Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: ubuntu-system-settings (Ubuntu) => location-service
(Ubuntu)
** Information type changed from Private Security to Public Security
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: dovecot (Ubuntu) => apparmor (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1512131
Title:
Apparmor complains about multiple /run/dovecot
** Changed in: libxml2 (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
https://bugs.launchpad.net/bugs/1498751
Title:
Please sync libxml2
1- The debdiff in comment #9 still contains an extra
cups-1.7.2/lets_patch_this.patch section. Could you please remove it?
2- Please add an origin tag to the patch that traces back to redhat's 1161172
bug, since I believe that's what you based the backport on
3- Also, I don't think we should do
Also, please add "(LP: #1505328)" to the debian/changelog.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1505328
Title:
Cups SSL is vulernable to POODLE
Status in cups
** Information type changed from Private Security to Public Security
** Also affects: sudo (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: sudo (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: sudo (Ubuntu Trusty)
Importance: Undecided
** Package changed: dash (Ubuntu) => unity (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dash in Ubuntu.
https://bugs.launchpad.net/bugs/1499322
Title:
Wily: No Dash Icon After Package Install Until New Session
** Bug watch added: bugzilla.sudo.ws/ #707
http://bugzilla.sudo.ws/show_bug.cgi?id=707
** Also affects: sudo via
http://bugzilla.sudo.ws/show_bug.cgi?id=707
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Also affects: steam (Ubuntu Wily)
Importance: Undecided
Status: Confirmed
** Also affects: systemd (Ubuntu Wily)
Importance: Undecided
Status: Incomplete
** Also affects: steam (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: systemd (Ubuntu
** Changed in: network-manager (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1482887
Title:
NetworkManager not setting
** Changed in: address-book-app (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to address-book-app in
Ubuntu.
https://bugs.launchpad.net/bugs/1439041
Title:
Address-Book lists
** Information type changed from Private Security to Public Security
** Changed in: lxc-android-config (Ubuntu)
Status: New => Confirmed
** Changed in: lxc-android-config (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of
** Changed in: network-manager (Ubuntu)
Status: New => Confirmed
** Changed in: openvpn (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
** Changed in: freetype (Ubuntu Utopic)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to freetype in Ubuntu.
https://bugs.launchpad.net/bugs/1449225
Title:
Backport #41309 ( 8b281f83e )
Trusty)
Importance: Undecided
Status: New
** Changed in: freetype (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: freetype (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: freetype (Ubuntu
** Changed in: freetype (Ubuntu Trusty)
Assignee: lava (lavasanjay) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to freetype in Ubuntu.
https://bugs.launchpad.net/bugs/1449225
Title:
Backport #41309 (
mon (Ubuntu Trusty)
Status: New => Confirmed
** Changed in: unity-settings-daemon (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity in Ubun
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Bug watch added: Debian Bug tracker #795315
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795315
** Also affects: ntp (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795315
Importance: Unknown
Status: Unknown
** Bug watch added: bugs.ntp.org/ #2224
** Changed in: bash (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1479542
Title:
merge Debian 4.3-13 and 4.3-11ubuntu3
ACK on the debdiffs, thanks!
I've slightly modified the whitespace in the changelog and have added
the bug number, and have uploaded it to wily, and to the other releases
for processing by the SRU team.
** Tags removed: verification-done
** Changed in: ntp (Ubuntu Wily)
Status: In
Here is the udev file from the steam repo.
** Attachment added: "99-steam-controller-perms.rules"
https://bugs.launchpad.net/ubuntu/+source/steam/+bug/1498655/+attachment/4472239/+files/99-steam-controller-perms.rules
--
You received this bug notification because you are a member of Ubuntu
The rule should probably go in the systemd package, adding systemd to
bug.
** Also affects: systemd (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1492570
Title:
/usr/share/apport/kernel_crashdump
ACK on the debdiff, uploaded to queue for the SRU team.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1499075
Title:
python3.4.3 SRU breaks awscli
Status in
** Changed in: python-botocore (Ubuntu Trusty)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python3.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1499075
Title:
python3.4.3 SRU
This part of the patch is wrong:
@@ -895,18 +922,6 @@ _cupsSetDefaults(void)
* Look for ~/.cups/client.conf...
*/
- snprintf(filename, sizeof(filename), "%s/.cups/client.conf", home);
- fp = cupsFileOpen(filename, "r");
-}
-else
- fp = NULL;
-
-if (!fp)
Uploaded same fix to Wily for processing by the SRU team.
** Description changed:
+ [Impact]
+
+ On systems with a long hostname, nano either segfaults or refuses to
+ work properly.
+
+ [Test Case]
+ 1- set a long hostname with "hostname thisisareallyreallyreallylonghostname"
+ 2- try and
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
I can't reproduce this issue in midori at all.
I can reproduce it with https://te-st.ru
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1520568
Title:
All queries fails when
** Summary changed:
- Cups SSL is vulernable to POODLE
+ Cups SSL is vulnerable to POODLE
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1505328
Title:
Cups SSL is
Curiously, I can't reproduce that. This is what I get:
$ openssl s_client -connect localhost:631
SSL-Session:
Protocol : TLSv1.2
Cipher: AES256-SHA256
Please attach the output of "apt-cache policy libssl1.0.0" and your
/etc/cups/cupsd.conf
Thanks!
** Information type changed
This is CVE-2015-7946
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7946
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1525981
Title:
Device can
*** This bug is a security vulnerability ***
Public security bug reported:
USN-2834-1 contained a fix for CVE-2015-7499, but did not contain the
following subsequent commit:
https://git.gnome.org/browse/libxml2/commit/?id=ce0b0d0d81fdbb5f722a890432b52d363e4de57b
See post from Tom Lane here:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1475050
Title:
unprivileged guest to host real-root escape
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1482786
Title:
man-db daily cron job TOCTOU bug when
ACK on the updated debdiff, thanks!
I've changed my mind, and will release it as a security update after all
if testing goes well.
Thanks!
** Changed in: cups (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because
I'm not sure what the attack vector here is. /etc/hostname is only
writeable by root.
Is there any way for an attacker to control /etc/hostname?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: light-locker (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1515662
Title:
Major security issue with light-locker -
** Information type changed from Private Security to Public
** Package changed: ubuntu => apt (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1518785
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Publishing as a security update now, thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1510163
Title:
Poodle TLS1.0 issue in Trusty (and Precise)
Status in
I can't seem to reproduce this. https://www.google.com works fine in an
up-to-date image with Chromium and nss 2:3.21-1ubuntu2.
Could you please give the exact steps require to see this issue?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
nss 3.20.1 works, nss 3.21 doesn't.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1520568
Title:
All queries fails when 'google' is used: ERR_SSL_PROTOCOL_ERROR
Status in
OK, a few more notes on reproducing this:
1- I can't reproduce this by installing the daily live cd in a VM
2- I can reproduce it successfully by installing the daily live cd on real
hardware
This means it's probably not related to which Google servers are being
hit, and is likely
Hi Bryan,
Thanks for the debdiffs!
Where did you obtain the patch from Hanno Boeck from?
** Also affects: gnutls26 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: gnutls26 (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug
d => High
** Changed in: gnutls26 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gnutls26 (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gnutls26 (Ubuntu)
Status: New => Fix Released
--
** Changed in: libpng (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer
Thanks for the debdiffs, building now for a security update!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Status
** Also affects: libpng (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple
http://www.ubuntu.com/usn/usn-2865-1/
** Information type changed from Private Security to Public Security
** Changed in: gnutls26 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Changed in: apport (Ubuntu)
Status: Fix Committed => Confirmed
** Changed in: man-db (Ubuntu)
Status: Fix Committed => Confirmed
** Changed in: pam (Ubuntu)
Status: Fix Committed => Confirmed
** Changed in: shadow (Ubuntu)
Status: Fix Committed => Confirmed
--
Requested CVE:
http://www.openwall.com/lists/oss-security/2016/06/03/7
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
** Changed in: nss (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1586538
Title:
certutils from libnss3-tools - man page contradicts
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Possible culprit:
https://www.sudo.ws/repos/sudo/rev/153f016db8f1
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1565332
Title:
sudo crashed with SIGABRT in kill()
Status
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1565332
Title:
sudo crashed with SIGABRT in kill()
Status in sudo package
** Package changed: openssl (Ubuntu) => monit (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1576226
Title:
monit : disable sslv3
Status in monit package in
Could someone please test the version in xenial-proposed so I can
release it as a security update? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libimobiledevice in
Ubuntu.
https://bugs.launchpad.net/bugs/1388743
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Joy Latten (j-latten)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1594748
Title:
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Joy Latten (j-latten)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1593953
Title:
EC_KEY_generate_key()
The gnutls26 security update disabled md5 support. Are you sure one of your
server certs isn't using md5?
Could you perhaps attach them here?
** Changed in: gnutls26 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Since you managed to get this to work, I am closing this bug. Thanks!
** Changed in: cups (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
ibxml2 (Ubuntu Vivid)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Wily)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Xenial)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mde
Yep, unfortunately those are signed with md5, so it's normal that gnutls
will no longer connect.
You need to request those certs be changed, and use the older version of
gnutls26 in the meantime.
Since this is expected behaviour, I am closing this bug. Thanks!
** Changed in: gnutls26 (Ubuntu)
Oh, unfortunately not. I was hoping gnutls-cli would print out the
certs, but it appears it stops before it gets a chance to.
Perhaps:
openssl s_client -connect xx.xx.xx.xx:636
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
ok, since you haven't pasted the actual certs, you need to run both of
them though "openssl x509 -noout -text" and see what it lists as the
"Signature Algorithm".
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in
Perhaps try:
gnutls-cli -p 636 xx.xx.xx.xx
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1534230
Title:
LDAP TLS connection stopped working
Status in gnutls26 package
Ubuntu doesn't typically update to newer software versions. Like most
other Linux distros, we backport security patches to the versions of
software we ship, whether or not there is still upstream support for it.
--
You received this bug notification because you are a member of Ubuntu
Touch
Ubuntu doesn't typically update to newer software versions. Like most
other Linux distros, we backport security patches to the versions of
software we ship, whether or not there is still upstream support for it.
** Changed in: openssl (Ubuntu)
Status: New => Won't Fix
--
You received
Caused by 6f992d94ea708535b2f3a3de22b429401d59fac9
** Bug watch added: bugs.gnupg.org/gnupg/ #2246
http://bugs.gnupg.org/gnupg/issue2246
** Also affects: gnupg via
http://bugs.gnupg.org/gnupg/issue2246
Importance: Unknown
Status: Unknown
--
You received this bug notification
Ubuntu 15.10 and up now include manpages for nss tools. Marking this bug
as closed.
** Changed in: nss (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
Changed in: gtk+2.0 (Ubuntu Wily)
Importance: Undecided => Medium
** Changed in: gtk+2.0 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gtk+2.0 (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed
signed) => Marc Deslauriers (mdeslaur)
** Changed in: gtk+3.0 (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: gtk+3.0 (Ubuntu Wily)
Status: New => Fix Released
** Changed in: gtk+3.0 (Ubuntu Xenial)
Status: New => Fix Released
--
You received this bug no
** Changed in: openssl (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1526959
Title:
openssl 1.0.2e breaks sbsigntool
Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnupg in Ubuntu.
https://bugs.launchpad.net/bugs/1501634
Title:
GnuPG 1.4/2.0 requires a patch for GCC 5
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnome-online-accounts in
Ubuntu.
https://bugs.launchpad.net/bugs/1543830
Title:
Please DONT use webkit 1
rtificates (Ubuntu Wily)
Importance: Undecided => Low
** Changed in: ca-certificates (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: c
ca-certificates is now updated in all stable releases:
http://www.ubuntu.com/usn/usn-2913-1/
** Changed in: ca-certificates (Ubuntu Precise)
Status: Confirmed => Fix Released
** Changed in: ca-certificates (Ubuntu Trusty)
Status: Confirmed => Fix Released
** Changed in:
@born2chill:
It is fixed by using the mini.iso in trusty-updates. Please use the
links in comment #10.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1546459
Title:
Your example command doesn't work. You need to tell openssl where the
certificate store is, like so:
echo | openssl s_client -CAfile /etc/ssl/certs/ca-certificates.crt
-connect www.google.com:443
What version is your openssl package? Please do:
apt-cache policy libssl1.0.0
Thanks.
** Changed
301 - 400 of 1108 matches
Mail list logo