Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
ntu Focal)
Status: New => Confirmed
** Changed in: freetds (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: freetds (Ubuntu Disco)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: freetds (Ubuntu Eoan)
Assignee: (u
Thanks james-page, thanks fnordhal!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1847243
Title:
Update Octavia-* packages as per OSSA-2019-005 / CVE-2019-17134
To manage notifications about this
octavia is currently building in the security proposed PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it's done, could you please test it? I'll publish it as a security
update once it's been tested.
Thanks!
--
You received this bug notification
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: openscap (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: openscap (Ubuntu Bionic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "Minimal fix for xenial"
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1845216/+attachment/5294356/+files/openscap_1.2.8-1ubuntu0.2.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Patch added: "Minimal fix for bionic"
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1845216/+attachment/5294355/+files/openscap_1.2.15-1ubuntu0.1.debdiff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: openscap (Ubuntu Disco)
Status: New => Fix Released
** Changed in: openscap (Ubuntu Eoan)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Also affects: openscap (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: openscap (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects: openscap (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: openscap (Ubuntu
** Changed in: python3.6 (Ubuntu)
Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1452115
Title:
Python interpreter binary is not
** Changed in: openssh (Ubuntu Cosmic)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832356
Title:
Upgrade OpenSSH to 7.9p1-10 or better in stable series
To
*** This bug is a duplicate of bug 1832356 ***
https://bugs.launchpad.net/bugs/1832356
*** This bug is a security vulnerability ***
Public security bug reported:
Now that OpenSSL 1.1.1 has been added to Bionic, we would like to update
OpenSSH to a version that can be linked to OpenSSL
WifiSyslog does contain SSID information. While this will be removed
from the thunderbird and firefox packages, I don't think it would be
appropriate to remove it from the linux kernel apport reports.
For linux packages, this information is helpful in debugging wireless
driver issues.
While a
Thanks!
** Also affects: adduser (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940577
Importance: Unknown
Status: Unknown
** Changed in: adduser (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1823419
Title:
jbig-kit calls abort() on invalid data, crashing many programs
To
** Changed in: linux-meta (Ubuntu Precise)
Status: New => Won't Fix
** Changed in: linux-meta-hwe (Ubuntu)
Status: New => Fix Released
** Changed in: linux-meta-hwe-edge (Ubuntu)
Status: New => Fix Released
** Changed in: linux-meta-lts-xenial (Ubuntu Xenial)
Status:
Hi Otto. What's the status of this issue? Thanks!
** Changed in: mariadb-10.0 (Ubuntu)
Assignee: (unassigned) => Leonidas S. Barbosa (leosilvab)
** Changed in: mariadb-10.0 (Ubuntu)
Assignee: Leonidas S. Barbosa (leosilvab) => Otto Kekäläinen (otto)
--
You received this bug
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1752417
Title:
[ffe] including network-manager-openvpn-gnome, network-manager-l2tp-
gnome,
While Rhythmbox does indeed open a port when started, the user needs to
start it before the port becomes available. This is no different than
opening a Bittorrent client application, or some other application that
opens ports.
That being said, perhaps the plugin should be disabled by default.
Has there been any progress on this issue? Thanks!
** Changed in: sssd (Ubuntu)
Status: New => Invalid
** Changed in: serverguide
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: bc (Ubuntu)
Status: New => Confirmed
** Changed in: bc (Ubuntu)
Importance: Undecided => Low
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Private Security to Public Security
** Changed in: dnsmasq (Ubuntu)
Status: New => Confirmed
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: gnome-keyring (Ubuntu)
Status: New => Confirmed
** Changed in: gnome-keyring (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780365
Hi! Have you reported this issue to the upstream systemd developers?
If not, could you please report it to them so that it can get fixed?
Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Hi,
Have you reported this issue to the upstream developers?
Thanks!
** Changed in: linux-signed (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1785687
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1791691
Title:
PATH broken in systemd units
To manage notifications about this bug go to:
Olivier,
Did this fix make it to Thunderbird?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1801383
Title:
the WifiSyslog apport hook (used in firefox/tb) includes SSID
** Changed in: eog (Ubuntu)
Status: New => Incomplete
** Changed in: eog (Ubuntu)
Status: Incomplete => Invalid
** Changed in: gdk-pixbuf (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hi Brian,
Is this bug on your radar?
Thanks!
** Changed in: apport (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: apport (Ubuntu)
Assignee: (unassigned) => Brian Murray (brian-murray)
--
You received this bug
*** This bug is a duplicate of bug 1532264 ***
https://bugs.launchpad.net/bugs/1532264
I am going to mark this as a dupe of bug 1532264 since it looks to be
the same root cause. Thanks!
** Information type changed from Private Security to Public Security
** This bug has been marked a
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1792004
Title:
built-in PATH seems to have sbin and bin out of order; and
inconsistent
To
This was fixed a while ago:
https://usn.ubuntu.com/3938-1/
Marking this bug as fix released. Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/ncurses/+bug/1822218/+attachment/5250342/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: libapache2-mod-auth-mellon (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834577
Title:
[security] Consider upgrading mellon for Bionic to be
Hi! Have you had a chance to report this issue to Debian?
** Changed in: adduser (Ubuntu)
Status: New => Incomplete
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hi,
Are you able to reproduce this with a freshly installed Ubuntu?
Thanks!
** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Security
** Changed in: gnome-shell (Ubuntu)
Status: New => Incomplete
--
You
Hi! Can you reproduce this issue on a freshly installed Ubuntu?
** Changed in: gnupg2 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841051
Title:
gpg
*** This bug is a duplicate of bug 1842022 ***
https://bugs.launchpad.net/bugs/1842022
** This bug has been marked a duplicate of private bug 1842022
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Closing this bug as per previous comment. Thanks!
** Changed in: gnome-control-center (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1843718
Title:
I can
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Security
** Changed in: gnome-shell (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
** Changed in: sudo (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1843829
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1841051
Title:
gpg password cache is never cleared
To manage notifications about
** Information type changed from Private Security to Public Security
** Changed in: virtualbox (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1830752
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I have tested the packages currently in bionic-proposed. and they pass
the security team test script, and also no longer offer TLSv1.3 when not
requested. ACK on releasing.
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
** Changed in: nginx (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: nginx (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nginx (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member
I will certainly help fix any packages that FTBFS because of this
change, please feel free to assign me to bugs about them.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1839596
Title:
imagemagick
We will not be reverting this. The security team does not wish for pdf
support in imagemagick to be enabled by default.
The best approach here is to disable the pdf generation in the two
packages that now break because of this change.
** Changed in: imagemagick (Ubuntu Bionic)
Status:
ACK on the debdiffs. Uploaded to eoan and to previous releases for
processing by the SRU team, with slight versioning adjustment and the
bug tag added to the changelog.
Thanks!
** Changed in: nss (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: nss (Ubuntu Bionic)
** Also affects: nss (Ubuntu Eoan)
Importance: High
Assignee: Vineetha Kamath (vineetha)
Status: New
** Also affects: nss (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: nss (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects:
We will not be re-enabling this. Parsing arbitrary postscript is too
dangerous to leave it enabled by default. Newer versions of ImageMagick
have disabled it by default also.
In environments where this functionality is required, it can be turned
back on by locally modifying the
ium
** Changed in: python3.5 (Ubuntu Xenial)
Status: New => In Progress
** Changed in: python3.5 (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: python2.7 (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: python2.7 (Ubuntu Xe
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832919
Title:
installed libssl1.1:amd64 package post-installation
Thanks for updating the bug! I'll close it now.
** Changed in: openssh (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834129
Title:
Presence of
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1834494
Title:
latest bzip2 reports crc errors incorrectly
To manage notifications about
** Changed in: libfprint (Ubuntu)
Status: New => Confirmed
** Changed in: libfprint (Ubuntu)
Importance: High => Low
** Changed in: libfprint (Ubuntu)
Importance: Low => High
** Also affects: libfprint via
https://gitlab.freedesktop.org/libfprint/fprintd/issues/16
Importance:
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1818596
Title:
Inbuilt KORN Arithmetic & Test functions broken under Windows
Subsystem for
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1830987
Title:
Cannot change directory owner or group
To manage notifications about
** Changed in: node-deep-extend (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1823574
Title:
CVE-2018-3750: Prototype Pollution
To manage
** Changed in: gdm3 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828116
Title:
Password works uppercase and lowercase
To manage notifications about this
** Changed in: network-manager-openvpn (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1825474
Title:
Storing plain text private key password on the
** Changed in: lxd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1829071
Title:
Privilege escalation via LXD (local root exploit)
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832701
Title:
kglobalaccel5 crashed with SIGABRT in raise()
To manage notifications about
** Bug watch added: gitlab.com/federicomenaquintero/bzip2/issues #24
https://gitlab.com/federicomenaquintero/bzip2/issues/24
** Also affects: bzip2 via
https://gitlab.com/federicomenaquintero/bzip2/issues/24
Importance: Unknown
Status: Unknown
--
You received this bug
This will also require usb-creator to be modified to have a single
policykit prompt.
** Also affects: usb-creator (Ubuntu)
Importance: Undecided
Status: New
** Changed in: usb-creator (Ubuntu)
Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)
** Changed in:
I have run bionic-proposed cosmic-proposed and disco-proposed through
the usual security team test procedure. They can be released with the
fix for CVE-2019-1543.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1543
--
You received this bug notification because you are a
ACK from the security team on the low CVE being included in this SRU.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1828215
Title:
openssl ca -spkac output regressed
To manage notifications about
ACK from the security team on the low CVE being included in this SRU.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832522
Title:
openssl maintainer scripts do not trigger services restart
To
> If you go to It Linux kernel web page you see kernel is at 5.1.x
Your issues are caused by the fact that you're running an unsupported
kernel that isn't configured to work properly with Ubuntu. Please switch
back to running a proper Ubuntu kernel.
--
You received this bug notification because
Hi,
> Linux bitfenix-server 5.1.6-050106-generic #201905311031 SMP Fri May
31
That's not an Ubuntu kernel. Did you install a custom kernel?
> dbus[19216]: Failed to start message bus: Failed to open
"/etc/selinux/default/contexts/dbus_contexts": No such file or directory
It looks like dbus
Where exactly are you seeing that message?
Does it work after rebooting?
** Changed in: dbus (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832397
Title:
I'll release it tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832257
Title:
regression: sudo returns exit code 0 if child is killed with SIGTERM
To manage notifications about this bug
I've uploaded it to build in the following PPA:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
You can get it from there if you need it before tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Oh wow, I'm not sure how that happened. I'll release an update for this.
** Changed in: sudo (Ubuntu)
Status: New => Confirmed
** Changed in: sudo (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Also affects: sudo (Ubuntu Xenial)
Importance: Und
This package has been superseded by the following security update:
https://usn.ubuntu.com/3994-1/
The current packages in -proposed needs to be respun to include the
security fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This package has been superseded by the following security update:
https://usn.ubuntu.com/3994-1/
The current packages in -proposed needs to be respun to include the
security fix.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: samba (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827924
Title:
Panic or segfault in Samba
To manage notifications about this
There are qemu packages for testing in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1823872
I have uploaded packages that contain the bugfix that likely solves this
issue to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they are finished building, please test the packages, and if they
seem to resolve the issue, I will
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=13315
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827924
Title:
Panic or
New => Confirmed
** Changed in: samba (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: samba (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
*** This bug is a duplicate of bug 1827924 ***
https://bugs.launchpad.net/bugs/1827924
** This bug has been marked a duplicate of bug 1827924
Panic or segfault in Samba
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
801 - 900 of 12539 matches
Mail list logo