http://paste.ubuntu.com/11768305/
That link shows upstart-monitor output during the libc6 upgrade. I see
the mountall job starting, then later I see a mounted event for /tmp
which triggers the mounted-tmp job, which is what ends up clearing out
/tmp. In fact, generally it looks to me like many of
In addition to the requested logs could someone provide steps to
reproduce, preferably in a VM without MAAS?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1464442
Title:
This line from your Dependenxies.txt indicates that one of the apparmor
files has been modified; could you investigate this change? you may need
to reinstall the package to get the pristine version of the file:
python3-apparmor 2.8.95~2430-0ubuntu5.2 [modified: usr/lib/python3/dist-
I don't think stopped apparmor is going to do it -- the generic
apparmor profiles are loaded via a sysv-init compatibility script.
I think the job file that starts this dnsmasq instance needs to use
apparmor load before starting the process:
http://upstart.ubuntu.com/cookbook/#apparmor-load
I
How strange; you ought to be able to move forward from this by running
sudo apt-get install --reinstall dh-apparmor then probably sudo apt-
get -u dist-upgrade.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: pam (Ubuntu) = linux (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1463627
Title:
Limiting the data size doesn't work
Status in linux package
** Also affects: systemd (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1439771
Title:
wpa_supplicant[874]: dbus: Failed
*** This bug is a duplicate of bug 1378095 ***
https://bugs.launchpad.net/bugs/1378095
A fix for this issue is in progress:
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1449769
In the meantime you can hand-edit the policies to remove the complain
flag and reload them with
The profile=unconfined in the following line from the logs just means
that the process which loaded the new profile is unconfined. The
apparmor=STATUS operation=profile_load log entries are from the
initscript or upstart scripts when they are loading the profiles before
executing the program.
** Changed in: apparmor (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1458288
Title:
Some exec appeair on kern.log but on
It's highly unlikely that the audit_printk_skb() function is itself
slowing down your boot; it is designed to operate with extremely low
overhead, and the ratelimiting that is in effect here means that the
slowest portion of the function, actually writing characters to the
system log, is skipped
Try running apport-collect 1457101
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to powerd in Ubuntu.
https://bugs.launchpad.net/bugs/1457101
Title:
Ubuntu 14.04 LTS with kernel 3.13.0-53 crashes
Status in Ubuntu One
Try adding DEBIAN_FRONTEND=readline to the command line:
# DEBIAN_FRONTEND=readline dpkg --configure libssl1.0.0
I suspect this isn't related to openssl.
Thanks
** Changed in: openssl (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of
Nice find Anton; in the little I had inspected the code, I thought it
would be solved by moving the db open until after the privileges had
been dropped, but that would have significantly complicated the error
handling for broken configurations/databases.
This might still require the CAP_CHOWN
This is unwieldy, I'd really like to know which repositories requested
which keys:
Reading package lists... Done
W: There is no public key available for the following key IDs:
7638D0442B90D010
W: There is no public key available for the following key IDs:
7638D0442B90D010
W: There is no public
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Great, I'm glad that was it! Have fun.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1454463
Title:
CUPS not allowed to mknod to /var/log by apparmor
Status in cups
Patrick, I suggest filing a new bug; this bug is about TLS errors while
connecting to SSLv3 sites, but the site you listed specifically does not
support SSLv3:
https://www.ssllabs.com/ssltest/analyze.html?d=auslandsjahr%2dusa.coms=104.28.16.100latest
Thanks
--
You received this bug notification
Mardy, AppArmor always allows directory execute access.
/foo/directory/ r, is needed to enumerate files in the directory.
/foo/directory/* r, is needed to access the files in the directory,
regardless if the names were guessed or read via getdents(2).
--
You received this bug notification
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Related:
http://cgit.freedesktop.org/systemd/systemd/commit/?id=b3ac5f8cb98757416d8660023d6564a7c411f0a0
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I noticed the following error early in the logs:
May 13 09:50:29 server kernel: [47923.441413] type=1400
audit(1431474629.549:812): apparmor=DENIED operation=mknod
profile=/usr/sbin/cupsd name=/data/var/log/cups/error_log pid=7814
comm=cupsd requested_mask=c denied_mask=c fsuid=0 ouid=0
This
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Jason, it'd probably be best to file a new bug report, openssl and
apache have both changed a fair amount in the last five years.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Andrej, sorry, normally the person who supplies the additional
information sets the status back to 'new' or 'confirmed' as needed. We
don't say that nearly often enough. sorry.
** Changed in: openssh (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Changing the ssh service file to use network-online.target should also
work; see
http://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/ for more
information.
** Tags added: systemd-boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
** Package changed: isc-dhcp (Ubuntu) = apparmor (Ubuntu)
** Also affects: apparmor
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
** Changed in: python2.7 (Ubuntu)
Status: New = Won't Fix
** Changed in: python3.4 (Ubuntu)
Status: New = Confirmed
** Changed in: python2.7 (Ubuntu)
Status: Won't Fix = Confirmed
** Information type changed from Private Security to Public Security
--
You received this
The libgcrypt20 package should be binary compatible with libgcrypt11;
try installing that instead of the Debian package.
Thanks
** Changed in: libgcrypt11 (Ubuntu)
Status: New = Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
** Changed in: libgcrypt11 (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libgcrypt11 in Ubuntu.
https://bugs.launchpad.net/bugs/1452216
Title:
libgcrypt11 not present in
We didn't enable PIE for the python interpreters for performance
reasons.
We're currently investigating turning PIE on by default for x86-64 and
other architectures that will likely handle it well. The performance
impact will be one of the deciding factors in determining if we enable
PIE for the
Try this:
sudo apt-get purge libgnutls26:i386
I don't know how or why you have the 32-bit version installed, but it
looks like having a different version of the 32 bit library installed
than the 64 bit version is making things complicated. Most people don't
need the 32 bit version, so delete it.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1452077
Title:
package libgnutls26 2.12.14-5ubuntu3.8
I'm sorry this was overlooked for so long.
A. Is it practical to use the device while precompilation is happening
in the background?
It Depends. We have some options in how aggressively we use system
resources, but probably even compiling one-at-a-time with a nice value
will definitely feel
Better explained here:
https://www.agwa.name/blog/post/beware_the_ipv6_dad_race_condition
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1447715
Title:
dhclient -6:
I understand that binding to ipv6 addresses that haven't finished
Duplicate Address Detection causes the bind() to fail.
http://www.freedesktop.org/wiki/Software/systemd/NetworkTarget/ suggests
using IP_FREEBIND:
IP_FREEBIND (since Linux 2.4)
If enabled, this boolean option
The powerd main thread only ever checks fb_state with the mutex locked,
and the monitor thread only ever changes it with the mutex locked. The
main thread also only calls pthread_cond_wait() *after* finding fb_state
!= FB_AWAKE *without any intervening unlock of the mutex.* So the
scenario you
Yeah it seems likely that some driver is probably being slow in its
late_resume handler. There may be something in dmesg which shows how
long individual late_resume calls are making, I can't remember (there
may also be some debug option which has to be enabled).
Iirc the reason we have to wait
A beer to whoever uploads SRUs for the postrm fix suggested in comment
#7 payable the next time we meet. I'd so love to be rid of this annoying
message even though I know full well it doesn't actually affect
anything. We won't be rid of it now, only some vague point in the
future, but if all
is this bug repaired?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1199166
Title:
WARNING **: dconf-schema.vala:330: Unknown property on schema
Status in d-conf package
Brendan Gregg has an awesome execsnoop tool that can report systemwide
execs in his perf-tools package, the whole thing is a goldmine of
amazing tools:
http://www.brendangregg.com/blog/2014-07-28/execsnoop-for-linux.html
Probably this is easier than the process accounting.
Thanks
--
You
I'm concerned about adding translations from potentially untrusted
sources -- format strings are a ripe source of security issues in some
languages and allowing any random person to provide translated strings
for programs that handle private data is potentially highly dangerous.
Python, Ruby,
While this might initially seem like prematurely early to end support
for SHA-1, it's the tail end of 16.04 LTS's support window that worries
me -- I suspect SHA-1 will feel less safe by 2021, but removing support
for it in an LTS release feels like the wrong approach.
We may also wish to
Can you attach some more information that might be useful to debug this
issue? Including the output of grep -i apparmor /var/log/syslog or
grep -i apparmor /var/log/audit/audit.log (if you use auditd) will
help.
Thanks
** Changed in: apparmor
Status: New = Incomplete
** Also affects:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1444356
Title:
apparmor fails to initialise at
Curious, I wonder what happened to your abstractions/evince; you may
need to re-install the evince-common package to get it back. It might be
worth running debsums -sa to discover other surprisingly missing files.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Ken,
The ptrace mediation in 12.04 LTS is very rudimentary; if you add
capability sys_ptrace, to a profile then processes running in that
profile are allowed to trace any process the discretionary access
controls allow. The fine-grained permissions introduced in 14.04 LTS
require both the new
Hartwig, great find with the backup copied file! That would definitely
complicate all debugging efforts. Please do report back now that you can
make some forward progress.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Pavel, note that Steve closed the rsyslog/vivid task because that has
been fixed; the rsyslog/trusty task is still open, as are the kernel
portions of the bug.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor
** Changed in: apparmor-easyprof-ubuntu (Ubuntu)
Status: Incomplete = New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor-easyprof-ubuntu
in Ubuntu.
https://bugs.launchpad.net/bugs/1393318
Title:
Media-Hub
Hartwig, are there still AppArmor DENIED lines in your /var/log/syslog
or /var/log/audit/audit.log files even after adding all those extra
capabilities? Granted, a profiled application with all those
capabilities is likely powerful enough to do great damage to the system
anyway...
Thanks
--
You
** Tags added: systemd-boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1440070
Title:
openssh-server attempts to connect to upstart and the connection is
refused
** Tags added: bq
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to indicator-messages in
Ubuntu.
https://bugs.launchpad.net/bugs/1439136
Title:
Messages
** Tags added: bq
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to address-book-app in
Ubuntu.
https://bugs.launchpad.net/bugs/1439041
Title:
Address-Book lists
Franck, thanks for the patch, but I'm curious; the DENIED in the
description is for dconf, the DENIED in the automatic tools is for a
dbus access, and the patch you've included is for some /run/user
icedteaplugin files.
Do you know which if the other two are important or unimportant? Do you
know
** Also affects: apparmor
Importance: Undecided
Status: New
** Changed in: apparmor
Status: New = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Brandon, I think you're right; I'm not sure what decided the .Xauthority
files needed to move to somewhere else, but there it is, no longer in
your home directory.
Try adding the following line to your /etc/apparmor.d/abstractions/X
file:
owner /run/user/*/gdm/Xauthority r,
Then sudo
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
The intention is to prevent someone local to the computer from just
pulling the power cord or hitting the reset button when the system is
locked and they want to shut it down or log in as a different user. I
believe these dialog options are configurable via PolicyKit if you've
taken the time to
The following temporary hack will enable the trackpoint buttons and if
the trackpad is disabled in the bios will also disable the trackpad. (I
don't remember where I saw this, sorry for non-attribution)
sudo modprobe -rv psmouse; sudo modprobe -v psmouse proto=imps
--
You received this bug
You can configure this with /etc/pam.d/sshd -- simply remove the
pam_motd lines from your PAM sshd configuration and this information
will no longer be shown when users successfully authenticate. (Neither
sshd nor pam_motd.so care if your users are using bash or false or
nologin for their shell;
** Information type changed from Private Security to Public Security
** Changed in: openssh (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
How did you get to the situation of installing 14.10 OpenSSL packages by
hand over the 12.04 LTS packages? Why would you do this? Why would you
also do them piecemeal instead of upgrading all the replaced packages
simultaneously?
Thanks
** Changed in: openssl (Ubuntu)
Status: Confirmed =
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Tags added: systemd-boot
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
https://bugs.launchpad.net/bugs/1433557
Title:
systemd-udev-settle.service failes, 3min boot delay
Status in dbus package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
There were plenty of messages in your dmesg about an external hard
drive; it may be dying, or the usb equipment used to attach it to the
computer may be bad, but it looks like something worth worrying about.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch
*** This bug is a duplicate of bug 1432395 ***
https://bugs.launchpad.net/bugs/1432395
** This bug has been marked a duplicate of bug 1432395
Hard showing some error
** Information type changed from Private Security to Public
--
You received this bug notification because you are a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
I use an openvpn vpn through network manager to connect to the canonical
vpn; when I suspend and resume my laptop the openvpn vpn does not come
up again. However the DNS server that it inserted into my
/etc/resolv.conf is left there, causing all dns lookups to take six
Public bug reported:
code
$ uname -a
Linux nil-NV57H 3.16.0-30-generic #40~14.04.1-Ubuntu SMP Thu Jan 15 17:43:14
UTC 2015 x86 64 x86_64 GNU/Linux
/code
The laptop trackpad has ceased its functioning after the steps outlined below.
I have attempted reloading the psmouse module via
code
** Information type changed from Private Security to Public
** Changed in: xorg (Ubuntu)
Status: New = Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1431598
Jann, thanks for the comment; I believe the checks aren't strictly
necessary; the grep command used to extract one specific variable with
the given legal values is the more important part of this patch.
That said, /run/user is a filesystem in its own right, so cross-mount
hardlinks aren't
I have a thinkpad T450s. The buttons do not work on it. How can I
help?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1414930
Title:
[Lenovo ThinkPad X1 Carbon 20BT]
Donn, was it a different kind of usb NIC or the same kind? Perhaps
there's a kernel bug to fix or perhaps you just need to throw away the
old NIC, depending upon what changed.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
** Changed in: linux (Ubuntu Trusty)
Status: Incomplete = Confirmed
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Valentin, do you have any DENIED messages from AppArmor in your dmesg
output, /var/log/syslog, or /var/log/audit/audit.log files?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
There's a chance this is the AppArmor cross profile IPC check; when
one process performs an IPC operation with a second process, in
different profiles, both profiles have to allow the operation.
If my guess is right, these ought to be silenced by changing:
/dev/log wl,
to
/dev/log rwl,
in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to upstart in Ubuntu.
https://bugs.launchpad.net/bugs/1425685
Title:
Missing input sanitation in upstart
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Some discussion on xdg paths has happened here,
https://lists.ubuntu.com/archives/apparmor/2013-August/004183.html --
it'd be nice to revive this.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Franck, you may wish to file a new bug as this one is marked 'Fix
released'. Be sure to include DENIED lines from your kernel logs or
audit logs.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Is this bug about xorg or about clamtk?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1422808
Title:
ClamTk not updating
Status in xorg package in Ubuntu:
New
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
It appears your patch disables authentication entirely; if I'm correct,
a MITM attacker can modify bytes at will and you're unlikely to discover
that they have been modified while in transit.
I'm sorry that I don't have anything better to recommend; it'd be worth
running some stressors on your
Good work. I think you're right, most policy authors would rather just
drop the unrequested replies, so dropping them on the floor silently
feels like the path of least surprise.
Maybe it would be useful to provide some debug logging option for these
but I doubt it'd ever repay the time it would
I'm sorry, I don't know when this can be fixed; I only made the bug
visible to everyone.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1417804
Title:
Ubuntu 14.04
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
1501 - 1600 of 1771 matches
Mail list logo