Thanks! I've closed the bug.
** Changed in: ca-certificates (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1549709
The openssl tools in Ubuntu 14.04 never did use the system CA file by
default. That was fixed in later releases. So it's normal that you don't
need to specify it manually when using 15.10 for example, but do need to
specify it in 14.04.
The path to it has always been
tus: New => Confirmed
** Changed in: openssl (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: openssl (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: openssl (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Chan
Chrome 45 is too old. You need to update to Chrome 47 or later,
preferably to the current version, Chrome 48.
I am closing this bug as running an old version of Chrome is not
supported.
** Changed in: nss (Ubuntu)
Status: Incomplete => Won't Fix
--
You received this bug notification
You need to restart everything that uses libssl, perhaps only the web
server, you'll see when you try it.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1528645
What version of Chrome are you running?
** Package changed: ca-certificates (Ubuntu) => nss (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1550423
Title:
Did you restart your server after the update in order to use the new
version of libssl?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1528645
Title:
Please
ACK on the debdiff in comment #1, uploading now. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1517040
Title:
wpa 2.4 misses one patch from Debian to improve 2.4/5
Merge looks good. Uploading. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1532648
Title:
Please merge openldap 2.4.42+dfsg-2 (main) from Debian testing (main)
Fixed in (1.2.4-1ubuntu1.1).
** Changed in: graphite2 (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: graphite2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
How are you installing this? What image are you using?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1546459
Title:
segfault at b774bd9d ip b7352a0d sp bfda8f30 error 7
Confirmed, the epoch wasn't supposed to get bumped in precise.
** Also affects: nss (Ubuntu Precise)
Importance: Undecided
Status: New
** Changed in: nss (Ubuntu Precise)
Status: New => Confirmed
** Changed in: nss (Ubuntu Precise)
Assignee: (unassigned) =>
I can reproduce this issue with the mini.iso from the release version of
14.04.
Could you please try again with the newer mini.iso from trusty-updates
(available here:)
http://archive.ubuntu.com/ubuntu/dists/trusty-updates/main/installer-amd64/current/images/netboot/mini.iso
It looks like the servers listed in the bug description require SIGN-
RSA-SHA384, which gnutls26 doesn't support.
The issue can be reproduced with gnutls28 by disabling the additional
signature algorithms:
gnutls-cli --priority "NORMAL:-SIGN-ECDSA-SHA256:-SIGN-RSA-SHA384:-SIGN-
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: messaging-app (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to messaging-app in Ubuntu.
https://bugs.launchpad.net/bugs/1543070
Title:
Security breach: bubble displays
** Also affects: pam (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Xenial)
Importance: Critical
Assignee: Marc Deslauriers (mdeslaur)
Status: Triaged
** Changed in: pam (Ubuntu Precise)
Status: New => Triaged
** Changed in:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
The policykit-desktop-privileges package was changed in 2011 to allow
writing images without a password:
policykit-desktop-privileges (0.7) oneiric; urgency=low
* Allow local admins to do the less harmful usb-creator actions (mounting
and writing image) without a password.
-- Martin Pitt
The debdiff looked fine, but needed fixing. Curl is a particular package
as the last two patches get unapplied during the build to accommodate
for different library backends. New patches need to get added earlier in
the series file.
I've fixed the debdiff, made sure it builds properly, and have
Thanks for the patch. Could you please prepare a debdiff for trusty and
wily suitable for sponsoring as an SRU?
Thanks!
** Also affects: pcre3 (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: pcre3 (Ubuntu Xenial)
Importance: Medium
Status: New
** Also
ACK on the debdiffs in comment #9 and #10. I've uploaded them for
processing by the SRU team, but I've added the missing start/stop
dependencies change to the trusty one first.
Thanks!
** Changed in: lvm2 (Ubuntu Trusty)
Status: Triaged => In Progress
** Changed in: lvm2 (Ubuntu Wily)
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1564451
Title:
User processes are counted towards systemd limit
This is a bug in QtWebEngine.
The file
src/3rdparty/chromium/net/third_party/nss/patches/chacha20poly1305.patch
contains the following:
+/* This is a bodge to allow this code to be compiled against older NSS
+ * headers. */
+#ifndef CKM_NSS_CHACHA20_POLY1305
+#define CKM_NSS_CHACHA20_POLY1305
The point of the USN-2865-1 security update was to remove support for
RSA-MD5 certificates which are considered insecure and were previously
accepted in GnuTLS because of a design flaw.
See the following for more information:
http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007572.html
We released updated openssl packages to handle that case:
http://www.ubuntu.com/usn/usn-2913-3/
What version of openssl do you have installed?
What specific site are you unable to access?
** Changed in: ca-certificates (Ubuntu)
Status: New => Incomplete
--
You received this bug
Marcin,
It looks like your bank renewed their SSL cert on Feb 9th, and they
forgot to include the intermediate certificate.
This is a configuration problem on their end and has nothing to do with
Ubuntu updates.
Tell them to go to the following page and type in ebank.db-pbc.pl for
more
Glad that it's working, thanks!
I'm closing this bug.
** Changed in: ca-certificates (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
*** This bug is a duplicate of bug 1528645 ***
https://bugs.launchpad.net/bugs/1528645
Glad it's working. I didn't rehash, but that should just result in a
dangling symlink which shouldn't be valid. Thanks for testing with a
fresh rehash.
I'll mark this bug as a dupe of 1528645.
Thanks!
**
*** This bug is a security vulnerability ***
Public security bug reported:
I am requesting a FeatureFreeze exception to update sudo in Xenial to
the newly released 1.8.16 version.
Not only does the new 1.8.16 version fix a large number of bugs, but it
also fixes security issues:
-
These should now be fixed by the following update:
http://www.ubuntu.com/usn/usn-2943-1/
** Changed in: pcre3 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pcre3 in Ubuntu.
Just to be clear, I will start by merging 1.8.15-1.1 from debian, and
will update to 1.8.16 which isn't in Debian yet.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1563825
What versions of the openssl and ca-certificates packages have you tried
this on? On what release of Ubuntu?
The following update removed 1024-bit certs:
http://www.ubuntu.com/usn/usn-2913-1/
The following update added alternate certificate chain support to openssl:
So it seems "Equifax Secure Certificate Authority" is still present in
the latest ca-certificates package. Presumably once Mozilla removes it
we will issue an updated ca-certificates package.
However, removing it still allows google to validate:
$ sudo rm /usr/lib/ssl/certs/Equifax_Secure_CA.pem
ded
Status: New
** Changed in: libsoup2.4 (Ubuntu Trusty)
Status: New => Confirmed
** Changed in: libsoup2.4 (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: libsoup2.4 (Ubuntu Wily)
Status: New => Confirmed
** Changed in: libsoup2.4
I can't think of any reason why having a session would be important in
this case, so I think changing allow_any to yes should be fine.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to accountsservice in Ubuntu.
Thanks for testing it Simon!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libsoup2.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1573494
Title:
winbind 4.3.8 has an ntlm_auth that breaks evolution-ews
Status in libsoup:
I've put updated libsoup packages that fix this issue in the security
team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
I'd appreciate if someone could test them to see if they fix evolution-
ews NTLM authentication and comment here. If they test ok,
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wget in Ubuntu.
https://bugs.launchpad.net/bugs/1580700
Title:
wget in 12.04 does not support SNI
Current ca-certificates should already have the required CA.
Which version of ca-certificates, and which version of wget are you
trying?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
New => Confirmed
** Changed in: wget (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Description changed:
+ [Impact]
+ wget in Ubuntu 12.04 doesn't have support for TLS Server Name Indication,
which makes it incompatible with certain sites, includes sites
It's not useless, it is used by /etc/bash.bashrc to know whether or not
to print the help message if the user has not used sudo before.
As for moving the file to xdg-cache, please file a bug with the upstream
developers here:
https://bugzilla.sudo.ws/index.cgi
Once the bug has been filed,
sl (Ubuntu)
Status: New => Confirmed
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.
If you've added precise-proposed to your /etc/apt/sources.list, all you
need to do is perform the two following commands:
1- apt-get update
2- apt-get install wget
Don't forget to remove precise-proposed from your /etc/apt/sources.list
when you're done.
--
You received this bug notification
I can reproduce this with wget on 12.04, but not on 14.04. Both use the
same version of ca-certificates.
Using openssl directly also works:
openssl s_client -CAfile /etc/ssl/certs/ca-certificates.crt -connect
www.x.org:443
I suspect wget on 12.04 is doing something odd, I'll look into this.
--
Ubuntu 12.04 has wget 1.13.4, which doesn't have support for TLS Server
Name Indication, which was included in 1.14. That needs to get
backported.
** No longer affects: ca-certificates (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
it to proposed as an SRU.
Thanks!
** Changed in: sudo (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: sudo (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Bug watch added: bugzilla.sudo.ws/ #743
http://bugzilla.sudo.ws/show_bug.cgi?
** Also affects: sudo (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: sudo (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
Packages in the PPA have been successfully tested, and upstream has
commited a slightly more exhaustive fix:
https://www.sudo.ws/repos/sudo/rev/1d13341d53ec
I have uploaded the fix to yakkety.
I have uploaded the fix to xenial for processing by the SRU team.
** Changed in: sudo (Ubuntu)
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1570310 ***
https://bugs.launchpad.net/bugs/1570310
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
I can't reproduce this, which dns server are you using?
** Changed in: dnsmasq (Ubuntu)
Status: New => Incomplete
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Also affects: openldap (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: openldap (Ubuntu Yakkety)
Importance: Medium
Status: Confirmed
** Also affects: openldap (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: openldap (Ubuntu
Thanks for the patched packages!
I've uploaded your changes to yakkety with a slight change in the
changelog to better describe the issue. I've also uploaded updates to
wily and xenial for processing by the SRU team. Thanks!
** Changed in: openldap (Ubuntu Yakkety)
Status: Confirmed =>
As per the SRU requirements, could you please update the bug description
with a testing procedure? See here for more information:
https://wiki.ubuntu.com/StableReleaseUpdates
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Xenial now has 1.8.16, marking released.
** Changed in: sudo (Ubuntu Xenial)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1512781
Which eclipse package are you using, and what site are you accessing
that is giving the error?
** Changed in: ca-certificates (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
That link shows the contents of the original ca-certificates package
that shipped with trusty, not the one from trusty-security.
Closing this bug. Thanks!
** Changed in: ca-certificates (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member
That certificate is not going to be added back. I suggest filing a bug
with Eclipse so that they sign using a different CA, especially since
that one expires in 2018.
The package in trusty-security doesn't contain this certificate. I'm not sure
why you believe it does.
trusty-updates and
The GTE CyberTrust Global Root certificate was removed by the following
security update:
http://www.ubuntu.com/usn/usn-2913-1/
Here is some more information on why that CA was removed:
https://blog.mozilla.org/security/2015/01/28/phase-2-phasing-out-certificates-with-1024-bit-rsa-keys/
This may be a dupe of bug 1565567.
Have you tried the sudo package in xenial-proposed? (1.8.16-0ubuntu1.1)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1575239
Title:
Don't worry about it, I changed it back. :)
** Changed in: sudo (Ubuntu Xenial)
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
*** This bug is a duplicate of bug 1565567 ***
https://bugs.launchpad.net/bugs/1565567
Thanks for testing it. Could you please add a comment to bug 1565567
that you tested it successfully? Thanks!
** This bug has been marked a duplicate of bug 1565567
segv in sudo_getgrgid
--
You
I suspect this is caused by the eglibc update, not the php5 update.
Reassigning bug.
** Package changed: php5 (Ubuntu) => eglibc (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
FYI, I couldn't reproduce this earlier either.
I installed a new Ubuntu 12.04.5 VM with encrypted home, and was able to
successfully upgrade to the newer nss without any issues.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
OK, I'll try a plain sync, and if that fails, I'll upload your merge.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to keyutils in Ubuntu.
https://bugs.launchpad.net/bugs/1604500
Title:
please merge keyutils from
** Changed in: keyutils (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to keyutils in Ubuntu.
https://bugs.launchpad.net/bugs/1604500
Title:
please merge keyutils from Debian
yakkety sync dropped the delta. Marking as fix released.
** Changed in: nss (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1567670
I can't reproduce this issue at all. The threading module definitely is
in the libpython3.4-stdlib package, for both the release pocket, and the
-security pocket:
$ dpkg -c libpython3.4-stdlib_3.4.0-2ubuntu1_amd64.deb | grep threading.py
-rw-r--r-- root/root 48898 2014-04-11 10:13
This bug was fixed in the package e2fsprogs - 1.43.1-1
---
e2fsprogs (1.43.1-1) unstable; urgency=medium
* New upstream version
* Fix the Direct I/O fallback code in the Unix I/O manager so it
implements read-modify-write correctly.
* The mke2fs program will now warn if the
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1599949
Title:
NetworkManager Sets Wrong DNS
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnupg in Ubuntu.
https://bugs.launchpad.net/bugs/1599286
Title:
gpg crashed with SIGABRT in g10_log_bug()
Status
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: python2.7 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python2.7 in Ubuntu.
https://bugs.launchpad.net/bugs/1512068
Title:
Python ctypes.util , Shell Injection in
** Information type changed from Private Security to Public Security
** Changed in: util-linux (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util-linux in Ubuntu.
** Changed in: openssl (Ubuntu)
Status: New => Confirmed
** Changed in: openssl (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
mozjs hasn't gotten any security updates in _years_, so no, we're not
going to be able to support that package in main.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
Adam,
Any progress on getting the precise archive signed with the newer keys?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1363482
Title:
ubuntu-keyring
For this to be resolved in Ubuntu 12.04 LTS, an appropriate fix needs to
be written for libav 0.8. Updating to a newer libav isn't an option as
the API has changed and that would break compatibility with all the
software using libav in the archive. Once a fix has been written,
Mozilla would then
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to signon-ui in Ubuntu.
https://bugs.launchpad.net/bugs/1667658
Title:
signon-ui crashed with SIGSEGV in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
401 - 500 of 1108 matches
Mail list logo