duplicate: 1048701
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1041851
Title:
[drm] nouveau ::00:0d.0 GPU-lockup switching to software fbcon
To manage notifications about this bug go to:
http
duplicate: 1041851
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1048701
Title:
NVidia GPU lock-up on 12.10 Beta-1
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+s
Public bug reported:
Binary package hint: grub
$ lsb_release -rd
Description: Ubuntu 8.04
Release: 8.04
$ apt-cache policy grub
grub:
Installed: 0.97-29ubuntu21
Candidate: 0.97-29ubuntu21
Version table:
*** 0.97-29ubuntu21 0
500 http://server1.example.com hardy/main
Public bug reported:
Binary package hint: gnome-power-manager
I saw today for the first time the following message come from gnome-
system-monitor:
"Sleep warning
Your laptop will not sleep if you shut
the lid as a running program has
prevented this.
Some laptops can overheat if they do not slee
** Description changed:
Binary package hint: qemu
Man page section 1 of qemu states:
" -net nic[,vlan=n][,macaddr=addr][,model=type]
Create a new Network Interface Card and connect it to VLAN n (n = 0
is the default). The NIC is an ne2k_pci by default on th
so the mounts would be:
/dir/to/mount/ on /mountpoint/directoryToMountTo type nfs (opts)
ftp.example.com:/pub/myDir on /ftp/myDir type ftp (ro,soft)
--
try to access a .Trash-$USER directory on autofs mounts
https://bugs.launchpad.net/bugs/210468
You received this bug notification because you are
A very simple case would be something like this:
/etc/auto.master
**
/mountpoint /etc/auto.fileDescribingMount
/etc/auto.fileDescribingMount
**
directoryToMountTo -opts /dir/to/mount
Working example:
/etc/auto.master
I went ahead and edited the description/tags of this bug report to match the
actual issue.
If this still isn't an issue, please comment and I'll ignore this bug report.
--
Nautilus attempts to access a .Trash-$USER directory under the autofs mount
"/net"
https://bugs.launchpad.net/bugs/210468
Y
That is correct. I was a bit quick in my explanation and didn't fully explain
myself. Nautilus assumes that the directory has been created and then attempts
to access it. If it wasn't possible to create the directory because the mounted
directory is read-only, Nautilus shouldn't assume that it e
Public bug reported:
Binary package hint: qemu
Man page section 1 of qemu states:
" -net nic[,vlan=n][,macaddr=addr][,model=type]
Create a new Network Interface Card and connect it to VLAN n (n = 0
is the default). The NIC is an ne2k_pci by default on the PC tar‐
Public bug reported:
Binary package hint: nautilus
[EMAIL PROTECTED]:~# /etc/init.d/autofs start
Starting automounter: done.
==> syslog <==
Apr 1 14:50:15 guapuraT61 kernel: [18916.265351] SELinux: initialized (dev
autofs, type autofs), uses genfs_contexts
Apr 1 14:50:16 guapuraT61 automount[
Public bug reported:
Binary package hint: autofs
[EMAIL PROTECTED]:~# /etc/init.d/autofs stop
Stopping automounter: done.
[EMAIL PROTECTED]:~# /etc/init.d/autofs stop
Stopping automounter: done.
[EMAIL PROTECTED]:~# /etc/init.d/autofs start
Starting automounter: done.
[EMAIL PROTECTED]:~# /etc/in
Public bug reported:
Binary package hint: selinux
Symptom:
[EMAIL PROTECTED]:~# getenforce
Enforcing
[EMAIL PROTECTED]:~# /etc/init.d/syslog-ng start
* Starting system logging syslog-ng
start-stop-daemon: Unable to start /sbin/syslog-ng: Permission de
This is nearly identical (only the target service differs) to bug
#202983 (https://bugs.launchpad.net/ubuntu/+source/selinux/+bug/202983)
--
[hardy beta] unable to start syslog-ng if selinux is enforcing.
https://bugs.launchpad.net/bugs/209773
You received this bug notification because you are a
** Attachment added: "CoreDump.gz"
http://launchpadlibrarian.net/12756134/CoreDump.gz
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/12756135/Dependencies.txt
** Attachment added: "ProcMaps.txt"
http://launchpadlibrarian.net/12756136/ProcMaps.txt
** Attachment ad
Public bug reported:
Binary package hint: aptitude
Aptitude recommended several packages when I went to install selinux. I
started removing the recommended packages with "shift -" (purge). When
on the second or third one, aptitude crashed.
[EMAIL PROTECTED]:~$ sudo apt-cache policy aptitude
apti
If it's not a problem, you should probably close this out so that the bug
squashing team doesn't have to look it over. =)
No, I'm not one of them...
--
Gnome controls not working
https://bugs.launchpad.net/bugs/203775
You received this bug notification because you are a member of Ubuntu
Bugs, wh
I'm seeing the same problem when I switch between wifi/wired networking
via network manager (though, on this laptop (Lenovo T61), the bluetooth
is hard-wired w/ the wireless switch so maybe this is more related to
bluetooth than I notice currently).
More info:
[EMAIL PROTECTED]:/var/www# cat /etc
I hadn't actually tested the -p or the --preserve=context. Here's why
(this done on RHEL 5.1):
[EMAIL PROTECTED] tmp]# ls -Z /etc/shadow
-r root root system_u:object_r:shadow_t /etc/shadow
[EMAIL PROTECTED] tmp]# cp -p /etc/shadow .
[EMAIL PROTECTED] tmp]# ls -Z shadow
-r r
Like Christer, I found this thread after experiencing the same problem
updating CUPS after making the switch from apparmor to selinux.
--
[hardy alpha 5] package cupsys 1.3.5-2ubuntu1 failed to install/upgrade:
subprocess post-installation script returned error exit status 2
https://bugs.launchp
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: selinux-policy-refpolicy
I've been teaching selinux under RHEL for several months and just got it
set up under Ubuntu, here is an observation:
[EMAIL PROTECTED]:/var/www# sestatus
SELinux status:
** Description changed:
Binary package hint: coreutils
Attempting to demonstrate the power of selinux I tried the following
demo (works in RHEL):
[EMAIL PROTECTED]:/var/www# ls -lZ /etc/shadow
-rw-r-+ 1 root shadow system_u:object_r:shadow_t 1193 2008-03-17 17:55
/etc/shadow
*** This bug is a security vulnerability ***
Public security bug reported:
Binary package hint: coreutils
Attempting to demonstrate the power of selinux I tried the following
demo (works in RHEL):
[EMAIL PROTECTED]:/var/www# ls -lZ /etc/shadow
-rw-r-+ 1 root shadow system_u:object_r:shadow_
pauls makes a good point; I also have noticed that it proceeds with the
upgrade without asking permission though I failed to make note of that
(even though it's the most important part of this bug...)
--
aptitude prints extra white space
https://bugs.launchpad.net/bugs/202240
You received this bu
** Summary changed:
- policykit dialog movable after interacted
+ policykit dialog movable after interaction
--
policykit dialog movable after interaction
https://bugs.launchpad.net/bugs/202269
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
Public bug reported:
Binary package hint: policykit
1. Launch an administrative tool that requires you to use policykit to
authenticate (I tested both "System" --> "Administration" --> {"Network","Users
and Groups"} )
2. Click the "Unlock" button
3. Try to move the dialog or click on the deskto
** Attachment added: "network-admin.png"
http://launchpadlibrarian.net/12675300/network-admin.png
--
policykit dialog movable after interacted
https://bugs.launchpad.net/bugs/202269
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
:/bin/false
Initial state of groups:
[EMAIL PROTECTED]:~$ cat /etc/group | tail -n3
polkituser:x:130:
uml-net:x:119:tgelter
newbie:x:501:
1. Open "System" --> "Administration" --> "Users and Groups"
2. Click "Unlock", choose administrative account
** Attachment added: "aptitude.png"
http://launchpadlibrarian.net/12672821/aptitude.png
** Changed in: aptitude (Ubuntu)
Sourcepackagename: None => aptitude
--
aptitude prints extra white space
https://bugs.launchpad.net/bugs/202240
You received this bug notification because you are a member
Public bug reported:
Extra line-feeds are beint printed to STDOUT (file handle 1) when doing an
"aptitude safe-upgrade".
In other words, a bunch of extra white space is printed after typing the
command and hitting 'enter' (no, I'm not holding down the enter key or pushing
it multiple times).
I
30 matches
Mail list logo