Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks! Can you please report this to upstream or Debian as well?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/770853
Title:
gtk-led-askpass version 0.10-2ubuntu1 failed to build on amd64 with
GC
** Changed in: grub2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/767092
Title:
Grub gives graphics card invalid data
To manage notifications about this bu
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
I am responsible for several ubuntu server machines running web services
based on java. Maybe I misunderstand the update policy for security
relevant fixes butI wonder w
LP: #802464
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/765230
Title:
long sleep in boot process
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug
This bug was fixed in the package banshee - 2.1.0-1ubuntu4
---
banshee (2.1.0-1ubuntu4) oneiric; urgency=low
* Add apport hook (LP: #735897)
-- Jeremy BichaWed, 06 Jul 2011 15:39:15 +0200
** Changed in: banshee (Ubuntu)
Status: Fix Committed => Fix Released
--
You rec
Public bug reported:
running xz --decompress (unxz) on a readonly file will not show any
warning before writing over the file and changing the extension.
This is technically expected behaviour but not sympathetic to the end
user.
** Affects: xz-utils (Ubuntu)
Importance: Undecided
** Description changed:
running xz --decompress (unxz) on a readonly file will not show any
warning before writing over the file and changing the extension.
This is technically expected behaviour but not sympathetic to the end
user.
-
- ProblemType: Bug
- DistroRelease: Ubuntu 11.04
-
talked to fabio he's going to get a valgrind log for the issue, leaving
this as incomplete for now.
** Changed in: empathy (Ubuntu)
Importance: Undecided => Medium
** Changed in: empathy (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member
*** This bug is a duplicate of bug 713867 ***
https://bugs.launchpad.net/bugs/713867
Massimo, I have just remembered that this also happened with some older
releases of Ubuntu, I can't remember exactly what release (Lucid or Karmic)
but I'm definetly sure that it hanged. As a matter of fact th
Thanks for the info. I'll stick with the 3.0 kernel (rc6 now) and intel
git20110624 for the moment, unless i find a better combination of
kernel/drivers versions.
As for virtualbox, make sure you have installed the latest version of
module-init-tools (cf. my previous link).
I also had to execute
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/797356
Title:
dchp server does not support HMAC-SHA256
T
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
posting a debdiff for this issue. When a debdiff is available, members
of the security team
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
your op system ubntu11.04 is being atacked ever time i turn on.
microsoft is break aii the rules if i where you i would check in to it
asap>>>
** Affects: ubuntu-
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
All versions of Sun Java 6 before update 26 have serious security
vulnerabilities. For details, see here:
http://www.oracle.com/technetwork/topics/security/javacpujune2
*** This bug is a duplicate of bug 805853 ***
https://bugs.launchpad.net/bugs/805853
Hello,
I've searched the Libreoffice documentation
(http://www.libreoffice.org/get-help/documentation/) about media installation
on Ubuntu.
"In Linux-based systems such as Ubuntu, media do not work straigh
gotcha Walter, thank you :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/805459
Title:
Compiz crashes frequently after it starts to slow down - on NVidia
To manage notifications about this bug go
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Visibility changed to: Public
** Changed in: sun-java6 (Ubuntu)
Status: New => Confirmed
** Changed in: sun-java6 (Ubuntu)
Importance: Undecided => Medium
** Changed in: sun-java6 (Ubuntu)
Assignee: (unassigned) => Brian Thomason (brian-thomason)
--
You received this bug noti
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Visibility changed t
This bug was fixed in the package gtk-led-askpass - 0.10-2ubuntu2
---
gtk-led-askpass (0.10-2ubuntu2) oneiric; urgency=low
* Makefile: Changed order of linker parameters, to avoid build problems in
Oneiric with GCC-4.6 (LP: #770853)
-- Sebastian CarneiroWed, 06 Jul 2011 16:
** Changed in: pacemaker-mgmt (Ubuntu Oneiric)
Assignee: (unassigned) => Andres Rodriguez (andreserl)
** Changed in: heartbeat (Ubuntu Oneiric)
Assignee: (unassigned) => Andres Rodriguez (andreserl)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
@Vlada: yes, I have tried both.
I have tried the binary directly from nvidia site, not from the repository.
Check here: http://www.nvnews.net/vbulletin/showthread.php?t=122606
I was not able to use the nouveau driver due to some kind of libdrm
incompatibility...
--
You received this bug notifica
*** This bug is a duplicate of bug 799982 ***
https://bugs.launchpad.net/bugs/799982
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/806503
Title:
aptd crashed w
** Branch linked: lp:ubuntu/edubuntu-live
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/806428
Title:
Missing detailed package selection step in Oneiric
To manage notifications about this bug go to
** Branch linked: lp:ubuntu/apng2gif
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/803171
Title:
apng2gif version 1.1-1 failed to build on i386
To manage notifications about this bug go to:
https:/
*** This bug is a duplicate of bug 797718 ***
https://bugs.launchpad.net/bugs/797718
** Visibility changed to: Public
** This bug has been marked a duplicate of bug 797718
sun java 6u26 needs packaging
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
I can confirm this bug on Xubuntu i386
** Summary changed:
- Xubuntu amd64 20110618 xserver abort
+ Xubuntu i386 and amd64 20110618 xserver abort
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/799238
I'm using classic, not unity, and the bug is present, so I guess it's not
related to unity itself.
You can notice very well if you have the window close/minimize buttons on the
right you miss them almost always then.
--
You received this bug notification because you are a member of Ubuntu
B
** Branch linked: lp:ubuntu/xless
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/756040
Title:
xless version 1.7-14 failed to build on i386
To manage notifications about this bug go to:
https://bugs
I'm having the same issue as Stan, but with any windows (I'm not using
Xephyr or Firefox). In my case it might be caused by some setting I
changed in my Compiz config.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
Oh yes, I should also have stated that I did try searching for *.ext but
the search failed to function.
Perhaps linux uses a different symbol to indicate "all".
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.laun
Public bug reported:
kubuntu upgrade to 11.04 produces error: cannot open theme file
/usr/share/kde4/apps/kdm/themes/ethais and then goes to command prompt,
no kde desktop access, no gnome fall back or other desktop options @
login.
It upgraded successfully (no reported issues) then upon reboot @
*** This bug is a duplicate of bug 799982 ***
https://bugs.launchpad.net/bugs/799982
Thank you for taking the time to report this crash and helping to make
Ubuntu better. This particular crash has already been reported and is a
duplicate of bug #799982, so is being marked as such. Please loo
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801616
Title:
Form history sometimes remembers credit car
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/801329
Title:
Needs an Option for "install ALL updates"
the no-add-needed failure can't be reproduced anymore.
Instead there is a random testsuite failure
** Description changed:
- lua-svn version 0.4.0-2 failed to build on amd64 with GCC-4.6/oneiric
- Link to failed build:
https://launchpad.net/ubuntu/+archive/test-rebuild-20110413/+buildjob/2461313
*** This bug is a security vulnerability ***
You have been subscribed to a public security bug by Marc Deslauriers
(mdeslaur):
This is related to LP #783508.
After more investigation, I've concluded that the issue identified in
#783508 affects nginx 0.5, 0.6, 0.7 < 0.7.66, and 0.8 < 0.8.38. The
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: kwalletcli (Ubuntu)
Status: New => Confirmed
** Changed in: kwalletcli (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/802274
Title:
Sec
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
@steubens: ok, by the trace r4 kernel really fixed the problem of
previous trace (thanks for the pictures, they were valuable to check),
but you hit another crash. I made another additional fix, please test
the kernel I uploaded at
http://people.canonical.com/~herton/lp793796/r5/
--
You received
Hello,
i have backuped my data and installed clean OS.
LV
Dne 5.7.2011 08:13, RedSingularity napsal(a):
> Did that help by any chance?
> ---
> Ubuntu Bug Squad volunteer triager
> http://wiki.ubuntu.com/BugSquad
>
--
You received this bug notification because you are a member of Ubuntu
Bugs, whi
On 11-07-06 04:55 AM, Aleksander Morgado wrote:
> Since some time ago, ttyS0 shouldn't be used by ModemManager unless
> specifically tagged in udev. So this bug is probably no longer valid.
>
> ** Changed in: modemmanager (Ubuntu)
> Status: New => Fix Released
>
Correct.
--
** Attachmen
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/806507
Title:
package openjdk-6-jre-headless 6b22-1.10.1-0ubuntu1 failed to
install/upgrade: subprocess dpkg-deb --fsys-tarfile returned error
exit s
Public bug reported:
Using automatic update feature in ubuntu
ProblemType: Package
DistroRelease: Ubuntu 11.04
Package: openjdk-6-jre-headless 6b22-1.10.1-0ubuntu1
ProcVersionSignature: Ubuntu 2.6.38-8.42-generic 2.6.38.2
Uname: Linux 2.6.38-8-generic i686
Architecture: i386
Date: Wed Jul 6 15:1
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Visibility changed t
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
posting a debdiff for this issue. When a debdiff is available, members
of the security team
No delay now:
Jul 6 10:24:08 lakshmi kernel: [1.494740] pci :00:01.0: MSI quirk
detected; subordinate MSI disabled
Jul 6 10:24:08 lakshmi kernel: [2.350204] pci :01:05.0: Boot video
device
$ uname -a
Linux lakshmi 2.6.38-10-generic #46-Ubuntu SMP Tue Jun 28 15:07:17 UTC 2011
x
Public bug reported:
well installing the package and got this .
ProblemType: Package
DistroRelease: Ubuntu 11.10
Package: doc-base 0.10.1
ProcVersionSignature: Ubuntu 3.0-3.4-generic-pae 3.0.0-rc5
Uname: Linux 3.0-3-generic-pae i686
Architecture: i386
Date: Wed Jul 6 10:05:56 2011
ErrorMessage:
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/806512
Title:
package doc-base 0.10.1 failed to install/upgrade: subprocess
installed post-installation script returned error exit status 2
To manage
Hi,
Since you are asking a question and haven't reported any sort of issue
that could be interpreted as a bug I am converting this bug to a
question so it can be dealt with as one.
Thanks,
---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad
** Changed in: qtcreator (Ubuntu)
Hi Pavol,
Did you have Thunderbird installed before in Natty?
Thanks,
---
Ubuntu Bug Squad volunteer triager
http://wiki.ubuntu.com/BugSquad
** Changed in: unity (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Thank you for reporting this to Ubuntu. Please try reinstalling the flash
player:
sudo apt-get install --reinstall flashplugin-installer
** Changed in: firefox (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
** Visibility changed to: Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/806300
Title:
Crash start Firefox
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+sou
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Looking at graphs of network usage by vmware, during the 15-minute pause
after selecting the optional software, and the buggy progress bar, a
download was commenced. This took 15 minutes, and I believe that a
progress bar is needed during this download.
--
You received this bug notification becau
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Can someone who is getting this issue, please install the following
package, and let me know if it resolves the problem? Thanks.
https://launchpad.net/~ubuntuone/+archive/nightlies/+files/ubuntu-sso-
client_1.3.1%2Br732-24%7Eoneiric1_all.deb
--
You received this bug notification because you are
601 - 700 of 2157 matches
Mail list logo