Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to signon-ui in Ubuntu.
https://bugs.launchpad.net/bugs/1667659
Title:
signon-ui crashed with SIGSEGV in
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
: Undecided
Status: New
** Changed in: openssl (Ubuntu Yakkety)
Status: New => Fix Committed
** Changed in: openssl (Ubuntu Xenial)
Status: New => Confirmed
** Changed in: openssl (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You
Uploaded package to xenial-proposed for processing by the SRU team.
** Changed in: openssl (Ubuntu Yakkety)
Status: Fix Committed => Fix Released
** Changed in: openssl (Ubuntu Xenial)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1614210
Title:
Remove incomplete fips in openssl in
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1588524
Title:
FIPS_mode_set reports incorrect error
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1594748
Title:
CRYPTO_set_mem_functions() is broken
Could you try doing:
sudo dpkg --configure -a
sudo apt-get install -f
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to debconf in Ubuntu.
https://bugs.launchpad.net/bugs/1629021
Title:
package clamav-freshclam
Also:
$ apt-cache policy libssl1.0.0
Thanks
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1630877
Title:
1:4.2.6.p3+dfsg-1ubuntu3.11 - OPENSSL_1.0.0 not defined in file
That's odd. Do you have a custom openssl installed?
Could you please paste the output of the following commands:
$ ldd /usr/bin/ntpq
$ apt-cache policy openssl
Thanks!
** Changed in: ntp (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member
It looks like you're using an openssl package that wasn't built for
Ubuntu 12.04 LTS.
You'll need to rebuild ntp for your custom openssl version, or use the
openssl package that comes from Ubuntu 12.04 LTS.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
http://www.ubuntu.com/usn/usn-3096-1/
** Changed in: ntp (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1625372
Title:
NTP
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
This isn't really a security issue, it is how URLs work. The value
specified before the "@" is considered to be the username. See RFC 3986.
(https://www.ietf.org/rfc/rfc3986.txt)
That being said, while Chrome simply allows the username, firefox does
display a warning to the user.
** Changed in:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ufw in Ubuntu.
https://bugs.launchpad.net/bugs/1443203
Title:
GUFW blocks all incoming VNC connections even if
Great, I'm closing this bug. Thanks!
** Changed in: ntp (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ntp in Ubuntu.
https://bugs.launchpad.net/bugs/1630877
Title:
libusbmuxd was updated: http://www.ubuntu.com/usn/usn-3026-2/
** Changed in: libusbmuxd (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libimobiledevice in
Ubuntu.
@nayan: your libssl1.0.0 package hasn't been updated in a long time, is
too old, and contains numerous security vulnerabilities.
You need to update it to the version that matches your openssl package
(1.0.1-4ubuntu5.38) by installing all security updates:
$ sudo apt-get update
$ sudo apt-get
*** This bug is a duplicate of bug 1626883 ***
https://bugs.launchpad.net/bugs/1626883
** This bug has been marked a duplicate of bug 1626883
libssl 1.0.2g-1ubuntu4.4 and 1.0.1f-1ubuntu2.20 cause PHP SSL cert
validation to segfault
--
You received this bug notification because you are a
** Changed in: openssl (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1626883
Title:
libssl 1.0
I can reproduce this and will release an updated openssl package today.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1626883
Title:
libssl 1.0.2g-1ubuntu4.4 and
This may be caused by the same issue as bug 1626883.
Updated openssl packages are being built now and will be released as a
regression fix today.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Packages that fix this issue are currently being built in the security
team PPA:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
They will be published as soon as they finish building and have gone
through QA.
--
You received this bug notification because you are
** Also affects: openssl (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: openssl (Ubuntu Yakkety)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Also affects: openssl (Ubuntu Precise)
Importance: Undecided
** Changed in: openssl (Ubuntu Yakkety)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1626883
Title:
libssl 1.0.2g-1ubuntu4.4 and
** Changed in: openssl (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1626773
Title:
CVE-2016-2182.patch has broken
Can you see if the regression fix we published today fixes your issue?
http://www.ubuntu.com/usn/usn-3087-2/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1626773
Title:
tus: New => Confirmed
** Changed in: openssl (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: openssl (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: openssl (Ubuntu)
Status: New => Invalid
-
Yes, see bug 1614210 for the SRU to xenial.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1591797
Title:
Only run FIPS self tests when FIPS is enabled
Status in openssl
Sorry you are experiencing this issue, but
1.0.2h-1+deb.sury.org~trusty+1 is a package from a third party
repository.
Please file a bug with them:
https://github.com/oerdnj/deb.sury.org/issues
I am closing this bug since there is nothing we can do to fix this.
Thanks!
** Changed in: openssl
ACK on the debdiff in #2, looks good. Uploaded. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to base-files in Ubuntu.
https://bugs.launchpad.net/bugs/1614834
Title:
Add PRIVACY_POLICY_URL to /etc/os-release
Status
> This experience makes me wonder how patches for the -security suites
(default for unattended-upgrades) are tested and QA'ed. Can anything be
done to the Ubuntu process to prevent things like this happening again?
For OpenSSL, we run it through a test suite and also test it with
commonly run
Could you try with the default configuration? I doesn't look like your
server is properly offering the ciphers you've specified in the
configuration:
https://www.ssllabs.com/ssltest/analyze.html?d=www.taujhe.de=62.112.43.237
--
You received this bug notification because you are a member of
OpenSSL in Ubuntu 16.04 LTS does include support for TLSv1 and TLSv1.1:
$ openssl s_client -connect www.ubuntu.com:443 -tls1
CONNECTED(0003)
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES128-SHA
Protocol : TLSv1
Cipher: ECDHE-RSA-AES128-SHA
$ openssl s_client -connect
** Changed in: gst-plugins-good0.10 (Ubuntu Precise)
Status: In Progress => Fix Released
** Changed in: gst-plugins-good0.10 (Ubuntu Trusty)
Status: In Progress => Fix Released
** Changed in: gst-plugins-good0.10 (Ubuntu Xenial)
Status: In Progress => Fix Released
**
gst-plugins-good1.0 also needs to be updated to incorporate the security
fixes from (1.8.2-1ubuntu0.2). Marking as verification-failed until
then.
** Tags removed: verification-needed
** Tags added: verification-failed
--
You received this bug notification because you are a member of Ubuntu
)
Importance: Undecided
Status: Confirmed
** Affects: gst-plugins-good0.10 (Ubuntu Precise)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: gst-plugins-good1.0 (Ubuntu Precise)
Importance: Undecided
Status: Invalid
I don't plan on moving the plugin at this time as that is too intrusive
for a minimal security update.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-good0.10 in
Ubuntu.
https://bugs.launchpad.net/bugs/1643901
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1635280 ***
https://bugs.launchpad.net/bugs/1635280
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
** Information type changed from Private Security to Public Security
** Package changed: xfce4-terminal (Ubuntu) => sudo (Ubuntu)
** Changed in: sudo (Ubuntu)
Status: New => Confirmed
** Changed in: sudo (Ubuntu)
Assignee: Andrew Donald (senoir-cielo) => (unassigned)
--
You
systemd ships with a policykit file which allows the system
administrator to set the hostname.
The policykit file is located here:
/usr/share/polkit-1/actions/org.freedesktop.hostname1.policy
and in the systemd source here:
This was fixed by https://www.ubuntu.com/usn/usn-3116-1/
Thanks for the bug report!
** Changed in: dbus (Ubuntu)
Status: New => Fix Released
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Thanks for the debdiffs!
While they look good, there is some discussion in the upstream bug, and
the fix hasn't been committed yet. I'll wait until the fix is committed
before releasing updates for the stable releases.
** Also affects: cairo (Ubuntu Precise)
Importance: Undecided
TLSv1.2 was re-enabled in Ubuntu 12.04 LTS in May 2015, so if you
install all the updates, you should be getting it.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1256576
ACK on the debdiffs in comments #20 and #21. Packages are building now
and will be released as security updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tracker in Ubuntu.
** Package changed: nss (Ubuntu) => systemd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1632681
Title:
SonicWall NetExteder broken by new nsswitch.conf
** Changed in: firefox (Ubuntu Trusty)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1643467
Title:
Firefox 50 blocks Ubuntu 12.04
gst-plugins-good1.0 needs to be updated to incorporate the security
fixes from (1.8.2-1ubuntu0.3). Marking as verification-failed until
then.
** Tags removed: verification-needed
** Tags added: verification-failed
--
You received this bug notification because you are a member of Ubuntu
Touch
*** This bug is a duplicate of bug 1565332 ***
https://bugs.launchpad.net/bugs/1565332
** This bug is no longer a duplicate of bug 1580597
/usr/bin/sudo:11:kill:main
** This bug has been marked a duplicate of bug 1565332
sudo crashed with SIGABRT in kill()
--
You received this bug
Confirmed, this is caused by the following change in behaviour:
When the command sudo is running dies due to a signal, sudo will now
send itself that same signal with the default signal handler installed
instead of exiting. The bash shell appears to ignore some signals, e.g.
SIGINT, unless the
*** This bug is a duplicate of bug 1565332 ***
https://bugs.launchpad.net/bugs/1565332
** This bug is no longer a duplicate of bug 1580597
/usr/bin/sudo:11:kill:main
** This bug has been marked a duplicate of bug 1565332
sudo crashed with SIGABRT in kill()
--
You received this bug
*** This bug is a duplicate of bug 1565332 ***
https://bugs.launchpad.net/bugs/1565332
** This bug is no longer a duplicate of bug 1580597
/usr/bin/sudo:11:kill:main
** This bug has been marked a duplicate of bug 1565332
sudo crashed with SIGABRT in kill()
--
You received this bug
*** This bug is a duplicate of bug 1565332 ***
https://bugs.launchpad.net/bugs/1565332
** This bug has been marked a duplicate of bug 1565332
sudo crashed with SIGABRT in kill()
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
There are more security updates coming out soon, so I suggest waiting
for now.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net/bugs/1619600
Title:
[SRU] New stable
** Bug watch added: bugzilla.libav.org #939
http://bugzilla.libav.org/show_bug.cgi?id=939
** Also affects: firefox via
http://bugzilla.libav.org/show_bug.cgi?id=939
Importance: Unknown
Status: Unknown
** No longer affects: firefox
** Also affects: libav via
Since there still is no final solution in the upstream bug, I am
unsubscribing ubuntu-security-sponsors for now. Please re-subscribe the
group if the upstream bug gets a proper fix. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Please don't merge this for zesty. There is no point as most of the
changes have already been backported, and merging it will just make
maintenance harder.
Let's wait until z+1 and do openssl 1.1 instead.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tracker in Ubuntu.
https://bugs.launchpad.net/bugs/1669601
Title:
tracker-store crashed with SIGSEGV in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1676686 ***
https://bugs.launchpad.net/bugs/1676686
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/indicator-network/+bug/1668679/+attachment/4828372/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Bug watch added: GNOME Bug Tracker #760183
https://bugzilla.gnome.org/show_bug.cgi?id=760183
** Also affects: libxml2 via
https://bugzilla.gnome.org/show_bug.cgi?id=760183
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of
*** This bug is a duplicate of bug 1652325 ***
https://bugs.launchpad.net/bugs/1652325
** This bug has been marked a duplicate of bug 1652325
Libxml2 2.9.3 fails to parse multi-byte character in large CDATA section
that is split across buffer
--
You received this bug notification
The vulnerable code isn't in 2.12.x, so the gnutls26 package isn't
vulnerable.
** Changed in: gnutls26 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
** Also affects: ssmtp (Ubuntu Artful)
Importance: Undecided
Status: Invalid
** Also affects: gnutls26 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: ssmtp (Ubuntu
ACK on the trusty, xenial and zesty debdiffs. Uploaded for processing by
the SRU team. Thanks!
** Changed in: gnutls26 (Ubuntu Trusty)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Zesty)
ACK on the artful debdiff. I've uploaded it now with a slight adjustment
to put the bug numbers in the patch tags. Thanks!
** Changed in: gnutls28 (Ubuntu Artful)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Hi,
That's weird. Did you install some third-party python package, or
changed that symlink yourself?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package
Hi. Could you please paste the result of the following command?
ls -l /usr/bin/python
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package
** Changed in: openssl (Ubuntu Artful)
Status: In Progress => Triaged
** Changed in: openssl (Ubuntu Artful)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1704981
Title:
I don't know
Status in xorg package in Ubuntu:
Hi John,
We get the current random seed unit from systemd. Please file a bug with
the upstream systemd project, or discuss these changes on the systemd
mailing list.
Once your changes are accepted by systemd, we will inherit them.
Thanks!
** Changed in: systemd (Ubuntu)
Status: New =>
** No longer affects: policykit-1 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1591672
Title:
update-manager does not obey require-password policy
Status
** Changed in: sqlite3 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1700937
Title:
Heap-buffer overflow in nodeAcquire
Status
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1690820
Title:
killing su does not kill subprocess (SIGTERM not
501 - 600 of 1108 matches
Mail list logo