ACK on the debdiff in comment #1, I've done a test rebuild and it built
on armhf.
I've uploaded it for processing by the SRU team.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1906277
Title:
PCL
** Changed in: mysql-8.0 (Ubuntu Focal)
Status: Incomplete => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1857584
Title:
MySQL X protocol port 33060 listening on network by
)
Status: New => Invalid
** Changed in: poppler (Ubuntu Xenial)
Status: New => In Progress
** Changed in: poppler (Ubuntu Bionic)
Status: New => In Progress
** Changed in: poppler (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: pop
) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1857584
Title:
MySQL X protocol port 33060 listening on network by default
To manage notifications about this bug
Since vtk6 is finished building in -proposed, I have now uploaded the
pcl package which needs a no-change rebuild against vtk6. Please accept
it into -proposed as well. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
ACK on the updated debdiff. I've uploaded it for processing by the SRU
team after fixing the LP bug tags in the changelog.
** Changed in: ceres-solver (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
So the vtk6 change adds a new dependency, which makes pcl build with the
system libproj. While switching pcl to the system libproj may be
considered a significant change, nothing much actually uses pcl. The
only reverse depends is ros-perception, which is the software this bug
is attempting to fix
My vtk6 upload changes the version string to 6.2.0+dfsg1-10ubuntu0.1
which is more appropriate.
** Changed in: vtk6 (Ubuntu Xenial)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Two comments on the patch in #10:
1- In bionic and later releases, the cmake files end up in
/usr/lib/cmake/Ceres, not /usr/lib/cmake/ceres...perhaps that should be
adjusted
2- Please change the version string to -2ubuntu0.1
--
You received this bug notification because you are a member of
Out of curiosity, what does the hosts line in your /etc/nsswitch.conf
file look like?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1883793
Title:
systemd-resolved leaks mDNS queries to DNS
To
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1903332
Title:
Apport get_config incorrectly drops privileges
To manage
Does anyone have any pertinent log files that were generated during the
upgrade process?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1903745
Title:
upgrade from 1.1.14-2ubuntu1.8 to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Here is the upstream bug for this issue:
https://gitlab.freedesktop.org/libfprint/fprintd/-/issues/5
** Bug watch added: gitlab.freedesktop.org/libfprint/fprintd/-/issues #5
https://gitlab.freedesktop.org/libfprint/fprintd/-/issues/5
** Also affects: fprintd via
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1900255
Title:
accountsservice drop privileges denial of service (GHSL-2020-187,
*** This bug is a duplicate of bug 1899100 ***
https://bugs.launchpad.net/bugs/1899100
** Information type changed from Private to Public
** This bug has been marked a duplicate of bug 1899100
whoopsie assert failure: double free or corruption (fasttop)
--
You received this bug
Here's a proposed fix, not sure if this is the exact cause of the
double-free or if duplicate keys are acceptable or not.
** Patch added: "Proposed Fix"
https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1899100/+attachment/5427819/+files/whoopsie_0.2.73~test1.debdiff
** Information
I just got hit by this issue too. It looks like the workaround is to
uncheck the "blink task bar" notifications in hexchat.
It seems gnome-shell isn't handling the "blink task bar" notifications
properly.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
The debdiffs in comments 31, 32, and 33 are equivalent to what is
currently in focal-proposed, and do not need uploading. The changelog
was fixed before the original debdiffs were uploaded.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
libvirt can be configured in two ways, to use policykit for
authentication, or to use traditional unix permissions. Ubuntu uses the
traditional permissions configuration, not the policykit one.
libvirt-dbus ships with a /var/lib/polkit-1/localauthority/10-vendor.d
/libvirt-dbus.pkla file that
** Changed in: nss (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1897666
Title:
FTBFS: nss for groovy ftbfs due to erroneous nonnull check arising
The updates for this issue have been released:
https://ubuntu.com/security/notices/USN-4538-1
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/187
Title:
Reading local files as root
The updates for this issue have been released:
https://ubuntu.com/security/notices/USN-4538-1
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1882098
Title:
Packagekit lets user
The updates for this issue have been released:
https://ubuntu.com/security/notices/USN-4537-1
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888235
Title:
Improper Input Validation
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1888235
Title:
Improper Input Validation vulnerability in Locale property of a
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/187
Title:
Reading local files as root leads to sensitive information
I am currently preparing updates for this issue, and I just tested the
bionic update that includes this patch, and it works in my environment.
Could you please make sure you created the policy file ok, and have
rebooted after updating packagekit?
--
You received this bug notification because
Hi Julian,
Could you please backport the patch in comment #9 to xenial? The code in
xenial is substantially different.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1882098
Title:
It's not feasible to stop the affected ciphers from re-using secrets,
it's in the specification.
Removing the ciphers is what was done in later releases of openssl,
including the 1.0.2w version that was released specifically to address
this issue:
https://www.openssl.org/news/secadv/20200909.txt
This has now been fixed:
https://ubuntu.com/security/notices/USN-4504-1
** Changed in: openssl (Ubuntu Xenial)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: squid3 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1890265
Title:
BUG: Version 3.5.27-1ubuntu1.7 breaks config using icap
To manage
** Changed in: pasaffe
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1860613
Title:
Syntax warnings while installing pasaffe in terminal
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
The better solution would probably be to add the cockpit user to the
libvirt group.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1891311
Title:
New version of libvirt-sock has wrong permissions
Hi,
Could you elaborate which codes in that manpage you feel are dangerous
and are actually implemented by the common terminals? The old screendump
and window title codes were disabled long ago, I'm not sure any of the
others are anything other than a nuisance.
--
You received this bug
Hi,
The only thing an attacker can do with this vulnerability is DoS their
own connection. As such, it is not considered a security issue either by
the upstream OpenSSH project, or by the Ubuntu security team.
Like other distros, we have no plans to fix this issue in our stable
releases.
**
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
med
** Changed in: squid3 (Ubuntu Xenial)
Importance: Undecided => High
** Changed in: squid3 (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: squid3 (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You recei
Unfortunately, this SRU has been superseded by a security update. Please
re-upload the SRU. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1881976
Title:
apport-gtk and apport-kde install
cal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: mysql-8.0 (Ubuntu Groovy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: mysql-8.0 (Ubuntu Focal)
Status: New => Confirmed
--
You received this bug notification because you are a memb
(See bug 1890170 for another reproducer)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889851
Title:
Driver QMysql can't be loaded
To manage notifications about this bug go to:
*** This bug is a duplicate of bug 1889851 ***
https://bugs.launchpad.net/bugs/1889851
I'm pretty sure this is a dupe of #1889851. Marking as such.
** This bug has been marked a duplicate of bug 1889851
Driver QMysql can't be loaded
--
You received this bug notification because you are
Lars, I think that is what is happening, yes.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889851
Title:
Driver QMysql can't be loaded
To manage notifications about this bug go to:
Possibly related:
https://github.com/mysql/mysql-server/commit/735bd2a53834266c7256830c8d34672ea55fe17b
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1890170
Title:
ImportError libstdc++.so.6
Possibly related:
https://github.com/mysql/mysql-server/commit/735bd2a53834266c7256830c8d34672ea55fe17b
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889851
Title:
Driver QMysql can't be loaded
I think this may be related:
$ readelf --dynamic libmysqlclient.so.21.1.19 | grep BIND
0x001e (FLAGS) BIND_NOW
$ readelf --dynamic libmysqlclient.so.21.1.21 | grep BIND
0x001e (FLAGS) BIND_NOW STATIC_TLS
--
You received this bug notification because you are a member
I think this is related:
$ readelf --dynamic libmysqlclient.so.21.1.19 | grep BIND
0x001e (FLAGS) BIND_NOW
$ readelf --dynamic libmysqlclient.so.21.1.21 | grep BIND
0x001e (FLAGS) BIND_NOW STATIC_TLS
** Information type changed from Public to
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889851
Title:
Driver QMysql can't be loaded
To manage notifications about this bug go to:
https://ubuntu.com/security/notices/USN-4435-1
** Changed in: clamav (Ubuntu)
Status: Triaged => Fix Released
** Changed in: clamav (Ubuntu Xenial)
Status: New => Fix Released
** Changed in: clamav (Ubuntu Bionic)
Status: New => Fix Released
** Changed in: clamav (Ubuntu
** Changed in: librsvg (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889206
Title:
Regression in USN-4436-1
To manage notifications about this bug go
Can also be tested by running "eog
/usr/share/aisleriot/cards/anglo.svgz". See attached screenshot.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1889206
Title:
Regression in USN-4436-1
To manage
** Attachment added: "eog displaying issue rendering anglo cardset"
https://bugs.launchpad.net/ubuntu/+source/librsvg/+bug/1889206/+attachment/5396555/+files/anglo-issue.png
** Bug watch added: gitlab.gnome.org/GNOME/librsvg/-/issues #612
https://gitlab.gnome.org/GNOME/librsvg/-/issues/612
me cards are missing graphics
** Affects: librsvg (Ubuntu)
Importance: Undecided
Status: New
** Affects: librsvg (Ubuntu Xenial)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Affects: librsvg (Ubuntu Bionic)
Importance: Undecided
** Changed in: mysql-8.0 (Ubuntu)
Status: Triaged => Invalid
** Changed in: mysql-8.0 (Ubuntu Eoan)
Status: Triaged => Invalid
** Changed in: php-horde-db (Ubuntu Eoan)
Status: Triaged => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
ACK on the debdiff in comment #11, uploaded with a slight LP tag fix for
processing by the SRU team. Thanks!
** Changed in: openssl (Ubuntu Bionic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: mozjs68 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1887642
Title:
Update mozjs68 to 68.10
To manage notifications about this bug go to:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
501 - 600 of 12539 matches
Mail list logo