversal vulnerability.
More details at:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774171
** Affects: unrar-nonfree (Ubuntu)
Importance:
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-3427
** Also affects: quassel (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you
** Patch added: quassel_0.10.1-0ubuntu1.2.debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1448911/+attachment/4389172/+files/quassel_0.10.1-0ubuntu1.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Attached are debdiffs that fix this vulnerability and
CVE-2015-2778/CVE-2015-2779 in trusty and utopic.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2778
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-2779
** Patch added:
** Patch added: pdns_3.3-2ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387837/+files/pdns_3.3-2ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
debdiffs follow.
precise is not affected (only version 3.2 and up).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450037
Title:
CVE-2015-1868
To manage notifications about this bug go to:
** Patch added: pdns_3.4.1-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387839/+files/pdns_3.4.1-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: pdns_3.3.1-4ubuntu0.1.debdiff
https://bugs.launchpad.net/ubuntu/+source/pdns/+bug/1450037/+attachment/4387838/+files/pdns_3.3.1-4ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
*** This bug is a security vulnerability ***
Public security bug reported:
pdns is vulnerable to a label decompression bug can cause crashes on specific
platforms:
https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
** Affects: pdns (Ubuntu)
Importance: Undecided
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Accepted into trusty- and utopic-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed
Accepted into trusty- and utopic-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed
Accepted into trusty- and utopic-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed
I've uploaded 0.7.1-1~ubuntu14.04.2 and 0.7.1-1~ubuntu14.10.2 which
include your changes.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I have verified that the error message is gone with 5.5.9+dfsg-
1ubuntu4.8 and the php5-fpm logs are rotated correctly.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
I've accepted the binary packages into the backports archive,
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions:
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to php5 in Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
[SRU] php5-fpm
release is automatically redirected to release-proposed nowadays so
it doesn't matter which one you use.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1230917
Title:
[SRU] php5-fpm logrotate errors
We should probably also add mysql.service next to postgres.
Second, neither the systemd unit file nor the upstart script had support for
the
DAEMON_OPTS variable from /etc/default/quasselcore. This made it difficult for
administrators to add extra arguments, which is especially true on
I'm not sure where you read this. Multiple ExecStart are allowed (but of course
not what you actually want).
https://fedoraproject.org/wiki/Systemd#How_do_I_customize_a_unit_file.2F_add_a_custom_unit_file.3F
says you can add an empty ExecStart= line and then the ExecStart=... you want.
The man
** Changed in: quassel (Ubuntu)
Status: New = In Progress
** Changed in: quassel (Ubuntu)
Assignee: (unassigned) = Felix Geyer (debfx)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs
Done.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions:
Public bug reported:
Please backport iperf3 3.0.7-1 (universe) from vivid to trusty, utopic.
Reason for the backport:
New package.
Testing:
Mark off items in the checklist [X] as you test them, but please leave the
checklist so that backporters can quickly
Attached is a debdiff that backports the logrotate changes from utopic.
** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff
--
You received this bug notification
Attached is a debdiff that backports the logrotate changes from utopic.
** Patch added: php5_5.5.9+dfsg-1ubuntu4.7.debdiff
https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1230917/+attachment/4338026/+files/php5_5.5.9%2Bdfsg-1ubuntu4.7.debdiff
--
You received this bug notification
Backports are not installed automatically.
Run apt-get install -t trusty-backports yelp-tools
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
If previous versions of the backported packages are installed,
updating to the backport versions are accomplished automatically.
Right, but there is no previous backports version of yelp-tools.
You will _not_ get any packages from backports by simply apt-get
(dist-)upgrading a vanilla trusty
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Uploaded to trusty-backports and utopic-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is
Uploaded to utopic-backports.
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions: ubuntu-backporters
Accepted into backports.
** Changed in: precise-backports
Status: New = Fix Released
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of
Uploaded to utopic-backports.
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions: ubuntu-backporters
* utopic:
[x] Package builds without modification
No, it doesn't.
It build-depends on yaggo which is not part of utopic.
Please test that yaggo builds and works fine (normal backports procedure) on
utopic.
** Changed in: utopic-backports
Status: Fix Released = Incomplete
--
You
** Package changed: virtualbox-guest-additions (Ubuntu) = virtualbox-
guest-additions-iso (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422134
Title:
please sync virtualbox from debian
Please consider sponsoring the attached changes:
* Mark libopus0, libopus-dev and libopus-dbg as Multi-Arch: same.
(LP: #1404475)
* Update the symbols file.
** Patch added: opus_1.1-0ubuntu2.debdiff
** Changed in: opus (Ubuntu)
Status: New = Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1404475
Title:
Multi-Arch support
To manage notifications about this bug go to:
Accepted into backports.
** Changed in: precise-backports
Status: New = Fix Released
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of
** Changed in: precise-backports
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
https://bugs.launchpad.net/bugs/1044622
Title:
please backport libimobiledevice” 1.1.4-1~quantal to
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Accepted into utopic-backports.
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions: ubuntu-backporters
It makes more sense to push this to trusty-updates so everyone benefits from
the bugfixes:
https://wiki.ubuntu.com/StableReleaseUpdates
The changes in 1.11.1 are only related to website parsing so you can
basically take the utopic package and add a changelog entry with the
version
Accepted into trusty-backports and utopic-backports.
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is
Accepted into precise-backports.
** Changed in: precise-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
https://bugs.launchpad.net/bugs/1401854
Title:
Please backport
It makes more sense to push this to trusty-updates so everyone benefits from
the bugfixes:
https://wiki.ubuntu.com/StableReleaseUpdates
The changes in 1.11.1 are only related to website parsing so you can
basically take the utopic package and add a changelog entry with the
version
Accepted into precise-backports.
** Changed in: precise-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
https://bugs.launchpad.net/bugs/1316188
Title:
Please backport
Public bug reported:
Please backport gitolite3 3.6.1-2 (universe) from vivid to trusty,
utopic.
Reason for the backport:
New feature release.
Testing:
Mark off items in the checklist [X] as you test them, but please leave the
checklist so that backporters can
Approved an uploaded.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching
Your data is still in /var/lib/owncloud/data/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1384355
Title:
ownCloud should be removed
To manage notifications about this bug go to:
I have strongly mixed feelings about installing intel-microcode by default.
Of course it's good to have the latest microcode bugfixes.
What worries me is that Intel provides no release notes at all.
They didn't even put up a warning for the update that disables the TSX
instruction.
Removing an
Public bug reported:
Please backport nagios-plugins-contrib 14.20141104 (universe) from vivid
to trusty, utopic.
Reason for the backport:
New versions of plugins.
Testing:
Mark off items in the checklist [X] as you test them, but please leave the
checklist so
Done.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions:
Accepted into trusty-backports and utopic-backports.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to
Have you tested that 0.7.3-0ubuntu1 builds, installs and runs fine in
utopic?
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions: ubuntu-backporters
https://bugs.launchpad.net/bugs/1387338
Title:
In one particular case a trusty-utopic failed because the virtuoso-
nepomuk package was still present in rc state.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1389320
Title:
Ubuntu 12.04 to 14.04
virtuoso-nepomuk contains the broken init script. The package has been
removed after the precise release.
Adding a quirk to release-upgrader to remove the init script is the only option
I can think of.
SRUing the package in precise wouldn't work since that won't affect systems
that have been
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Accepted into precise-backports.
** Changed in: precise-backports
Status: In Progress = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
https://bugs.launchpad.net/bugs/1393373
Title:
Please
kdeconnect in utopic and vivid have the same version so there is nothing to
backport.
The updated package needs to go into the development release first.
** Changed in: utopic-backports
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Accepted into trusty-backports and utopic-backports.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to
** Patch added: utopic debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253035/+files/quassel_0.10.1-0ubuntu1.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: trusty debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4253034/+files/quassel_0.10.0-0ubuntu2.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-8483
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to konversation in Ubuntu.
https://bugs.launchpad.net/bugs/1389296
Title:
konversation: out-of-bounds read on a
** Patch added: precise debdiff
https://bugs.launchpad.net/ubuntu/+source/quassel/+bug/1388333/+attachment/4252994/+files/quassel_0.8.0-0ubuntu1.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Done.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to utopic-backports.
Matching subscriptions:
Done.
** Changed in: precise-backports
Status: Confirmed = Fix Released
** Changed in: trusty-backports
Status: Confirmed = Fix Released
** Changed in: utopic-backports
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of
Hm, the backport to trusty shouldn't have happened.
Now the version in utopic and vivid is smaller than the one in trusty-backports.
1.0.2-2 needs to migrate to vivid(-release) first.
Looks like it's blocked by creepy and gpxviewer.
Imho both should be removed from vivid(-release).
--
You
*** This bug is a security vulnerability ***
Public security bug reported:
https://github.com/quassel/quassel/commit/8b5ecd226f9208af3074b33d3b7cf5e14f55b138
Check for invalid input in encrypted buffers
The ECB Blowfish decryption function assumed that encrypted input would
always come in
** Also affects: quassel (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Utopic)
Importance: Undecided
Status: New
** Also affects: quassel (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification
Accepted into both backport archives.
** Changed in: trusty-backports
Status: New = Fix Released
** Changed in: utopic-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to
I can confirm that removing linux-image-extra keeps the inintramfs image
intact now.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Accepted into precise-backports.
** No longer affects: trusty-backports
** Changed in: precise-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
Matching subscriptions:
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Public bug reported:
In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.
This is caused by an Ubuntu patch in the qemu package that changes the default
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for
Public bug reported:
In utopic creating a libvirt VM (through virt-manager or virt-install)
fails with: internal error: No PCI buses available.
This is caused by an Ubuntu patch in the qemu package that changes the default
machine type to pc-i440fx-utopic.
It also adds an alias ubuntu for
Accepted into trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Committed
** Changed in: trusty-backports
Status: Fix Committed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to
astyle 2.04 will soon be available in trusty-backports.
For trusty-updates usually only fixes targeting specific bugs are allowed.
** Changed in: astyle (Ubuntu)
Status: Triaged = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Public bug reported:
The cups 1.7.5-3 AppArmor profile has this rule which seems to be ineffective:
signal (receive, send) peer=third_party,
I get this denial log entry when (re)installing cups:
audit: type=1400 audit(1412239287.417:110): apparmor=DENIED
operation=signal
Uploaded to trusty-backports.
** Changed in: trusty-backports
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
Public bug reported:
Situation: linux-image-X-generic and linux-image-extra-X-generic are
both installed
When you remove linux-image-extra-X-generic (e.g. switching from -generic to
-virtual) /boot/initrd.img-X-generic is deleted in
linux-image-extra-X-generic's postrm script.
This results
1 - 100 of 2764 matches
Mail list logo