** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tracker in Ubuntu.
https://bugs.launchpad.net/bugs/1669601
Title:
tracker-store crashed with SIGSEGV in tracker_db_
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/indicator-network/+bug/1668679/+attachment/4828372/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Please don't merge this for zesty. There is no point as most of the
changes have already been backported, and merging it will just make
maintenance harder.
Let's wait until z+1 and do openssl 1.1 instead.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packa
** Changed in: openssl (Ubuntu Artful)
Status: In Progress => Triaged
** Changed in: openssl (Ubuntu Artful)
Status: Triaged => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
ht
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
For this to be resolved in Ubuntu 12.04 LTS, an appropriate fix needs to
be written for libav 0.8. Updating to a newer libav isn't an option as
the API has changed and that would break compatibility with all the
software using libav in the archive. Once a fix has been written,
Mozilla would then ne
*** This bug is a duplicate of bug 1652325 ***
https://bugs.launchpad.net/bugs/1652325
** This bug has been marked a duplicate of bug 1652325
Libxml2 2.9.3 fails to parse multi-byte character in large CDATA section
that is split across buffer
--
You received this bug notification because
** Bug watch added: GNOME Bug Tracker #760183
https://bugzilla.gnome.org/show_bug.cgi?id=760183
** Also affects: libxml2 via
https://bugzilla.gnome.org/show_bug.cgi?id=760183
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubu
The vulnerable code isn't in 2.12.x, so the gnutls26 package isn't
vulnerable.
** Changed in: gnutls26 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.la
** Also affects: ssmtp (Ubuntu Artful)
Importance: Undecided
Status: Invalid
** Also affects: gnutls26 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: ssmtp (Ubuntu Trusty
ACK on the artful debdiff. I've uploaded it now with a slight adjustment
to put the bug numbers in the patch tags. Thanks!
** Changed in: gnutls28 (Ubuntu Artful)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
ACK on the trusty, xenial and zesty debdiffs. Uploaded for processing by
the SRU team. Thanks!
** Changed in: gnutls26 (Ubuntu Trusty)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: gnutls28 (Ubuntu Zesty)
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1704981
Title:
I don't know
Status in xorg package in Ubuntu:
** Changed in: sqlite3 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sqlite3 in Ubuntu.
https://bugs.launchpad.net/bugs/1700937
Title:
Heap-buffer overflow in nodeAcquire
Status i
Hi John,
We get the current random seed unit from systemd. Please file a bug with
the upstream systemd project, or discuss these changes on the systemd
mailing list.
Once your changes are accepted by systemd, we will inherit them.
Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Co
** No longer affects: policykit-1 (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1591672
Title:
update-manager does not obey require-password policy
Status i
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.ne
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to signon-ui in Ubuntu.
https://bugs.launchpad.net/bugs/1667659
Title:
signon-ui crashed with SIGSEGV in QWindow::show
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to signon-ui in Ubuntu.
https://bugs.launchpad.net/bugs/1667658
Title:
signon-ui crashed with SIGSEGV in QWindow::show
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Hi. Could you please paste the result of the following command?
ls -l /usr/bin/python
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package apport
Hi,
That's weird. Did you install some third-party python package, or
changed that symlink yourself?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1705166
Title:
package
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi Carl, it looks like you're missing the apparmor-easyprof-ubuntu
package. That package is necessary for proper operation. Could you
please reinstall it and try again?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libimobiledevice in
Ubuntu.
https://bugs.launchpad.net/bugs/1681077
Title:
ideviceinfo (libimobiledevice): GnuTLS e
** Also affects: lcms2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Yakkety)
Impo
** Changed in: libav (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1662513
Title:
Update to 9.21 in Trusty
Status in libav package
** Changed in: unity8 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1650818
Title:
Clipboard contents accessible outside user sess
I am closing this bug report as there is no actionable item.
As mentioned above, source packages are verified using the Ubuntu
archive key, not by using the developer's signature.
** Changed in: apt (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a m
** Changed in: webbrowser-app (Ubuntu)
Status: New => Invalid
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad
** Changed in: ca-certificates (Ubuntu)
Status: New => Confirmed
** Changed in: ca-certificates (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
h
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to shadow in Ubuntu.
https://bugs.launchpad.net/bugs/1690820
Title:
killing su does not kill subprocess (SIGTERM not pr
What happens when you try to connect?
What kind of wireless connection are you using?
Do you have anything relevant in your log files?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/b
Reassigning to the kopanocore package as that is what contains the
problematic profile.
** Package changed: apparmor (Ubuntu) => kopanocore (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://
)
Importance: Undecided
Status: New
** Changed in: isc-dhcp (Ubuntu Bionic)
Status: New => In Progress
** Changed in: isc-dhcp (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: isc-dhcp (Ubuntu Cosmic)
Status: New => In
Packages for this issue are now available in the security team test ppa
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Could someone please try them out and make sure they resolve the issue?
Thanks!
--
You received this bug notification because you are a m
*** This bug is a duplicate of bug 1828401 ***
https://bugs.launchpad.net/bugs/1828401
** This bug has been marked a duplicate of bug 1828401
9.26~dfsg+0-0ubuntu0.18.04.9 breaks cups printing of pdf
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
Great, thanks for testing, I'll release these early next week!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1781699
Title:
DHCPv6 server crashes regularly (bionic)
Sta
I still can't reproduce this issue.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
integer overflow in whoopsie 0.2.69
Status in whoopsie package in Ubunt
** Changed in: whoopsie (Ubuntu)
Assignee: Alex Murray (alexmurray) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1881982
Title:
** Changed in: whoopsie (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: whoopsie (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoop
https://github.com/sungjungk/whoopsie_killer2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1882180
Title:
DoS vulnerability: fail to allocate
Status in whoopsie packag
Looks like this is CVE-2020-15570
** Changed in: whoopsie (Ubuntu Xenial)
Assignee: Alex Murray (alexmurray) => Marc Deslauriers (mdeslaur)
** Changed in: whoopsie (Ubuntu Bionic)
Assignee: Alex Murray (alexmurray) => Marc Deslauriers (mdeslaur)
** Changed in: whoopsie (Ubunt
https://github.com/sungjungk/whoopsie_killer
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1881982
Title:
DoS vulnerability: cause resource exhaustion
Status in whoopsi
https://github.com/sungjungk/apport-vuln
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to whoopsie in Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
integer overflow in whoopsie 0.2.69
Status in whoopsie package in
** Also affects: whoopsie (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: whoopsie (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: whoopsie (Ubuntu Groovy)
Importance: High
Assignee: Marc Deslauriers (mdeslaur)
Status
** Also affects: whoopsie (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: whoopsie (Ubuntu Groovy)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Also affects: whoopsie (Ubuntu Xenial)
Importance: Undecided
** Changed in: lightdm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1864982
Title:
Ubuntu desktop computer doesn't seem to lock
** Changed in: gsettings-desktop-schemas (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gsettings-desktop-schemas
in Ubuntu.
https://bugs.launchpad.net/bugs/1617620
Title:
Autorun f
** Changed in: pygobject-2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pygobject-2 in Ubuntu.
https://bugs.launchpad.net/bugs/1513964
Title:
dsextras.py : Shell Command Injectio
I think this was CVE-2017-6519, which was fixed a long time ago.
I am closing this bug, please feel free to open a new bug if you can
reproduce with a more recent version of Ubuntu. Thanks!
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6519
** Changed in: avahi (Ubuntu)
Are you still able to reproduce this issue with later versions of
Ubuntu?
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.laun
** Changed in: openjpeg (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openjpeg in Ubuntu.
https://bugs.launchpad.net/bugs/1404084
Title:
Fix for CVE-2013-6045 breaks decoding of ch
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python2.7 in Ubuntu.
https://bugs.launchpad.net/bugs/896836
Title:
Segmentation fault when asking help() for the lis
Hi,
Could you please attach a screenshot of the slider you are referring to?
I believe you are confusing the slider's purpose. The slider is to make your
bluetooth computer visible to be able to pair new devices, it does not
disconnect existing devices.
** Changed in: linux (Ubuntu)
Stat
Ok, actually the slider is in fact to disable bluetooth completely,
please ignore my previous comment.
** Changed in: bluez (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
ACK on the debdiff in comment #11, uploaded with a slight LP tag fix for
processing by the SRU team. Thanks!
** Changed in: openssl (Ubuntu Bionic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is sub
me cards are missing graphics
** Affects: librsvg (Ubuntu)
Importance: Undecided
Status: New
** Affects: librsvg (Ubuntu Xenial)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Affects: librsvg (Ubuntu Bionic)
Importance: Undecided
Can also be tested by running "eog
/usr/share/aisleriot/cards/anglo.svgz". See attached screenshot.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.net/bugs/1889206
Title:
Regressio
** Attachment added: "eog displaying issue rendering anglo cardset"
https://bugs.launchpad.net/ubuntu/+source/librsvg/+bug/1889206/+attachment/5396555/+files/anglo-issue.png
** Bug watch added: gitlab.gnome.org/GNOME/librsvg/-/issues #612
https://gitlab.gnome.org/GNOME/librsvg/-/issues/612
** Changed in: librsvg (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
https://bugs.launchpad.net/bugs/1889206
Title:
Regression in USN-4436-1
Status in librs
I think this is related:
$ readelf --dynamic libmysqlclient.so.21.1.19 | grep BIND
0x001e (FLAGS) BIND_NOW
$ readelf --dynamic libmysqlclient.so.21.1.21 | grep BIND
0x001e (FLAGS) BIND_NOW STATIC_TLS
** Information type changed from Public to
Possibly related:
https://github.com/mysql/mysql-server/commit/735bd2a53834266c7256830c8d34672ea55fe17b
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to opencv in Ubuntu.
https://bugs.launchpad.net/bugs/1890170
Title:
Import
*** This bug is a duplicate of bug 1889851 ***
https://bugs.launchpad.net/bugs/1889851
I'm pretty sure this is a dupe of #1889851. Marking as such.
** This bug has been marked a duplicate of bug 1889851
Driver QMysql can't be loaded
--
You received this bug notification because you are a
Unfortunately, this SRU has been superseded by a security update. Please
re-upload the SRU. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1881976
Title:
apport-gtk
Hi,
The only thing an attacker can do with this vulnerability is DoS their
own connection. As such, it is not considered a security issue either by
the upstream OpenSSH project, or by the Ubuntu security team.
Like other distros, we have no plans to fix this issue in our stable
releases.
** Chan
Hi,
Could you elaborate which codes in that manpage you feel are dangerous
and are actually implemented by the common terminals? The old screendump
and window title codes were disabled long ago, I'm not sure any of the
others are anything other than a nuisance.
--
You received this bug notificat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This has now been fixed:
https://ubuntu.com/security/notices/USN-4504-1
** Changed in: openssl (Ubuntu Xenial)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https
It's not feasible to stop the affected ciphers from re-using secrets,
it's in the specification.
Removing the ciphers is what was done in later releases of openssl,
including the 1.0.2w version that was released specifically to address
this issue:
https://www.openssl.org/news/secadv/20200909.txt
Hi Julian,
Could you please backport the patch in comment #9 to xenial? The code in
xenial is substantially different.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/
I am currently preparing updates for this issue, and I just tested the
bionic update that includes this patch, and it works in my environment.
Could you please make sure you created the policy file ok, and have
rebooted after updating packagekit?
--
You received this bug notification because you
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/187
Title:
Reading local files as root leads to
The updates for this issue have been released:
https://ubuntu.com/security/notices/USN-4538-1
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/187
Title:
Re
The updates for this issue have been released:
https://ubuntu.com/security/notices/USN-4538-1
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to packagekit in Ubuntu.
https://bugs.launchpad.net/bugs/1882098
Title:
Pa
** Changed in: nss (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1897666
Title:
FTBFS: nss for groovy ftbfs due to erroneous nonn
*** This bug is a duplicate of bug 1899100 ***
https://bugs.launchpad.net/bugs/1899100
** Information type changed from Private to Public
** This bug has been marked a duplicate of bug 1899100
whoopsie assert failure: double free or corruption (fasttop)
--
You received this bug notificat
Here's a proposed fix, not sure if this is the exact cause of the
double-free or if duplicate keys are acceptable or not.
** Patch added: "Proposed Fix"
https://bugs.launchpad.net/ubuntu/+source/whoopsie/+bug/1899100/+attachment/5427819/+files/whoopsie_0.2.73~test1.debdiff
** Information type
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to accountsservice in Ubuntu.
https://bugs.launchpad.net/bugs/1900255
Title:
accountsservice drop privileges
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1903332
Title:
Apport get_config incorrectly drops privi
501 - 600 of 1125 matches
Mail list logo