** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763102
Title:
Multiple memory corruptions in objdump (bin
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763101
Title:
OOM-Bug in cxxfilt (binuitils-2.30-15ubuntu
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763099
Title:
Stack-Overflow in nm-new (binuitils-2.30-15
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.ne
** Information type changed from Private Security to Public Security
** Changed in: tiff (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.ne
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
** Changed in: binutils (Ubuntu Bionic)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchp
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763098
Title:
Multiple memory corruption in gprof (binuit
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
** Changed in: binutils (Ubuntu Bionic)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchp
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
accountsservice doesn't honour the UID_MAX settings in /etc/login.defs,
resulting in system users being displayed at the login screen and in the
users control panel.
See attached screenshot to see that the "libvirt-qemu" user is being
displayed when it shouldn't.
ProblemType
** Patch removed: "update-expired-smime-test-certs.patch"
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1581084/+attachment/4661310/+files/update-expired-smime-test-certs.patch
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is su
There is no CVE to assign, as there is no flaw here.
As an administrator, you are requesting that the password be a space,
and the system allows it since the administrator knows best. This is
expected behaviour. If you don't want the password to be a space, enter
an adequate password.
--
You rec
I tested the 2018-04-21 daily image, and the permissions on ~/.config
and ~/.local are OK now.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security proble
Hi daniel,
I wasn't able to reproduce with 16.04. Did you install the regular
Ubuntu desktop, or a specific flavour?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
T
** Also affects: xorg-server (Ubuntu)
Importance: Undecided
Status: New
** Changed in: xorg-server (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: xorg-server (Ubuntu Bionic)
Importance: Undecided => High
** Changed in: xorg-server (
Here's another:
https://cgit.freedesktop.org/xorg/xserver/tree/hw/xfree86/common/xf86Helper.c#n1136
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security
Is there anything left to land here? I just installed the 2018-04-13
desktop iso, and while ~/.config has correct permissions, ~/.local does
not.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.l
My system was upgraded, so maybe a leftover. So I uninstalled ifupdown and
upstart. Problem still persists :-(
I will attach a ltrace -Sf host output - maybe it helps...
** Attachment added: "output of "trace -Sf host -d -v -w5 -t soa local.""
https://bugs.launchpad.net/ubuntu/+source/openco
Any further progress on these issues?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security problems with incorrect permissions for ubuntu 17.10
Status in
All CVEs are currently fixed in bionic.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mpg123 in Ubuntu.
https://bugs.launchpad.net/bugs/1753450
Title:
[MIR] mpg123
Status in mpg123 package in Ubuntu:
Incomplete
Bug de
I just researched current open CVEs in bionic. The only one open is
CVE-2017-15019, which is a minor issue.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15019
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
Unfortunately, this SRU was superseded by a security update.
New debdiffs need to be prepared on top of the security updates.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs
t; reports are related?
[0.948213] amd_gpio AMDI0030:00: Failed to get gpio IRQ: -22
[0.948487] amd_gpio: probe of AMDI0030:00 failed with error -22
If anyone has some pointers I would be willing to perform some further
investigation.
Best regards,
Marc
Output:
marc@snapbug:~$ lsu
Sorry, I don't know the answer to that question.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725351
Title:
Systemd - Remote DOS of systemd-resolve service
Status in s
Hello. Yes, USN-3558-1 included the fix for Ubuntu 16.04 LTS for
environments where systemd-resolved is manually enabled. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bu
Related bug in ubuntu-mate-welcome: bug 1745929
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security problems with incorrect permissions for ubuntu 17.10
** Changed in: lightdm (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1743423
Title:
frozen login window' unable to login; must rebo
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
You're welcome!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE] Security Vulnerabilities in OpenSSH on Ubuntu 14.04
Status in openssh package in Ubunt
Updated have now been published:
https://usn.ubuntu.com/usn/usn-3538-1/
** Changed in: openssh (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs
Yes, I've started working on them.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE] Security Vulnerabilities in OpenSSH on Ubuntu 14.04
Status in opens
We will likely be releasing openssh updates that include this issue in
the next couple of weeks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE] Securi
Public bug reported:
Browsed and tried solutions over the past 2 years, nothing worked...
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: xorg 1:7.7+13ubuntu3
ProcVersionSignature: Ubuntu 4.4.0-108.131-generic 4.4.98
Uname: Linux 4.4.0-108-generic x86_64
.tmp.unity_support_test.0:
ApportV
Hi,
Thanks for commenting on this issue.
We have rated CVE-2016-10009 as a low-priority issue because an attacker
would need to control both the forwarded agent socket and write access
to the filesystem of the host running the agent, an unlikely scenario.
Other Linux distributions have also rated
Hi, Thanks for reporting this issue, but that is not a comment at all.
>From the sudoers man page:
It is possible to include other sudoers files from within the sudoers
file currently being parsed using the #include and #includedir direc‐
tives.
While # is used in some application
and another:
https://git.gnome.org/browse/gnome-session/tree/gnome-session/gsm-util.c?h=gnome-3-26#n99
** Also affects: gnome-session (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is sub
Here's another:
https://git.gnome.org/browse/dconf/tree/service/dconf-gvdb-utils.c#n177
https://git.gnome.org/browse/dconf/tree/service/dconf-keyfile-writer.c#n210
** Also affects: d-conf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a
Here is one:
http://bazaar.launchpad.net/~ubuntu-desktop/session-migration/trunk/view/head:/src/session-migration.c#L270
** Package changed: ubuntu => session-migration (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed t
DIO.
This problem appears only when I try to connect to UBUNTU 16.04
Thanks for the help
Marc
ProblemType: Bug
DistroRelease: Ubuntu 16.04
Package: xorg 1:7.7+13ubuntu3
ProcVersionSignature: Ubuntu 4.10.0-40.44~16.04.1-generic 4.10.17
Uname: Linux 4.10.0-40-generic x86_64
.tmp.unity_supp
We have rated these vulnerabilities as being "low" priority as the
undefined behaviour doesn't affect binaries built with gcc.
We will include them in a zlib security update if more important issues
need to be addressed.
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9840.html
ht
** Changed in: systemd (Ubuntu Zesty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Description changed:
Hello,
We would like to report a vulnerability about systemd which allows to
DOS the systemd-resolve service.
The vulnerability is described in the attached
The latest patch does work when you realize that the skb_put function
has recently changed from (unsigned char*) to (void *) ( see
https://patchwork.ozlabs.org/patch/776580/ for fix).
The lines where appears "*skb_put" need to be changed to "*(u8
*)skb_put". This was enough for me to get my blueto
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725348
Title:
Systemd - Bypassing MemoryDenyWriteExecu
ACK on the debdiffs, uploaded for processing by the SRU team with a
couple of minor changelog changes: added bug number, fixed versioning.
Thanks!
** Changed in: util-linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: util-linux (Ubuntu Zesty)
Status: New => In Progres
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Same problem here with 16.04 LTS, 17.04 and 17.10 , when not specifying
the FQDN in /etc/hostname:
marc@marcubuntu:~$ hostname --fqdn
marcubuntu.tesdomain.intern
marc@marcubuntu:~$ hostname
marcubuntu
marc@marcubuntu:~$ head -n 2 /etc/hosts
127.0.0.1 localhost
127.0.1.1
(Ubuntu Bionic)
Status: New => In Progress
** Changed in: openssl (Ubuntu Artful)
Status: Confirmed => In Progress
** Changed in: openssl (Ubuntu Artful)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: openssl (Ubuntu Bionic)
Assignee: (unassig
It FTBFS with gcc 7.2 in artful and bionic, but builds fine with gcc 7.1
that was previously in artful.
Openssl 1.0.2m fails in the same way.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.lau
Public bug reported:
openssl FTBFS on artful armhf with the following:
../util/shlib_wrap.sh ./sha256t
Testing SHA-256
TEST 1 of 3 failed.
** Affects: gcc-7 (Ubuntu)
Importance: Undecided
Status: New
** Affects: openssl (Ubuntu)
Importance: Undecided
Status: New
**
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725351
Title:
Systemd - Remote DOS of systemd-resolve
An update has already been uploaded to artful and is awaiting approval
by the release team.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1723909
Title:
[security] WPA2: Many
sSign
ca-certificates: /usr/share/ca-certificates/mozilla/SwissSign_Gold_CA_-_G2.crt
ca-certificates:
/usr/share/ca-certificates/mozilla/SwissSign_Platinum_CA_-_G2.crt
ca-certificates:
/usr/share/ca-certificates/mozilla/SwissSign_Silver_CA_-_G2.crt
but in fact it is not:
marc@dev0001:~/sv
Both. The new bundle added some new CAs, and also removed CAs that
Mozilla has deemed no longer trustworthy or have requested to be
removed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bu
The ca-certificates package has been updated for all releases:
https://usn.ubuntu.com/usn/usn-3432-1/
Marking bug as Fix Released. Thanks!
** Changed in: ca-certificates (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: ca-certificates (Ubuntu Xenial)
Status: New => Fix R
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1719851
Title:
ca-certificates isn't updated in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi,
To get the default changed, could you please file a bug with the
upstream GNOME project here:
https://bugzilla.gnome.org/
Once you've filed the bug, please like the upstream bug to this one.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1712308
Title:
systemd-journald crashed with SIGABRT in stpcpy()
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1717794
Title:
apport-gtk crashed with SIGABRT in g_assertion_mes
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.ne
** No longer affects: policykit-1 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1591672
Title:
update-manager does not obey require-password policy
Status i
Hi John,
We get the current random seed unit from systemd. Please file a bug with
the upstream systemd project, or discuss these changes on the systemd
mailing list.
Once your changes are accepted by systemd, we will inherit them.
Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Co
** Changed in: sqlite3 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1700937
Title:
Heap-buffer overflow in nodeAcquire
Status i
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1704981
Title:
I don't know
Status in xorg package in Ubuntu:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
ACK on the trusty, xenial and zesty debdiffs. Uploaded for processing by
the SRU team. Thanks!
** Changed in: gnutls26 (Ubuntu Trusty)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Zesty)
ACK on the artful debdiff. I've uploaded it now with a slight adjustment
to put the bug numbers in the patch tags. Thanks!
** Changed in: gnutls28 (Ubuntu Artful)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
** Also affects: ssmtp (Ubuntu Artful)
Importance: Undecided
Status: Invalid
** Also affects: gnutls26 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: ssmtp (Ubuntu Trusty
Hi,
That's weird. Did you install some third-party python package, or
changed that symlink yourself?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package
Hi. Could you please paste the result of the following command?
ls -l /usr/bin/python
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package apport
Same here. After upgrading somes pcs in my company from 16.04 to 17.10 :
lots of local services are not working anymore.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/169966
** Information type changed from Private Security to Public Security
** Changed in: base-files (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to base-files in Ubuntu.
https://bugs.launchpa
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
tance: Undecided
Status: New
** Also affects: tiff (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: tiff (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: tiff (Ubuntu Xenial)
Assignee: (unassigned) => Marc
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1690820
Title:
killing su does not kill subprocess (SIGTERM not pr
** Changed in: ca-certificates (Ubuntu)
Status: New => Confirmed
** Changed in: ca-certificates (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
h
** Changed in: webbrowser-app (Ubuntu)
Status: New => Invalid
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad
I am closing this bug report as there is no actionable item.
As mentioned above, source packages are verified using the Ubuntu
archive key, not by using the developer's signature.
** Changed in: apt (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a m
** Changed in: unity8 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1650818
Title:
Clipboard contents accessible outside user sess
** Changed in: libav (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1662513
Title:
Update to 9.21 in Trusty
Status in libav package
** Also affects: lcms2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Yakkety)
Impo
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libimobiledevice in
Ubuntu.
https://bugs.launchpad.net/bugs/1681077
Title:
ideviceinfo (libimobiledevice): GnuTLS e
501 - 600 of 1280 matches
Mail list logo