that ended up on this list given that it's Py3-only in
Debian these days
(https://metadata.ftp-master.debian.org/changelogs/main/a/alembic/unstable_changelog,
specifically the changelog entry for 1.0.11-4). It needs a merge/sync,
of course - it's even behind Debian stable.
Kind regards
Philipp
ontrol what gets put into the archive.
Shouldn't there be a way behind 2fa to contribute to Ubuntu as well? :)
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel
On 2018-06-18 14:20, Julian Andres Klode wrote:
Basically, add Depends: python-apt (>> 1.7~alpha1~), and do:
with apt_pkg.SystemLock():
main()
Will this also allow to wait on the lock?
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify se
needed, the
trade-off is probably more on the generating waste side than the "we
need to convert everyone to more efficient CPUs"[1].
Kind regards
Philipp Kern
[1] Low consumption also sometimes backfires. Low water consumption now
requires the utilities to waste more water on
needed, the
trade-off is probably more on the generating waste side than the "we
need to convert everyone to more efficient CPUs"[1].
Kind regards
Philipp Kern
[1] Low consumption also sometimes backfires. Low water consumption now
requires the utilities to waste more water on
Public bug reported:
systemd-sysctl in Xenial forces itself over procps by shipping a link
for procps.service to systemd-sysctl.service. However, it does not obey
the order both of the files and also of the sysctls within the files.
Instead it uses a simple hashmap. As it turns out that's fixed
This is fixed in v232 and up.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1718444
Title:
systemd-sysctl in Xenial is not obeying the order of the sysctls
To manage notifications about this bug
Colin, could you help route this?
** Changed in: ubuntu
Assignee: (unassigned) => Colin Watson (cjwatson)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1702550
Title:
Several files on
On 05.03.2017 19:13, Julian Andres Klode wrote:
> On Sun, Mar 05, 2017 at 06:07:02PM +0100, Philipp Kern wrote:
>> On 02.03.2017 05:54, Aron Xu wrote:
>>> I'd like to see it get enabled by default eventually, but preferably
>>> provide a toggle in Privacy tab for Unit
se from server via HTTPS, this would
> reduce the server load and bandwidth requirement because there's no
> HTTP body being transferred.
Huh, isn't it using http://www.gstatic.com/generate_204?
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
The implication is that packages built against scrypt on trusty link
against it statically. It's a grave Debian policy violation for one,
it's a terrible thing for a security-related library for another. If
there's any update to the library, other packages don't pick it up. It's
also clear that it
** Changed in: libscrypt (Ubuntu Trusty)
Status: Confirmed => In Progress
** Description changed:
- libscrypt.so is a broken symlink:
+ [ Impact ]
- $ file /usr/lib/libscrypt.so
- /usr/lib/libscrypt.so: broken symbolic link to
`debian/tmp/usr/lib/libscrypt.so.0'
+ libscrypt-dev ships
ntu Trusty)
Status: New => Confirmed
** Changed in: libscrypt (Ubuntu Trusty)
Assignee: (unassigned) => Philipp Kern (pkern)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313311
As it turns out the side-effect of this is that binaries linking against
scrypt are picking it up statically because there's a libscrypt.a that
works.
** Also affects: libscrypt (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a
bug[2]).
Kind regards
Philipp Kern
[0] I understand the need for differences between IPv4 and IPv6 but I
still don't understand why - of all the things - localhost was limited
to a single /128 address, whereas it's a /8 on IPv4. Which means that
there's also a port conflict gamble going on the
e9a:f5b8%25br0]/;
No such site at :80
$ curl "http://[fe80::3664:a9ff:fe9a:f5b8%br0]/;
No such site at :80
If only we had universal support for interface scopes by having a
unified function that parses IP addresses...
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.
Attached is a debdiff for a SRU for trusty.
** Patch added: "initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff"
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1496163/+attachment/4792198/+files/initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff
** Description changed:
Adding Timo explicitly who said in
https://bugs.launchpad.net/ubuntu/+source/linux-
firmware/+bug/1624164/comments/5 that kbl_dmc is optional and for power
saving, but skl_guc_ver6 is actually needed on Skylake. Skylake devices
are what we have and which don't properly work without the firmware.
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7406
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1643638
Title:
CVE-2016-7406 - remote code execution in dropbear SSH
To
*** This bug is a security vulnerability ***
Public security bug reported:
CNNIC has been distrusted by Mozilla in April 2015
(https://blog.mozilla.org/security/2015/04/02/distrusting-new-cnnic-
certificates/). The technical implementation involves blacklisting by
notBefore date, which is
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422795
Title:
bash crashes often if inputrc contains revert-all-at-newline
To
** Changed in: bash (Ubuntu Trusty)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422795
Title:
bash crashes often if inputrc contains revert-all-at-newline
To
https://launchpadlibrarian.net/221500232/bash-readline-revert.debdiff
should still be valid to apply to bash as-is on trusty and the problem
has been fixed in utopic and up already. Thanks to Laney to accept the
bug nomination, which finally caused this bug to enter the sponsoring
queue
e http login portal nonsense).
FWIW, I think this has been fixed in recent apt versions, which have a
much improved caching logic.
Kind regards
Philipp Kern
signature.asc
Description: OpenPGP digital signature
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscrib
Verified on trusty. Unfortunately I don't have a precise machine
anymore. After toggling use_tempaddr not all public addresses
disappeared with the new kernel while it happened with the old pre-
reboot.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You
Thanks, Kamal!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994931
Title:
Altering use_tempaddr drops all IPv6 addresses
To manage notifications about this bug go to:
Where did this get stuck?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994931
Title:
Altering use_tempaddr drops all IPv6 addresses
To manage notifications about this bug go to:
My attempt to target this bug was obviously in error. I meant to update
https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1447756
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1096531
Title:
Anyone to upload an approved backport to trusty-backports?
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to trusty-backports.
Matching subscriptions: ubuntu-backporters
https://bugs.launchpad.net/bugs/1604209
Title:
apache2 in
Anyone to upload an approved backport to trusty-backports?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1604209
Title:
apache2 in trusty-backports is vulnerable to CVE-2016-5387
To manage
Ok, as it turns out component ownership is also enforced on backports.
Unfortunately that means that my MOTU permissions are not sufficient
here and this will require a sponsor to upload.
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to
New debdiff attached that can be uploaded as-is.
** Patch added:
"apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.1~ubuntu14.04.2.debdiff"
New debdiff attached that can be uploaded as-is.
** Patch added:
"apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.1~ubuntu14.04.2.debdiff"
Ok, as it turns out component ownership is also enforced on backports.
Unfortunately that means that my MOTU permissions are not sufficient
here and this will require a sponsor to upload.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
It'd be helpful if this memory corruption regression could be
accelerated. It means that unplugging a USB3 device can mess up the
memory enough that file lookups that happen afterwards break if apparmor
is enabled - just because the allocation size is similar by chance. The
resulting oops is very
I don't think that Breaks was intended to hit trusty.
** Changed in: cgroup-lite (Ubuntu)
Assignee: (unassigned) => Stéphane Graber (stgraber)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
The updated thermald package in trusty-proposed fixed the issue on my
machine. Downgrading it brings it back.
** Tags removed: verification-needed
** Tags added: verification-done-trusty verification-needed-wily
** Tags removed: verification-needed-wily
** Tags added: verification-needed
--
What about trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480349
Title:
thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
To manage notifications about this bug go to:
FWIW, regarding platform commonality: We saw this after pushing the
microcode update on two HP z440 workstations, one in Munich and one in
Tokyo. Specifically both were E5-1650 v3.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
0x2b is known good for me, 0x36 known bad.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480349
Title:
Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 &
E5-1650 v3
To manage
processor : 11
vendor_id : GenuineIntel
cpu family : 6
model : 63
model name : Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz
stepping: 2
microcode : 0x2b
cpu MHz : 1233.339
cache size : 15360 KB
physical id : 0
siblings: 12
core id
I could try briefly next week, but from what I recall from my December
attempts setting intel_pstate=0 on the kernel's cmdline did *not* help.
I saw a different frequency in cpuinfo (1.2 GHz), but the machine was
still incredibly slow.
--
You received this bug notification because you are a
So for E5-1650 v3 specifically:
0x2b works (microcode in trusty). 0x36 works with 3.13, but not with
either 3.19 nor 4.3. (Pointing at intel_pstate, I think.)
** Changed in: intel-microcode (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a
doko, could this be SRUed to trusty? (Maybe you already have other fixes
lined up?)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1446828
Title:
gdb pretty printers do not auto-load on Trusty
To
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: New = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: Incomplete = Fix Released
** Changed in: gnutls26 (Ubuntu)
Status: Confirmed = Won't Fix
--
You received this bug notification because you
** Package changed: gobby-infinote (Ubuntu) = gobby (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/666492
Title:
Gobby does not auto-reconnect to broken server
To manage notifications
gobby-infinote is the successor to gobby and the latter has been
removed. gobby-infinote properly implements this behavior.
** Changed in: gobby (Ubuntu)
Status: Triaged = Fix Released
** Changed in: obby (Ubuntu)
Status: Triaged = Won't Fix
** Changed in: sobby (Ubuntu)
This is a straightforward coding error that does not require any logs.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475662
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: Confirmed = Fix Released
** Changed in: gobby
Status: New = Fix Released
--
You received this bug notification because you are a member of
Public bug reported:
Looking at linux-image-extra-3.19.0-18-generic here, but I expect this
to be pretty pervasive. This is its postrm:
#!/bin/sh
set -e
case $0::$1 in
*.postinst::configure|*.postrm::remove)
depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic ||
true
Andrea, any idea about this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451613
Title:
Unity/compiz crashes when locking screen
To manage notifications about this bug go to:
What's the ETA for trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(null); Call Trace: [810fb39b] ?
Package in -proposed looks good to me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314653
Title:
sysvinit: default cpufreq governor to powersave for intel-pstate
driver
To manage
You shouldn't even need it. It fails to install because kdm is not
enabled, but this package is only useful with kdm anyhow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429503
Title:
package
write metadata
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel
is the only reason SDDM is the KDM
replacement in
Plasma 5 and not LightDM.
And the reason why an annoying refresh bug on Nvidia hardware is not yet
fixed in compiz. (It's much much harder to sign a CLA when legal
departments are involved.)
Kind regards
Philipp Kern
--
ubuntu-devel mailing list
Seems fixed in -26. That one didn't crash for me yet while -25 crashed
within hours. The changelog looks quite horrible to me with quite a few
memory corruptions, including thp (on always for me), compound page
freeing, FUSE, and vfs. Let's close this unless I see it again on -26.
** Changed in:
Public bug reported:
I just tried out linux-lts-utopic on trusty and hit a few backtraces. We
make intensive use of FUSE and the FS operation I conducted on FUSE hung
post-backtrace.
[ 1951.617813] [ cut here ]
[ 1951.617818] kernel BUG at
Public bug reported:
https://access.redhat.com/solutions/720473 still applies to the trusty
kernel. In fact https://lists.ubuntu.com/archives/kernel-
team/2014-July/045459.html did apply one of the two patches to 3.11, but
it was not applied to 3.13 and is not present in master-next. The other
Reproduced with our configuration before (broken) and after (working).
Looks good to me, thanks!
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Did this also miss the current cycle?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1371316
Title:
Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
To manage notifications
I don't see it in 3.13.11.7 nor in the 3.13.y queue. Are you sure that
it'll make it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1368444
Title:
Add support for ForcePads found on HP EliteBook
I confirm that the patched kernel fixes the issue. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1371316
Title:
Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
To
Public bug reported:
The trusty kernel misses the following patch that already landed in
utopic with the recent aufs update:
https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67
This unbreaks aufs with IMA (Integrity Measurement Architecture)
enabled. When IMA is
Not, that's not a bug. It might be a bug for microcode.ctl to be updated
to the new packaging that uses it, but there's no requirement that it
grows new rdepends in a distro track when it's backported.
** Changed in: iucode-tool (Ubuntu)
Status: New = Invalid
--
You received this bug
Public bug reported:
Please take this with a grain of salt as I'm not reporting it with a
clean trusty install at my fingertips.
ubuntu-keyring ships a /usr/share/keyrings/ubuntu-archive-keyring.gpg
file that contains the Ubuntu CD Signing Keys (old and new):
% gpg
Public bug reported:
ubuntu-keyring as shipped in trusty contains old 1024D keys dating back
to 2004 which are still being trusted for the main archive:
% gpg /usr/share/keyrings/ubuntu-archive-keyring.gpg | grep 1024D
pub 1024D/437D05B5 2004-09-12 Ubuntu Archive Automatic Signing Key
It's still stuck in binary NEW though. ;-)
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Precise Backports.
Matching subscriptions: ubuntu-backporters
https://bugs.launchpad.net/bugs/1361340
Title:
Please backport
Public bug reported:
Please backport iucode-tool 1.0.3-1 (multiverse) from utopic to precise,
trusty.
Reason for the backport:
The intel-microcode package in precise is pretty simple and does not allow to
override microcode parts easily: it makes it hard to patch.
The kernel situation with proposed gave me some grief. Hence my testing
last week did not work out. I did a clean installation via an nginx
reverse proxy and a custom CA (which is *not* the setup at Google, but I
had to fudge something for verification instead of testing against our
own archive)
It seems that an installer is in -proposed as well: 20101020ubuntu136.19
-- I'll test it next week with our preseeds. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1135163
Title:
d-i can't
Thanks, Dave. I'm deploying it from there then. :)
@dkpeall: It's in trusty-proposed, too.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keepalived in Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load
Thanks, Dave. I'm deploying it from there then. :)
@dkpeall: It's in trusty-proposed, too.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual
So I pointed out on the bug this was duplicated to why I did that. I
find it tiring that you still chose to fight the duplication without any
comment. Can you please provide a rationale? Otherwise I'll dupe it to
the other bug again. Thanks.
--
You received this bug notification because you are
*** This bug is a duplicate of bug 1319941 ***
https://bugs.launchpad.net/bugs/1319941
** Description changed:
- Crash.
+ Crash report for bug #1319941
ProblemType: Crash
DistroRelease: Ubuntu 14.04
Package: libreoffice-core 1:4.2.3~rc3-0ubuntu2
ProcVersionSignature: Ubuntu
The other report might have a shorter log without bug reporting meta
noise, but one actually contains the repro steps. The full retrace for
debugging purposes can be found in bug #1328908. Let's resurrect this
one from the invalid and mark it as confirmed. Thanks.
** Changed in: libreoffice
Dave, when is this change going out approximately?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to keepalived in Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual servers
To manage
Did the workaround work?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323165
Title:
[HP ProLiant DL380p Gen8] kernel BUG at
/build/buildd/linux-3.13.0/mm/memory.c:3756!
To manage notifications
Dave, when is this change going out approximately?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual servers
To manage notifications about this
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss-
sec/2014/q2/377
Another proposed patch for this has been posted here:
http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a
guard around the array access but also drops syscall auditing for x32
calls.
** CVE
*** This bug is a duplicate of bug 1302300 ***
https://bugs.launchpad.net/bugs/1302300
** This bug has been marked a duplicate of bug 1302300
package isc-dhcp-client 4.2.4-7ubuntu9 failed to install/upgrade: subprocess
new pre-installation script returned error exit status 2
--
You
Synced 0.17.1-1 into trusty-proposed.
** Changed in: stgit (Ubuntu)
Status: Confirmed = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1298445
Title:
stgit 0.17.1-1 needs to be
** Changed in: isc-dhcp (Ubuntu)
Status: Confirmed = Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1284606
Title:
dhclient ignores dns-servers handled by dhcp-servers
To manage
.
* Install the upstream-provided desktop file.
* Do not build-depend on a specific version of boost-regex.
* Do not build-depend on a specific version of libupnp.
* debian/watch: update source code URL
-- Philipp Kern pk...@debian.org Sun, 16 Mar 2014 17:42:45 +0100
** Affects: openclonk
This needs to be assigned to one or multiple packages, not Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/462634
Title:
user name and passphrase dialogs accept non-ASCII characters
To
Try the following:
d-i mirror/country string manual
d-i mirror/protocol string https
d-i mirror/https/hostname string buildhost
d-i mirror/https/directory string /Ubuntu-14.04-amd64
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221995
Title:
Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on
Trying to kexec with the sysctl enabled correctly gives kexec_load
failed: Operation not permitted. Re-enabling it does not work, as
expected. With the sysctl untouched kexec works just fine.
** Tags removed: verification-needed-saucy
** Tags added: verification-done-saucy
--
You received this
Dimitri, any update on this? The package has also not been rebased on
the version in sid/testing for trusty (5.0.5).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1242108
Title:
all zsh manpages
for the Precise point release be then? August?
Kind regards
Philipp Kern
signature.asc
Description: Digital signature
--
Ubuntu-release mailing list
Ubuntu-release@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-release
Could this be enabled in the saucy LTS backport kernel in precise as
well, please? It will take a while until the trusty kernel becomes
available there and this blocks our switch to the saucy kernel. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Another bug has been opened for this regression:
https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1266993 —
Serge, is the SRU tracked in a bug?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to cgroup-lite in Ubuntu.
Another bug has been opened for this regression:
https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1266993 —
Serge, is the SRU tracked in a bug?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
it?
Note that addressing architectures that do not use 64 bit interface IDs
are not in compliance with RFC4291 (e.g., 2.5.4).
Kind regards
Philipp Kern
signature.asc
Description: Digital signature
--
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe at:
https
Friendly ping. :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
Could this be moved to -updates now?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
No, next week is fine. ;-)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
I'm also unconvinced of this patch. It drops the If-Range logic
altogether which means that it requests a range without specifying what
the mtime of the partial file was. It also does not use If-Modified-
Since in this case. So you'd still end up with a file that's partially
corrupted if the file
root@ale:~# apt-cache policy isc-dhcp-client
isc-dhcp-client:
Installed: 4.1.ESV-R4-0ubuntu5.8
Candidate: 4.1.ESV-R4-0ubuntu5.8
Version table:
4.1.ESV-R4-0ubuntu5.9 0
400 http://ubuntu-precise.mirror.corp.google.com/ubuntu/
precise-proposed/main amd64 Packages
***
1 - 100 of 742 matches
Mail list logo