signed) => Seth Forshee (sforshee)
** Changed in: linux (Ubuntu Focal)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Focal)
Status: New => Confirmed
** Changed in: linux (Ubuntu Focal)
Assignee: (unassigned) => Seth Forshee (sforshee)
--
You received thi
Yay, this appears to have been fixed in focal:
$ namei -l /etc/ssl/private/ssl-cert-snakeoil.key
f: /etc/ssl/private/ssl-cert-snakeoil.key
drwxr-xr-x root root /
drwxr-xr-x root root etc
drwxr-xr-x root root ssl
drwx--x--- root ssl-cert private
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1876305
Title:
Open Gl error
Status in xorg package in Ubuntu:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lvm2 in Ubuntu.
https://bugs.launchpad.net/bugs/1876335
Title:
package lvm2 2.03.02-2ubuntu6 failed to
Check also `systemctl cat ssh.service` and `systemctl cat
secondssh.service` -- sshd also accepts parameters on the commandline,
perhaps the port is being specified outside of the configuration files.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Package changed: shadow (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1875034
Title:
login screen will put a character in the password
On Fri, Apr 24, 2020 at 01:16:31PM -, Dimitri John Ledkov wrote:
> Include /run/ssh/sshd_config.d/*conf
> Include /etc/ssh/sshd_config.d/*conf
> Include /lib/ssh/sshd_config.d/*conf
> It would be nice if /etc/ssh only had the host keys, and no other
> default options.
This feels like it'd
Use CVE-2020-12135.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-12135
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
Running under strace may change the execution environment enough that
it's not reflective of the actual error, but it's still worth a shot --
can you pastebin the whole auditd strace logs? That openat() line is
actually a success -- the error we're looking for will come from the
audit_set_pid(3)
Thanks Balint! I gave a very quick read to the 2.2 debdiff and couldn't
spot the fix, though -- I'd just like to double-check that the fix made
it to the packaging.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This has happened more than just these two cases, the timing was just
enough for me to enquire about it.
sarnold@millbarge:~/.mail_cache$ grep -r 'end of file on stdin at conffile
prompt' | wc -l
74
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Jamie, what happens on systems without snap installed? Will systemd
start the apparmor service?
How much later does this push the already-too-late apparmor service?
Requiring a potentially new thing may push the apparmor unit further
behind, allowing even more services to start before profiles
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1870803
Title:
LightDM unlocks without Password
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Thomas,
That's a very dirty upgrade log, quite a lot failed. Is this a small-
memory system? Do you know what may make this system unique in showing
these errors? I don't have a lot of ideas where things would have gone
off the rails otherwise.
Thanks
--
You received this bug
*** This bug is a duplicate of bug 1869035 ***
https://bugs.launchpad.net/bugs/1869035
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pulseaudio in
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1869868
Title:
bug
Status in xorg package in Ubuntu:
New
Bug
Sorry, I was getting that confused with another file,
modules.builtin.modinfo. That was the one we just added to linux-
modules.
modules.builtin.bin is generated by depmod, and if I remove the file for
a given kernel and run depmod I get these messages. So this looks like
something fully from
Adding kmod, since the error comes from depmod.
The file it's complaining about is relatively new (added in 5.2
timeframe iirc), and we haven't been shipping it. However as of 5.4.0-17
we are shipping it in linux-modules. I've confirmed that
/lib/modules/5.4.0-17-generic/modules.builtin.bin is
On Mon, Mar 02, 2020 at 09:15:56AM -, Shaheena Kazi wrote:
> Public bug reported:
>
> I have created an AppArmor profile for SSH.
ssh server or ssh client?
What profile transitions did you put into your profile?
> The profile is created successfully but each time I run aa-logprof it gives
Yes, that mesa bug looks about right.
Here's a photo I snapped of firefox's address bar. I hit 'a', which
brought up history entries in a drop-down list. When I deleted the 'a',
the history list is removed, and these pixels were momentarily visible
during the repainting.
The static view of
On Tue, Feb 25, 2020 at 10:16:50PM -, Timo Aaltonen wrote:
> which desktop environment?
None, I use i3wm in x11.
> probably caused by the new mesa, which now defaults to the Iris driver
> on newer Intel GPU's, you can verify this by running firefox like:
>
> "dri_driver=i965 firefox"
The
On Mon, Feb 24, 2020 at 06:48:33AM -, dinar qurbanov wrote:
> after firefox restart these appeared:
>
> Feb 24 09:30:04 dinar-HP-Pavilion-g7-Notebook-PC kernel: [ 141.932834]
> audit: type=1400 audit(1582525804.452:27): apparmor="DENIED"
> operation="open"
This should be point at linux-5.4 and not linux-signed-5.4.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1861446
Title:
on focal 'ubuntu-bug linux' doesn't automatically
Hello Rudra, can you please investigate your /var/log/auth.log file to
see how the ssh logins were logged?
Thanks
** Information type changed from Private Security to Public Security
** Changed in: xorg (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello, I don't see much progress on the upstream bugs; do you know if
progress has been reported elsewhere?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1861446
Title:
on focal 'ubuntu-bug linux' doesn't
** Patch added: "The proposed changes"
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1861472/+attachment/5324364/+files/sshd_config.diff
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
Public bug reported:
Upgrading from a fresh 18.04 LTS install to focal unexpectedly prompts
for how to handle a change to /etc/ssh/sshd_config
To reproduce the issue:
lxc launch ubuntu:18.04 u18
lxc exec u18 -- bash
# within container
do-release-upgrade -d
# select restart services when
Public bug reported:
Hello, on focal I ran 'ubuntu-bug linux' to report a kernel issue. The
issue was filed against linux-signed-5.4 (Ubuntu) rather than linux
(Ubuntu), and none of the logs usually included with kernel bug reports
were included.
After the bug was changed from linux-signed-5.4
Public bug reported:
Hello, I had problems with subiquity in the focal live server install
image. I tried to use 'ubuntu-bug subiquity' to report the bug, but
ubuntu-bug apparently cannot file bug reports against snaps.
This is frustrating that users need to know which portions of Ubuntu are
** Tags added: champagne
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1860826
Title:
pam_unix(sudo:auth): Couldn't open /etc/securetty: No such file or
directory
Status
Public bug reported:
Hello, after upgrading to focal I found the following in my journalctl
output:
Jan 24 23:07:00 millbarge sudo[32120]: pam_unix(sudo:auth): Couldn't open
/etc/securetty: No such file or directory
Jan 24 23:07:01 millbarge sudo[32120]: pam_unix(sudo:auth): Couldn't open
My machine did not reboot successfully; because I followed The Guide, my
system has a root password, and I was prompted for it at the systemd
emergency shell. (Which is super-confusing, because I forgot I had set a
password.)
The error message appeared to be along the lines of "bpool failed to
I was able to fix this error:
E: mkinitramfs failure cpio 141 lz4 -9 -l 24
by deleting the snapshots that sanoid made *during* the installation
process:
sarnold@millbarge:/boot$ sudo zfs destroy
bpool@autosnap_2020-01-24_04:00:05_hourly%autosnap_2020-01-24_08:45:05_frequently
[sudo] password
I'm surprised the snapshots showed up, I've got the snapdirs hidden:
$ zfs list -oname,snapdir
NAME SNAPDIR
bpool hidden
bpool/BOOT hidden
bpool/BOOT/ubuntu hidden
rpool hidden
Hello Mitch, excellent report, thanks.
This is working as intended.
The Unix process model is complicated, and Linux has added a few
additional complications on top; I'll try to summarize it but it's just
not going to be easy.
When a parent process exits, child processes are not notified by
** Information type changed from Private Security to Public
** Changed in: bash (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1857210
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-focal-canonical-kernel-team-bootstrap/focal/amd64/l/lxc/20191218_145013_76e0c@/log.gz
arm64:
Do you have an ETA on when you'll do an lxc upload with the fix?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1848587
Title:
lxc 3.0.4-0ubuntu1 ADT test failure with linux
I thought we were going to some effort to reduce the number of systems
where resolveconf was going to be used, or even remove it from the
distro entirely.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in
Christian: Discussed this bug with stgraber last week. Sounds like
/dev/network_latency is just an arbitrary device picked for a test case,
and since it's been removed upstream a different device should be used.
He said you could get this fixed.
** Changed in: lxc (Ubuntu)
Importance:
Maciej, that looks like javascript polkit and I believe we're staying on
the pre-javascript version of polkit.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello Douglas, thanks for the report. AppArmor is one of several tools
the snap packaging system uses to enforce confinement on packages. The
AppArmor project doesn't supply the policy though, just the enforcement
mechanism. I believe you'll need to talk to whoever wrote the snap
package, as they
I've selected the most likely packages to be involved, based on a guess.
Without knowing how the user attempted to set their password though,
this is going to be pretty impossible to track down.
/etc/passwd hasn't had passwords stored in it by default for something
like 25 years. My best guess at
Seems /dev/network_latency was removed upstream.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c3082a674f46fe49383b157882c41dfabaa37113
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in
On Fri, Oct 18, 2019 at 03:03:43PM -, Christian Brauner wrote:
> Is this a flake or consistently reproducible?
It's reproducible.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan-canonical-kernel-team-unstable/eoan/amd64/l/lxc/20191016_150939_0f81d@/log.gz
arm64:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libdrm in Ubuntu.
https://bugs.launchpad.net/bugs/1845317
Title:
Add new pci-id's for CML-S, ICL
Seems to work fine on disco:
sarnold@millbarge:~$ sudo apt install libssl1.1 openssl
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
linux-image-5.0.0-20-generic
Seems to work fine from disco:
sarnold@millbarge:~$ sudo apt install libssl1.1 openssl
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages were automatically installed and are no longer required:
linux-image-5.0.0-20-generic
To clarify, this was an upstream *kernel* regression.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1837894
Title:
systemd 240-6ubuntu9 ADT test failure with linux
This was an upstream regression with mounting within user namespaces. It
has been fixed, closing the systemd bug as invalid.
** Changed in: systemd (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Hello Federico,
Wietse is correct. You will not get security benefits from your proposed
changes.
Public key authentication, combined with a 2FA mechanism such as TOTP
for interactive users, is the current best practice.
IP filtering is a useful tool; you can already have good benefits from
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tcp-wrappers in Ubuntu.
https://bugs.launchpad.net/bugs/1839598
Title:
tcp_wrappers does not whitelisting of
Hello,
It appears the source.codeaurora.org site has not correctly configured
their TLS certificate chain:
https://www.ssllabs.com/ssltest/analyze.html?d=source.codeaurora.org
"Chain issues Incomplete, Extra certs"
If you can contact the admins for this site, please ask them to include
all
He means that you are running a kernel from eoan-proposed, despite your
saying that you do not have updates from the -proposed pocket enabled.
This report contains no useful information about the crash you are
seeing. I see no indication of a kernel panic or anything like that in
the logs,
Ok, sorry, I see the description of your problem now. It was mixed in
with the automatically collected information, so I missed it initially.
However I still don't really see anything in the logs to explain the
symptoms you're reporting. Could you check the /var/log/kern.log* files
and see if you
We've also seen regressions with lxc which atm appear to be related to a
regression in mounting sysfs in containers which use user namespaces
(bug 1837888 for reference, though there's no activity on the bug as of
yet, just some irc discussion about the regression).
--
You received this bug
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan-canonical-kernel-team-bootstrap/eoan/amd64/l/lxc/20190724_132232_e90e9@/log.gz
arm64:
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan-canonical-kernel-team-bootstrap/eoan/amd64/s/systemd/20190724_134818_5c46d@/log.gz
arm64:
*** This bug is a duplicate of bug 1836236 ***
https://bugs.launchpad.net/bugs/1836236
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 1836236
9.4ubuntu4.9: Broken package because of missing "#" @
Seems to possibly be something going slightly slower with this kernel.
With 5.2 a fw IPv6 address assignment tests (DHCP and RA) fail sometimes
and pass other times, and usually at least one of them fails. The same
failures would happen in the past, but less frequency. I suspect that
something is
Public bug reported:
Testing failed on:
amd64:
https://objectstorage.prodstack4-5.canonical.com/v1/AUTH_77e2ada1e7a84929a74ba3b87153c0ac/autopkgtest-eoan/eoan/amd64/n/network-manager/20190710_160945_9116e@/log.gz
i386:
I read through Bionic's systemd-random-seed.service source (src/random-
seed/random-seed.c) and didn't see any references to RNDADDTOENTCNT or
RNDADDENTROPY, the ioctl(2)s that are used to indicate to the kernel
that added entropy should be used for the random(4) device. Maybe
they're hidden
** Changed in: libpgm (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpgm in Ubuntu.
https://bugs.launchpad.net/bugs/1820203
Title:
[MIR]
** Also affects: lubuntu-meta (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1835095
Title:
Lubuntu initrd
*** This bug is a duplicate of bug 1835095 ***
https://bugs.launchpad.net/bugs/1835095
** Information type changed from Private Security to Public Security
** This bug has been marked a duplicate of bug 1835095
Lubuntu initrd images leaking cryptographic secret when disk encryption is
Public bug reported:
In running adt testing on 5.2-based kernels for eoan, I'm seeing
failures from the apparmor mult_mount regression test. Running the test
case manually with -x yields:
+ dd if=/dev/zero of=/tmp/sdtest.2210-22387-i6UxxQ/image.ext3 bs=4096 count=20
+ mkfs.ext2 -F -m 0 -N 10
*** This bug is a duplicate of bug 1832919 ***
https://bugs.launchpad.net/bugs/1832919
** This bug has been marked a duplicate of bug 1832919
installed libssl1.1:amd64 package post-installation script subprocess
returned error exit status 10
--
You received this bug notification because
*** This bug is a duplicate of bug 1832919 ***
https://bugs.launchpad.net/bugs/1832919
** This bug is no longer a duplicate of bug 1495302
subprocess installed post-installation script returned error exit status 10
** This bug has been marked a duplicate of bug 1832919
installed
*** This bug is a duplicate of bug 1832919 ***
https://bugs.launchpad.net/bugs/1832919
** This bug is no longer a duplicate of bug 1495302
subprocess installed post-installation script returned error exit status 10
** This bug has been marked a duplicate of bug 1832919
installed
I'm not sure how to do SRU verification on this update. I don't know a
set of steps to take to see the update notification when running X11.
Upgrading and downgrading among several packages did NOT show the update
notification:
sarnold@hunt:/tmp$ sudo dpkg -i
Stephen, AMD invented the 64 bit extensions to the x86 instruction set
and brought their processors to market well before Intel brought theirs
to market. Thus AMD won a huge amount of name recognition. Debian
standardized on "amd64" to name packages for the architecture many years
ago.
Thanks
--
** Attachment added: "Coverity results"
https://bugs.launchpad.net/ubuntu/+source/libpgm/+bug/1820203/+attachment/5270475/+files/coverity.txt
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpgm in Ubuntu.
Public bug reported:
Hello, the openssl library postinst file is using pidof /usr/bin/X, but
that doesn't appear to be the path to the X11 server any more:
debian/libssl1.1.postinst:
# Only issue the reboot notification for servers; we proxy this by
# testing that the X server
Hello Robert, thanks for this; could you please file this bug against
the man-db package, and mention that this needs to be adjusted similar
to https://usn.ubuntu.com/4008-2/ ?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Can you run apport-collect 1831490 on this machine to collect additional
logs and data?
Thanks
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Package changed: alsa-driver (Ubuntu) => linux (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1831301
Title:
sound doesn't works in both kernel. no one
Hi Michael, thanks for reporting back the solution -- we're fine here,
nothing needs doing.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1713435
Title:
package
** Description changed:
- I want to do some SRU testing but I have to look up how to add the
- -proposed lines to apt sources every time I want to do this task. The
- wiki page for it is pretty verbose and includes text like: "Replace
- "xenial" with "trusty", "vivid", "utopic", "precise", or
The wiki page does have the software properties method documented:
https://wiki.ubuntu.com/Testing/EnableProposed
I don't have software-properties-gtk installed (and until now didn't
know the name of the command to launch it), so apt-add-repository was my
first attempt.
Thanks
--
You received
pito, it'd probably be best to head to https://askubuntu.com/ or #ubuntu
on irc.freenode.net to try to figure out where exactly your slow
performance is coming from.
Install the systemd-bootchart package, then at grub's kernel command
line, add init=/lib/systemd/systemd-bootchart
Attach the
Hello, can you please provide the output of:
head -1 /usr/bin/pyclean
ls -l /usr/bin/python
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python-defaults in Ubuntu.
https://bugs.launchpad.net/bugs/1829857
Title:
Probably this represents an LVM2 or hardware error instead of something
specific to certificates.
Thanks
** Package changed: ca-certificates (Ubuntu) => ubuntu
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates
The error message from the terminal log:
(Reading database ... 1522438 files and directories currently installed.)
Preparing to unpack .../python-django_1.6.11-0ubuntu1.3_all.deb ...
File "/usr/bin/pyclean", line 63
except (IOError, OSError), e:
^
SyntaxError:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Public bug reported:
I want to do some SRU testing but I have to look up how to add the
-proposed lines to apt sources every time I want to do this task. The
wiki page for it is pretty verbose and includes text like: "Replace
"xenial" with "trusty", "vivid", "utopic", "precise", or "lucid"
Use CVE-2018-20839.
Thanks
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-20839
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1803993
Title:
Vibhu, please see https://usn.ubuntu.com/3943-1/ for information on the
most recent wget security update we performed.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wget in Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to evolution-data-server in
Ubuntu.
https://bugs.launchpad.net/bugs/1828124
Title:
Incidentally, there's nothing for the AppArmor project to do here -- any
confined program will include or not include the fingerprint data as
specified in the profile.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
301 - 400 of 1771 matches
Mail list logo