** Summary changed:
- CISCO UCSC-C220-M3S/UCSC-C220-M3S - general protection fault on c->freelist
broken with Trusty Tahr
+ General protection fault on c->freelist broken with Trusty Tahr
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
** Description changed:
+ [Impact]
+ * Users are no longer able to use the force user or force group options in
the smb.conf. This can prevent users from accessing shares without first
having to login with a valid login.
+
+ [Test Case]
+ 1. Create a directory /tmp/ubuntu
+ 2. chown ubuntu:ubu
I just went through the exercise of attempting to validate this issue.
from an ubuntu-cloud-image, I enabled proposed. I installed samba and
libpam-winbind. Then ran do-release-upgrade.
Unfortunately even though samba 2:4.1.6+dfsg-1ubuntu2.14.04.5 was
installed on the other side of the upgrade
I did the test one more time, and it worked. I'm not sure what I did
wrong the first time. Anyhow, consider this verified.
** Tags removed: verification-needed
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscr
Here's the relavant part of /var/log/dist-upgrade/apt.log
MarkInstall libpam-winbind [ amd64 ] < 2:3.6.3-2ubuntu2.11 ->
2:4.1.6+dfsg-1ubuntu2.14.04.5 > ( universe/net ) FU=0
Installing samba-libs as Depends of libpam-winbind
MarkInstall samba-libs [ amd64 ] < none -> 2:4.1.6+dfsg-1ubuntu2.
** Description changed:
[Impact]
* Users are no longer able to use the force user or force group options in
the smb.conf. This can prevent users from accessing shares without first
having to login with a valid login.
[Test Case]
1. Create a directory /tmp/ubuntu
2. chown ubuntu:ubu
Assuming the schedule holds, and there aren't any unforseen CVE's or
test regressions, we should see it in about 4 weeks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1300739
Title:
keepalived does
Anton the kernel SRU process is special and is done using a mailing list
Please see
https://wiki.ubuntu.com/Kernel/Dev/StablePatchFormat
and
https://wiki.ubuntu.com/KernelTeam/KernelUpdates
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
Public bug reported:
3.13.0-29-generic works 3.13.0-30 results in the following errors
Jun 23 20:53:15 colt kernel: [5.862854] iwlwifi :03:00.0: L1 Disabled;
Enabling L0S
Jun 23 20:53:15 colt kernel: [5.869441] iwlwifi :03:00.0: Radio
type=0x2-0x1-0x0
Jun 23 20:53:15 colt kernel
@Tim - This was noticed at a meeting room that I don't go to very often.
I will do my best. It should be noted that arges who was running Utopic
was also seeing the same issue on his T420. (I'm not sure what specific
kernel version that was though).
--
You received this bug notification becaus
=xterm
PATH=(custom, no user)
LANG=en_US.UTF-8
SHELL=/bin/bash
SourcePackage: lvm2
UpgradeStatus: No upgrade log present (probably fresh install)
** Affects: lvm2 (Ubuntu)
Importance: Undecided
Assignee: Dave Chiluk (chiluk)
Status: New
** Tags: amd64 apport-bug precise
The above is remedied by backporting a fix from upstream lvm that allows
fsadm.sh to return 3 on attempts to check a mounted filesystem. This
allows lvextend and lvresize to not error out when the filesystem is
mounted.
** Patch added: "lp1269175.debdiff"
https://bugs.launchpad.net/ubuntu/+
** Changed in: lvm2 (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1269175
Title:
lvresize,lvextend, and fsadm attempt to fsck a moun
It looks like the above fixes were incorporated into
v2_02_91
and
v2_02_96 and newer.
That means I will also have to port this fix to quantal.
** Changed in: lvm2 (Ubuntu)
Status: New => Confirmed
** Changed in: lvm2 (Ubuntu)
Status: Confirmed => In Progress
** Description chang
I just verified that quantal does not need this fix. So only precise is
needed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1269175
Title:
lvresize,lvextend, and fsadm attempt to fsck a mounted f
Verified.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1269175
Title:
lvresize,lvextend, and fsadm attempt to fsck a mounted f
** Tags added: verification-precise-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To manage notifications about t
** Patch added: "lp1301692.debdiff"
https://bugs.launchpad.net/ubuntu/+source/amtterm/+bug/1301692/+attachment/4064148/+files/lp1301692.debdiff
** Patch removed: "lp1301692.debdiff"
https://bugs.launchpad.net/ubuntu/+source/amtterm/+bug/1301692/+attachment/4061940/+files/lp1301692.debdiff
ged in: linux (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Changed in: linux (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/13
So upon further investigation, this issue appears to be more access
point/timing related than kernel specific. Once I connect to the access
point using an older kernel, any of the new kernels will also work.
Very odd. Not really sure how to proceed on this one.
--
You received this bug notific
Public bug reported:
BUG: soft lockup - CPU#1 stuck for 23s! [test.sh:1928]
Kernel panic - not syncing: softlockup: hung tasks
CPU: 1 PID: 1928 Comm: test.sh Tainted: GW3.13.0-24-generic
#47-Ubuntu
Hardware name: NEC Mercury CPU Module [NQ2250-902]/GC-MDC10-NJ, BIOS 5.6.0005
03/05/20
*** This bug is a duplicate of bug 1354234 ***
https://bugs.launchpad.net/bugs/1354234
** This bug has been marked a duplicate of bug 1354234
14.04: PANIC with "dcache shrink list corruption?" problem
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Here's a soft lockup that is reportedly fixed by this patchset
BUG: soft lockup - CPU#1 stuck for 23s! [test.sh:1928]
Kernel panic - not syncing: softlockup: hung tasks
CPU: 1 PID: 1928 Comm: test.sh Tainted: G W 3.13.0-24-generic #47-Ubuntu
Hardware name: NEC Mercury CPU Module [NQ2250-902]/GC-MD
** Tags added: ua
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354234
Title:
14.04: PANIC with "dcache shrink list corruption?" problem
To manage notifications about this bug go to:
https://bugs.
** Changed in: linux (Ubuntu)
Assignee: Dave Chiluk (chiluk) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1047566
Title:
Memory leaks when using NFS
To manage notificati
@david-partain, this has been fixed in trusty, what you are experiencing
is a new bug altogether.
I was able to verify that forcing the bootdev in the preseed file does
indeed force grub to install onto /dev/sdb when using the non-netboot
install.
However, when using the same preseed file with th
@david-partain I was able to work around the error that I was
experiencing by ensuring that there was a valid partition table on
/dev/sdb.
That makes sense as well. There's really no way to install bootloader to
the mbr of /dev/sdb if the mbr doesn't exist because there is no
partition table.
--
So I got a report that this change has regressed console memtest86+. I
have verified that precise package in my ppa does indeed cause the
regression on the serial console menuentry. I'm installing trusty on my
testbed that has a serial port now, to verify there.
Also as an aside, I tested runnin
I just confirmed with trust.
Loading memtest with
> knetbsd /boot/memtest86+.elf console=ttyS0,115200n8
Ignores the serial console option.
Loading memtest with
> linux16 /boot/memtest86+.bin console=ttyS0,115200n8
Works, but the above issue would still exist on some machines.
Loading memt
Here's a patch that only reverts the serial console changes.
** Attachment added: "lp560839.trusty.revertdebdiff"
https://bugs.launchpad.net/ubuntu/+source/memtest86+/+bug/560839/+attachment/4009279/+files/lp560839.trusty.revertdebdiff
--
You received this bug notification because you are a
** Tags removed: verification-failed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To manage notifications about this
** Tags removed: verification-precise-done
** Tags added: verification-done-precise verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently
** Tags removed: verification-done-precise verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To manage notifications about th
** Tags added: verification-done-quantal
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1121874
Title:
MySQL launch fails silently if < 4MB of disk space is available
To manage notifications about t
I went through and verified these tonight.
I never want to see this bug ever again.
** Tags removed: verification-needed
** Tags added: verification-done verification-done-precise
verification-done-saucy
** Changed in: mysql-5.5 (Ubuntu Precise)
Status: Fix Committed => Fix Released
**
As cking noted in #4 this would cause a performance impact for ext2/3.
That alone prevents it from moving into the stable saucy kernel.
Additionally this is a significant enough change that it would not satisfy the
SRU requirements for pushing into the saucy kernel.
Please see
https://wiki.ubun
@pitti As it appears that we are going for a whitelist.
I have
Device Model: Patriot Wildfire
Serial Number:PT1145A00024835
LU WWN Device Id: 0 000120 0
Firmware Version: 502ABBF0
User Capacity:120,034,123,776 bytes [120 GB]
Device Model: OCZ-VERTEX3 MI
Serial Number:
Also it just occurred to me that white-listing by manufacturer may still
not catch all problematic drives, as most third party manufacturers that
source their controllers have drives with controllers from other
suppliers as well.
For what it's worth the crucial drive mentioned above is using a Mar
@pkern-l
linux-generic-lts-saucy is available and supported in precise.
The source base between linux-generic-lts-saucy and kernels in saucy are
built from the same sources.
As for creating a new flavor, creating additional flavors is avoided at
all cost. Each additional flavor requires additio
We were using smartctl -a /dev/sd from smartmontools.
ATA device, with non-removable media
Model Number: OCZ-VERTEX3 MI
Serial Number: OCZ-D38A6W57990V6TG5
Firmware Revision: 2.25
Transport: Serial, ATA8-AST, SATA 1
@pkern-k
@pkern
@smu-u
@antarus
It just occurred to me that you might not be aware that the 3.13 *(that now has
the CONFIG_IMA) kernel available in 14.04 will be available in the update
archives for precise shortly after 14.04 release. That's less than 3 months
away.
--
You received this bug
It is and it will. It's just getting time to bake in 14.04.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/560839
Title:
error: too small lower memory (0x99100 > 0x98400)
To manage notifications ab
** Patch added: "lp1012629.trusty.debdiff"
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1012629/+attachment/3972859/+files/lp1012629.trusty.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
Sure take your time. There's no rush on this one. I honestly don't
know of anyone who is using kickstart though.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1012629
Title:
grub-installer ignores
** Changed in: grub-installer (Ubuntu Trusty)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Changed in: grub-installer (Ubuntu Precise)
Assignee: (unassigned) => Dave Chiluk (chiluk)
** Patch added: "lp1012629.precise.debdiff"
https://bugs.launchpad.net/ubu
The above two debdiffs modify the precedence of the grub-
installer/bootdev option to take precedence over grub-
installer/with_other_os and grub-installer/only_debian, so that if it is
set it will not get over-written by the other options.
@cjwatson, @xnox
Please review and let me know what I sho
cjwatson, what are the chances of getting these changes pushed into
precise?
As for cert-checking, I don't think that's as necessary as the people
who want to enable https archives, are typically pointing at internal
mirrors that contain invalid certificates.
--
You received this bug notificatio
So has a new 12.04.4 cd image been spun with the fix for this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1276739
Title:
partman-crypto uses xts by default, yet xts.ko kernel module is not
pres
It almost cherry-picks, but it appears to be pulling in a number of
other fixes as well.
I'm going to have to spend some time reviewing this.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179610
Tit
** Changed in: e2fsprogs (Ubuntu Precise)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1179610
Title:
poor performance of resize2fs on 12.04
** Tags added: verification-quantal-done
** Tags removed: verification-quantal-done verification-saucy-done
** Tags added: verification-done-quantal verification-done-saucy
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
** Tags added: verification-done-raring
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1150413
Title:
Cannot allocate memory if process owned by user with large number of
groups
To manage notifica
Verified p,q,r. All is looking good.
** Tags removed: verification-needed
** Tags added: verification-done verification-done-precise
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1150413
Title:
Ca
** Changed in: procps (Ubuntu Quantal)
Status: Fix Committed => Fix Released
** Changed in: procps (Ubuntu Precise)
Status: Fix Committed => Fix Released
** Changed in: procps (Ubuntu Raring)
Status: Fix Committed => Fix Released
--
You received this bug notification becaus
I also have not been able to successfully build using sbuild or
pbuilder. I started from a clean 12.04.3 install, and followed the
sbuild guide available here with no success
https://wiki.ubuntu.com/SecurityTeam/BuildEnvironment
+mysqlcheck: Got error: 2003: Can't connect to MySQL server on
'not
Got this update from Tyler through UA.
"I have installed the package that Dave provided and it seems to resolve
the problem!"
Tyler please +1 here as well.
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://b
** Description changed:
- If you attempt to mount a share from a server that is dual stack (i.e.
- has both an A and a record in DNS) and NFSv3-only, mount.nfs goes
- into an infinite loop of retrying an NFS-v4 mount:
+ [Impact]
+ When all the following exist
+- mounting a server using
** Description changed:
- [Impact]
- When all the following exist
-- mounting a server using hostname.
-- the hostname resolves to both an ipv4 and ipv6 address
-- the nfs server only supports nfsv4
- Then.
- * The nfs client will not fall back fo nfsv4, and will be unable to mount
Thanks for doing that verification Tyler.
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1391662
Title:
mount.nfs does not down
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
** Changed in: linux (Ubuntu Utopic)
Status: Confirmed => Won't Fix
** Changed in: linux (Ubuntu Trusty)
Status: New => Won't Fix
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, whi
The ubuntu kernel uses the same values as the upstream kernel in regards
to these values. They are tunable for exactly this kind of case.
I brought this case up with the Ubuntu Kernel team, and unfortunately
due to the fact that this could potentially be used in a memory-
exhaustion, denial of se
@Carl Hetherington
Your patch is interesting. Please submit it to the mainline kernel, and
to stable if you feel it deserves to go into stable. Once it hits
stable it will then likely get picked up by the Ubuntu 3.13 kernel.
--
You received this bug notification because you are a member of Ubu
** Changed in: nfs-utils (Ubuntu)
Assignee: (unassigned) => Dave Chiluk (chiluk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1391662
Title:
mount.nfs does not downgrade NFS version w
I have built a test package with this commit for precise
http://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commit;h=9da66f8898a6
I have placed it http://people.canonical.com/~chiluk/lp1391662/
Unfortunately my environments do not have ipv6 name resolution
adequately functioning to fully test th
** Patch added: "Proposed debdiff"
https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/1391662/+attachment/4260754/+files/lp1391662.debdiff
** Changed in: nfs-utils (Ubuntu)
Importance: Undecided => Medium
** Changed in: nfs-utils (Ubuntu)
Status: New => In Progress
--
You re
1. Intel chipset raid is a type of software raid so it being detected as an md
device is expected.
2. Does the machine get to the grub menu?
3. How did you partition the Raid 1?
4. What did you select for the grub install device?
** Tags added: ua
--
You received this bug notification beca
** Tags added: ua
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1370716
Title:
port 1 of bl460c Gen9 can not get IP
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+
** Tags added: ua
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1283003
Title:
[Bluetooth + 14.04] Bluetooth headsets are not working after last
couple of updates
To manage notifications about th
@matthew-l-dailey,
Could you put together a debdiff for this patch against the latest utopic
sources?
This looks to be a fairly good guide.
http://packaging.ubuntu.com/html/traditional-packaging.html
Also if you are feeling frisky you could also create a debdiff for the trusty
and precise trees
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1354234
Title:
14.04: PANIC with "dcache shrink list corruption?" pr
** Changed in: pcsc-lite (Ubuntu)
Assignee: Kip Warner (kip) => Dariusz Gadomski (dgadomski)
** Changed in: pcsc-lite (Ubuntu)
Assignee: Dariusz Gadomski (dgadomski) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
** Tags added: ua
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1329434
Title:
nested KVM fails on intel hardware - KVM: entry failed, hardware error
0x0
To manage notifications about this bug go
** Changed in: compiz-core
Assignee: Kip Warner (kip) => (unassigned)
** Changed in: compiz
Assignee: Kip Warner (kip) => (unassigned)
** Changed in: compiz (Ubuntu)
Assignee: Kip Warner (kip) => (unassigned)
** Changed in: nvidia-graphics-drivers (Ubuntu)
Assignee: Kip Warne
*** This bug is a duplicate of bug 1354234 ***
https://bugs.launchpad.net/bugs/1354234
Thank you for your opening of this bug, but this issue has already been
resolved by 3.13.0-36 please see bug 1368245 for more information.
** This bug has been marked a duplicate of bug 1354234
14.04: PA
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1304001
Title:
xen:balloon errors in 14.04 beta
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+so
** Tags added: cts
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1240088
Title:
add network (nm-applet) to login screen
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubun
@pkern, it is already in proposed for precise. Make sure you enable
-proposed from a mirror that has already synced with the main archives
*(i.e. mirroring usually happens nightly, so it may not be on your
mirror yet).
The lts-trusty kernels in precise are basically mirrors of the ubuntu-
trusty.
I sent James Jones a message on Linked-in directing him to this bug,
hopefully that helps. The interwebs are a beautiful and often very
small place.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/26990
Public bug reported:
Kernel Bug affects 3.11-3.15 on machines using gso offload.
Stack trace
[ 871.025524] [ cut here ]
[ 871.030742] kernel BUG at /build/buildd/linux-3.13.0/net/core/skbuff.c:2903!
[ 871.038669] invalid opcode: [#1] SMP
[ 871.043318] Modules linked i
** Description changed:
- Kernel Bug affects 3.11 - 3.13.0-30 on machines capable using gso
- offload.
+ Kernel Bug affects 3.11-3.15 on machines capable using gso offload.
Stack trace
[ 871.025524] [ cut here ]
[ 871.030742] kernel BUG at /build/buildd/linux-3.13.
I have sent an e-mail to the linux-stable mailing list requesting that
this patch be included in the stable trees.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1331219
Title:
Kernel Bug at skb_segm
** Tags added: verification-done-precise
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1215911
Title:
wait-for-root fails to wait for plain /dev/sdaX partitions.
To manage notifications about this
** Tags added: verification-done-quantal
** Tags added: verification-done-raring
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/12
An end-user that was experiencing the problem was able to verify that
this fix solved his issue on precise. Unfortunately, as I am unable to
reproduce all I could do was verify that initramfs-tools did not cause a
noticeable regression on q,r.
--
You received this bug notification because you ar
This and 1192116 seem to be the same bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1239457
Title:
package mysql-server-5.5 5.5.32-0ubuntu0.13.04.1 failed to
install/upgrade: subprocess instal
I'm taking this over from Adam.
I found the bug in the debdiffs from above. I pushed the necessary
changes to my ppa https://launchpad.net/~chiluk/+archive/1121874
I will be testing out of that ppa tomorrow, and will post debdiffs once
I'm comfortable with their quality.
--
You received this b
This appears to be a regression introduced by the recent fix to bug
1150413 being promoted yesterday.
To revert procps please run
$ sudo apt-get install procps=1:3.2.8-11ubuntu6
We will be opening a new bug shortly to deal with this regression.
--
You received this bug notification because you
The trusty fix for this is still sitting in trusty-proposed. Can this
be released to updates?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1313209
Title:
Running byobu-ctrl-a fails
To manage noti
Same issue here. This really should be a security concern. Any one of
us could have been typing our password directly into irc if it was in
focus behind the lock screen.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
** Changed in: xorg-server (Ubuntu)
Assignee: Chris J Arges (arges) => Dave Chiluk (chiluk)
** Changed in: xorg-server (Ubuntu Quantal)
Assignee: Chris J Arges (arges) => Dave Chiluk (chiluk)
** Changed in: xorg-server (Ubuntu Precise)
Assignee: Chris J Arges (arges) =
Sounds good, I was holding off on filling out the SRU until I had more
fully vetted the patch. Thanks for taking a look at it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1041377
Title:
mountall
Public bug reported:
Holding shift+ctrl+alt to move thunderbird to a new desktop does not
repaint thunderbird after having moved to the new desktop.
Clicking on the thunderbird icon in the unity dash does not cause a
repaint of thunderbird. Only moving to another desktop, and back again
will cau
After a restart, this issue no longer reproduces. I'll leave this open
in case I see this issue again.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1090035
Title:
moving appliation between desktop
Nevermind, now, the same repaint issue is occurring, but with Chrome.
All other currently open application can be moved successfully.
** Summary changed:
- moving thunderbird between desktops does not redraw on new desktop
+ moving appliation between desktops does not redraw on new desktop
--
Y
** Branch linked: lp:~chiluk/ubuntu/quantal/mountall/lp1041377_timeo_fix
** Branch linked: lp:~chiluk/ubuntu/raring/mountall/lp1041377_timeo_fix
** Branch linked: lp:~chiluk/ubuntu/precise/mountall/lp1041377_timeo_fix
--
You received this bug notification because you are a member of Ubuntu
Bugs
[Impact]
* Mounts that have options that are substrings of (showthrough, optional,
bootwait, nobootwait or timeout) Are
being stripped by mountall and not being passed to the mount. Such is the
case of timeo in nfs.
The change is minimal, and simply checks that the option being strip
Here is the updated diff for convenience.
=== modified file 'src/mountall.c'
--- src/mountall.c 2012-10-09 19:32:55 +
+++ src/mountall.c 2012-12-19 16:28:45 +
@@ -684,7 +684,8 @@
va_copy (options, args);
while ((option = va_arg (options, const ch
Precise debdiffPrec
** Patch added: "Precise Debdiff"
https://bugs.launchpad.net/ubuntu/+source/mountall/+bug/1041377/+attachment/3464247/+files/mountall_2.36.2.precise.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
701 - 800 of 945 matches
Mail list logo