From a correctness point of view it feels like a job for equivs to
install a stub package instead - after all the data is provided
externally. But I can see how we don't have good tooling for that.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribe
Public bug reported:
systemd-sysctl in Xenial forces itself over procps by shipping a link
for procps.service to systemd-sysctl.service. However, it does not obey
the order both of the files and also of the sysctls within the files.
Instead it uses a simple hashmap. As it turns out that's fixed up
This is fixed in v232 and up.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1718444
Title:
systemd-sysctl in Xenial is not obeying the order of the sysctls
To manage notifications about this bug go
Colin, could you help route this?
** Changed in: ubuntu
Assignee: (unassigned) => Colin Watson (cjwatson)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1702550
Title:
Several files on ddebs.ub
The implication is that packages built against scrypt on trusty link
against it statically. It's a grave Debian policy violation for one,
it's a terrible thing for a security-related library for another. If
there's any update to the library, other packages don't pick it up. It's
also clear that it
** Changed in: libscrypt (Ubuntu Trusty)
Status: Confirmed => In Progress
** Description changed:
- libscrypt.so is a broken symlink:
+ [ Impact ]
- $ file /usr/lib/libscrypt.so
- /usr/lib/libscrypt.so: broken symbolic link to
`debian/tmp/usr/lib/libscrypt.so.0'
+ libscrypt-dev ships a
ntu Trusty)
Status: New => Confirmed
** Changed in: libscrypt (Ubuntu Trusty)
Assignee: (unassigned) => Philipp Kern (pkern)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313311
As it turns out the side-effect of this is that binaries linking against
scrypt are picking it up statically because there's a libscrypt.a that
works.
** Also affects: libscrypt (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a me
Attached is a debdiff for a SRU for trusty.
** Patch added: "initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff"
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/1496163/+attachment/4792198/+files/initramfs-tools_0.103ubuntu4.5_0.103ubuntu4.6.debdiff
** Description changed:
Adding Timo explicitly who said in
https://bugs.launchpad.net/ubuntu/+source/linux-
firmware/+bug/1624164/comments/5 that kbl_dmc is optional and for power
saving, but skl_guc_ver6 is actually needed on Skylake. Skylake devices
are what we have and which don't properly work without the firmware.
-
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-7406
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1643638
Title:
CVE-2016-7406 - remote code execution in dropbear SSH
To mana
*** This bug is a security vulnerability ***
Public security bug reported:
CNNIC has been distrusted by Mozilla in April 2015
(https://blog.mozilla.org/security/2015/04/02/distrusting-new-cnnic-
certificates/). The technical implementation involves blacklisting by
notBefore date, which is unfortu
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422795
Title:
bash crashes often if inputrc contains revert-all-at-newline
To ma
** Changed in: bash (Ubuntu Trusty)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1422795
Title:
bash crashes often if inputrc contains revert-all-at-newline
To mana
https://launchpadlibrarian.net/221500232/bash-readline-revert.debdiff
should still be valid to apply to bash as-is on trusty and the problem
has been fixed in utopic and up already. Thanks to Laney to accept the
bug nomination, which finally caused this bug to enter the sponsoring
queue (http://req
Verified on trusty. Unfortunately I don't have a precise machine
anymore. After toggling use_tempaddr not all public addresses
disappeared with the new kernel while it happened with the old pre-
reboot.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You re
Thanks, Kamal!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994931
Title:
Altering use_tempaddr drops all IPv6 addresses
To manage notifications about this bug go to:
https://bugs.launchpad.net/li
Where did this get stuck?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/994931
Title:
Altering use_tempaddr drops all IPv6 addresses
To manage notifications about this bug go to:
https://bugs.launc
My attempt to target this bug was obviously in error. I meant to update
https://bugs.launchpad.net/ubuntu/+source/upstart/+bug/1447756
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1096531
Title:
Af
Anyone to upload an approved backport to trusty-backports?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1604209
Title:
apache2 in trusty-backports is vulnerable to CVE-2016-5387
To manage notifica
New debdiff attached that can be uploaded as-is.
** Patch added:
"apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.1~ubuntu14.04.2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1604209/+attachment/4709280/+files/apache2_2.4.10-1ubuntu1.1~ubuntu14.04.1_2.4.10-1ubuntu1.
Ok, as it turns out component ownership is also enforced on backports.
Unfortunately that means that my MOTU permissions are not sufficient
here and this will require a sponsor to upload.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
It'd be helpful if this memory corruption regression could be
accelerated. It means that unplugging a USB3 device can mess up the
memory enough that file lookups that happen afterwards break if apparmor
is enabled - just because the allocation size is similar by chance. The
resulting oops is very m
I don't think that Breaks was intended to hit trusty.
** Changed in: cgroup-lite (Ubuntu)
Assignee: (unassigned) => Stéphane Graber (stgraber)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/157006
The updated thermald package in trusty-proposed fixed the issue on my
machine. Downgrading it brings it back.
** Tags removed: verification-needed
** Tags added: verification-done-trusty verification-needed-wily
** Tags removed: verification-needed-wily
** Tags added: verification-needed
--
You
What about trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480349
Title:
thermald breaks frequency scaling in Xeon® E5-2687W v3 & E5-1650 v3
To manage notifications about this bug go to:
htt
FWIW, regarding platform commonality: We saw this after pushing the
microcode update on two HP z440 workstations, one in Munich and one in
Tokyo. Specifically both were E5-1650 v3.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
0x2b is known good for me, 0x36 known bad.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1480349
Title:
Intel Microcode Breaks frequency scaling in Xeon® E5-2687W v3 &
E5-1650 v3
To manage notifi
processor : 11
vendor_id : GenuineIntel
cpu family : 6
model : 63
model name : Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz
stepping: 2
microcode : 0x2b
cpu MHz : 1233.339
cache size : 15360 KB
physical id : 0
siblings: 12
core id
I could try briefly next week, but from what I recall from my December
attempts setting intel_pstate=0 on the kernel's cmdline did *not* help.
I saw a different frequency in cpuinfo (1.2 GHz), but the machine was
still incredibly slow.
--
You received this bug notification because you are a membe
So for E5-1650 v3 specifically:
0x2b works (microcode in trusty). 0x36 works with 3.13, but not with
either 3.19 nor 4.3. (Pointing at intel_pstate, I think.)
** Changed in: intel-microcode (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a m
doko, could this be SRUed to trusty? (Maybe you already have other fixes
lined up?)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1446828
Title:
gdb pretty printers do not auto-load on Trusty
To ma
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: Incomplete => Fix Released
** Changed in: gnutls26 (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you
gobby has been replaced with gobby-infinote. This bug was not reported
there, so let's close this out.
** Changed in: gobby (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: gobby
Status: New => Fix Released
--
You received this bug notification because you are a member of
This is a straightforward coding error that does not require any logs.
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1475662
Title
gobby-infinote is the successor to gobby and the latter has been
removed. gobby-infinote properly implements this behavior.
** Changed in: gobby (Ubuntu)
Status: Triaged => Fix Released
** Changed in: obby (Ubuntu)
Status: Triaged => Won't Fix
** Changed in: sobby (Ubuntu)
S
** Package changed: gobby-infinote (Ubuntu) => gobby (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/666492
Title:
Gobby does not auto-reconnect to broken server
To manage notifications abou
Public bug reported:
Looking at linux-image-extra-3.19.0-18-generic here, but I expect this
to be pretty pervasive. This is its postrm:
#!/bin/sh
set -e
case "$0::$1" in
*.postinst::configure|*.postrm::remove)
depmod -a -F /boot/System.map-3.19.0-18-generic 3.19.0-18-generic ||
true
Andrea, any idea about this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1451613
Title:
Unity/compiz crashes when locking screen
To manage notifications about this bug go to:
https://bugs.launchp
What's the ETA for trusty?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1450442
Title:
Kernel Oops - unable to handle kernel NULL pointer dereference at
(null); Call Trace: [] ?
audit_compare_
Package in -proposed looks good to me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1314653
Title:
sysvinit: default cpufreq governor to powersave for intel-pstate
driver
To manage notifications
You shouldn't even need it. It fails to install because kdm is not
enabled, but this package is only useful with kdm anyhow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1429503
Title:
package kdm-
Seems fixed in -26. That one didn't crash for me yet while -25 crashed
within hours. The changelog looks quite horrible to me with quite a few
memory corruptions, including thp (on "always" for me), compound page
freeing, FUSE, and vfs. Let's close this unless I see it again on -26.
** Changed in:
Public bug reported:
I just tried out linux-lts-utopic on trusty and hit a few backtraces. We
make intensive use of FUSE and the FS operation I conducted on FUSE hung
post-backtrace.
[ 1951.617813] [ cut here ]
[ 1951.617818] kernel BUG at
/build/buildd/linux-lts-utopic-3
Public bug reported:
https://access.redhat.com/solutions/720473 still applies to the trusty
kernel. In fact https://lists.ubuntu.com/archives/kernel-
team/2014-July/045459.html did apply one of the two patches to 3.11, but
it was not applied to 3.13 and is not present in master-next. The other
one
Reproduced with our configuration before (broken) and after (working).
Looks good to me, thanks!
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
Did this also miss the current cycle?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1371316
Title:
Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
To manage notifications abo
I don't see it in 3.13.11.7 nor in the 3.13.y queue. Are you sure that
it'll make it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1368444
Title:
Add support for ForcePads found on HP EliteBook Fol
I confirm that the patched kernel fixes the issue. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1371316
Title:
Please cherry-pick an aufs patch to unbreak it in conjunction with IMA
To man
Public bug reported:
The trusty kernel misses the following patch that already landed in
utopic with the recent aufs update:
https://github.com/sfjro/aufs3-linux/commit/7aac34b421441b701cd0e6de4685b51e4c462d67
This unbreaks aufs with IMA (Integrity Measurement Architecture)
enabled. When IMA is
Not, that's not a bug. It might be a bug for microcode.ctl to be updated
to the new packaging that uses it, but there's no requirement that it
grows new rdepends in a distro track when it's backported.
** Changed in: iucode-tool (Ubuntu)
Status: New => Invalid
--
You received this bug not
Public bug reported:
ubuntu-keyring as shipped in trusty contains old 1024D keys dating back
to 2004 which are still being trusted for the main archive:
% gpg /usr/share/keyrings/ubuntu-archive-keyring.gpg | grep 1024D
pub 1024D/437D05B5 2004-09-12 Ubuntu Archive Automatic Signing Key
pub 10
Public bug reported:
Please take this with a grain of salt as I'm not reporting it with a
clean trusty install at my fingertips.
ubuntu-keyring ships a /usr/share/keyrings/ubuntu-archive-keyring.gpg
file that contains the Ubuntu CD Signing Keys (old and new):
% gpg /usr/share/keyrings/ubuntu-ar
The kernel situation with proposed gave me some grief. Hence my testing
last week did not work out. I did a clean installation via an nginx
reverse proxy and a custom CA (which is *not* the setup at Google, but I
had to fudge something for verification instead of testing against our
own archive) an
It seems that an installer is in -proposed as well: 20101020ubuntu136.19
-- I'll test it next week with our preseeds. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1135163
Title:
d-i can't i
Thanks, Dave. I'm deploying it from there then. :)
@dkpeall: It's in trusty-proposed, too.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual serv
So I pointed out on the bug this was duplicated to why I did that. I
find it tiring that you still chose to fight the duplication without any
comment. Can you please provide a rationale? Otherwise I'll dupe it to
the other bug again. Thanks.
--
You received this bug notification because you are a
The other report might have a shorter log without bug reporting meta
noise, but one actually contains the repro steps. The full retrace for
debugging purposes can be found in bug #1328908. Let's resurrect this
one from the invalid and mark it as confirmed. Thanks.
** Changed in: libreoffice (Ubunt
*** This bug is a duplicate of bug 1319941 ***
https://bugs.launchpad.net/bugs/1319941
** Description changed:
- Crash.
+ Crash report for bug #1319941
ProblemType: Crash
DistroRelease: Ubuntu 14.04
Package: libreoffice-core 1:4.2.3~rc3-0ubuntu2
ProcVersionSignature: Ubuntu 3.13.0-
Dave, when is this change going out approximately?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived doesn't load any ipv6 virtual servers
To manage notifications about this b
Did the workaround work?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1323165
Title:
[HP ProLiant DL380p Gen8] kernel BUG at
/build/buildd/linux-3.13.0/mm/memory.c:3756!
To manage notifications
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss-
sec/2014/q2/377
Another proposed patch for this has been posted here:
http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a
guard around the array access but also drops syscall auditing for x32
calls.
** CVE a
*** This bug is a duplicate of bug 1302300 ***
https://bugs.launchpad.net/bugs/1302300
** This bug has been marked a duplicate of bug 1302300
package isc-dhcp-client 4.2.4-7ubuntu9 failed to install/upgrade: subprocess
new pre-installation script returned error exit status 2
--
You recei
Synced 0.17.1-1 into trusty-proposed.
** Changed in: stgit (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1298445
Title:
stgit 0.17.1-1 needs to be
** Changed in: isc-dhcp (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1284606
Title:
dhclient ignores dns-servers handled by dhcp-servers
To manage noti
This needs to be assigned to one or multiple packages, not Ubuntu.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/462634
Title:
user name and passphrase dialogs accept non-ASCII characters
To manage
npage.
* Install the upstream-provided desktop file.
* Do not build-depend on a specific version of boost-regex.
* Do not build-depend on a specific version of libupnp.
* debian/watch: update source code URL
-- Philipp Kern Sun, 16 Mar 2014 17:42:45 +0100
** Affects: openclonk (U
Try the following:
d-i mirror/country string manual
d-i mirror/protocol string https
d-i mirror/https/hostname string buildhost
d-i mirror/https/directory string /Ubuntu-14.04-amd64
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1221995
Title:
Bluetooth Dongle (Cambridge Silicon Radio, Ltd) doesnt work on ubunt
Trying to kexec with the sysctl enabled correctly gives "kexec_load
failed: Operation not permitted". Re-enabling it does not work, as
expected. With the sysctl untouched kexec works just fine.
** Tags removed: verification-needed-saucy
** Tags added: verification-done-saucy
--
You received this
Dimitri, any update on this? The package has also not been rebased on
the version in sid/testing for trusty (5.0.5).
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1242108
Title:
all zsh manpages are
Could this be enabled in the saucy LTS backport kernel in precise as
well, please? It will take a while until the trusty kernel becomes
available there and this blocks our switch to the saucy kernel. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Another bug has been opened for this regression:
https://bugs.launchpad.net/ubuntu/+source/cgroup-lite/+bug/1266993 —
Serge, is the SRU tracked in a bug?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1
Friendly ping. :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubunt
No, next week is fine. ;-)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
https://bugs.launchpad.
Could this be moved to -updates now?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications about this bug go to:
https://bugs.
I'm also unconvinced of this patch. It drops the If-Range logic
altogether which means that it requests a range without specifying what
the mtime of the partial file was. It also does not use If-Modified-
Since in this case. So you'd still end up with a file that's partially
corrupted if the file c
root@ale:~# apt-cache policy isc-dhcp-client
isc-dhcp-client:
Installed: 4.1.ESV-R4-0ubuntu5.8
Candidate: 4.1.ESV-R4-0ubuntu5.8
Version table:
4.1.ESV-R4-0ubuntu5.9 0
400 http://ubuntu-precise.mirror.corp.google.com/ubuntu/
precise-proposed/main amd64 Packages
*** 4.1.ESV-R4-0u
** Description changed:
[Impact]
isc-dhcp-client in precise does not do stateless DHCPv6 correctly if it's
enabled as "dhcp 1" within "iface inet6 auto" within
/etc/network/interfaces. The dhclient-script responsible for updating
/etc/resolv.conf exists if it doesn't find an IPv6 address i
** Description changed:
- /sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8
- contains the following snippet:
+ [Impact]
+ isc-dhcp-client in precise does not do stateless DHCPv6 correctly if it's
enabled as "dhcp 1" within "iface inet6 auto" within
/etc/network/interface
** Changed in: isc-dhcp (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1214385
Title:
Stateless DHCPv6 not working in precise
To manage notifications abou
** Patch added: "Proposed SRU"
https://bugs.launchpad.net/ubuntu/+source/isc-dhcp/+bug/1214385/+attachment/3779385/+files/isc-dhcp_4.1.ESV-R4-0ubuntu5.8_4.1.ESV-R4-0ubuntu5.9.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Public bug reported:
/sbin/dhclient-script in precise's isc-dhcp-client 4.1.ESV-R4-0ubuntu5.8
contains the following snippet:
BOUND6|RENEW6|REBIND6)
if [ -z "${new_ip6_address}" ] || [ -z "${new_ip6_prefixlen}" ]; then
exit_with_hooks 2
fi
# set leased IP
Let's use syncpackage instead of requestsync.
** Changed in: libinfinity (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1206817
Title:
Sync libinfinity 0
introduced in 0.5.2-6.1 with conflicts.
-- Philipp Kern Tue, 30 Jul 2013 23:27:10 +0200
** Affects: libinfinity (Ubuntu)
Importance: Wishlist
Status: Invalid
** Changed in: libinfinity (Ubuntu)
Importance: Undecided => Wishlist
** Changed in: libinfinity (Ubuntu)
Sta
*** This bug is a duplicate of bug 861268 ***
https://bugs.launchpad.net/bugs/861268
** This bug has been marked a duplicate of bug 861268
text corruption in terminals (xterm, urxvt) and emacs
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
While the Soyuz task of this bug might be a duplicate, that's not true
for the update-manager part and it would hurt to make the information in
#45129 invisible, hence unmerged.
** This bug is no longer a duplicate of bug 253119
PPA packages do not show a changelog in update-manager
--
You re
Public bug reported:
Description:Ubuntu 12.04.1 LTS
Release:12.04
On: amd64
>From the kernel log:
[6846551.444387] apt-config[8190]: segfault at 6c8b48f8 ip 7fe84340ef84 sp
7fff76182160 error 6 in libapt-pkg.so.4.12.0[7fe8433d6000+121000]
[6846551.445957] apt-con
AFAIK that's not true for ca-certificates, it does include the Debian
CA. The problem is Firefox, which does not use the database found in ca-
certificates at all. And Ubuntu is not allowed thanks to trademark rules
to change the certificate database of NSS (c.f. iceweasel vs. firefox in
Debian).
I think it would be irresponsible to provide MD2-signed certificates.
The discussion is dated 2009. I think ca-certificates should provide
neither MD2 nor MD5 root certificates. And MD2 verification should be
unsupported in the crypto lib anyway (see CVE-2009-2409).
** CVE added: http://www.cve.mi
This does not contain apport information normally attached to a bug
report and hence does not contain information useful for debugging.
I'm afraid that with this information I cannot help you, and I think
running "apport-collect 1009918" will not post the missing information,
but I may be wrong.
** Changed in: ca-certificates (Ubuntu)
Importance: High => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/996248
Title:
Please add SecureTrust CA certificate
To manage notifications abo
The problem of dino99 is something completely different. (I.e. not being
able to fetch a PPA key by not following the instructions.)
** Changed in: debian-archive-keyring (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, w
Should be fixed with version 2012.1 in quetzal, please test.
** Changed in: debian-archive-keyring (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/838299
Tit
*** This bug is a duplicate of bug 838299 ***
https://bugs.launchpad.net/bugs/838299
** This bug has been marked a duplicate of bug 838299
Installing debian-archive-keyring does not activate the Debian keyring
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Fixed in Debian. (Has a libpam-cap now and the file is removed correctly
on purge.)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/912493
Title:
libpam-cap: /etc/security/capability.conf reported as
FWIW there's are public servers like gobby.debian.org and gobby.0x539.de
to test with, if you still have it installed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/984206
Title:
gobby crashed with
Is this reproducible? Does it only happen when at least one document is
open on close? Is one sufficient to trigger it? What's your Gtk theme?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/984206
Titl
The crash is happening within GnuTLS. Given that the code used to work,
I assume some bug in that library.
** Also affects: gnutls26 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: gobby (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because
1 - 100 of 701 matches
Mail list logo