: Undecided
Status: New
** Also affects: tiff (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: tiff (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: tiff (Ubuntu Xenial)
Assignee: (unassigned) => Marc Desla
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
** Changed in: base-files (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to base-files in Ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libimobiledevice in
Ubuntu.
https://bugs.launchpad.net/bugs/1681077
Title:
ideviceinfo (libimobiledevice): GnuTLS
** Also affects: lcms2 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: lcms2 (Ubuntu Yakkety)
** Changed in: libav (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libav in Ubuntu.
https://bugs.launchpad.net/bugs/1662513
Title:
Update to 9.21 in Trusty
Status in libav
I am closing this bug report as there is no actionable item.
As mentioned above, source packages are verified using the Ubuntu
archive key, not by using the developer's signature.
** Changed in: apt (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a
** Changed in: ca-certificates (Ubuntu)
Status: New => Confirmed
** Changed in: ca-certificates (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: unity8 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1650818
Title:
Clipboard contents accessible outside user
Hi Carl, it looks like you're missing the apparmor-easyprof-ubuntu
package. That package is necessary for proper operation. Could you
please reinstall it and try again?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Changed in: webbrowser-app (Ubuntu)
Status: New => Invalid
** Changed in: apparmor (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
Hi,
In the 20170717 package, we no longer ship email signing certificates.
Per Mozilla, "SwissSign Platinum CA - G2" is marked as an email signing
certificate only:
CKA_TRUST_SERVER_AUTH CK_TRUST CKT_NSS_MUST_VERIFY_TRUST
CKA_TRUST_EMAIL_PROTECTION CK_TRUST CKT_NSS_TRUSTED_DELEGATOR
An update has already been uploaded to artful and is awaiting approval
by the release team.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1723909
Title:
[security] WPA2:
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1712308
Title:
systemd-journald crashed with SIGABRT in stpcpy()
Hi,
To get the default changed, could you please file a bug with the
upstream GNOME project here:
https://bugzilla.gnome.org/
Once you've filed the bug, please like the upstream bug to this one.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1717794
Title:
apport-gtk crashed with SIGABRT in
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1719851
Title:
ca-certificates isn't updated
The ca-certificates package has been updated for all releases:
https://usn.ubuntu.com/usn/usn-3432-1/
Marking bug as Fix Released. Thanks!
** Changed in: ca-certificates (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: ca-certificates (Ubuntu Xenial)
Status: New => Fix
Both. The new bundle added some new CAs, and also removed CAs that
Mozilla has deemed no longer trustworthy or have requested to be
removed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725348
Title:
Systemd - Bypassing
ACK on the debdiffs, uploaded for processing by the SRU team with a
couple of minor changelog changes: added bug number, fixed versioning.
Thanks!
** Changed in: util-linux (Ubuntu Xenial)
Status: New => In Progress
** Changed in: util-linux (Ubuntu Zesty)
Status: New => In
** Changed in: systemd (Ubuntu Zesty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Description changed:
Hello,
We would like to report a vulnerability about systemd which allows to
DOS the systemd-resolve service.
The vulnerability is described in the attached
We have rated these vulnerabilities as being "low" priority as the
undefined behaviour doesn't affect binaries built with gcc.
We will include them in a zlib security update if more important issues
need to be addressed.
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9840.html
It FTBFS with gcc 7.2 in artful and bionic, but builds fine with gcc 7.1
that was previously in artful.
Openssl 1.0.2m fails in the same way.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
Public bug reported:
openssl FTBFS on artful armhf with the following:
../util/shlib_wrap.sh ./sha256t
Testing SHA-256
TEST 1 of 3 failed.
** Affects: gcc-7 (Ubuntu)
Importance: Undecided
Status: New
** Affects: openssl (Ubuntu)
Importance: Undecided
Status: New
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
(Ubuntu Bionic)
Status: New => In Progress
** Changed in: openssl (Ubuntu Artful)
Status: Confirmed => In Progress
** Changed in: openssl (Ubuntu Artful)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: openssl (Ubuntu Bionic)
Assignee: (unassig
Here's another:
https://git.gnome.org/browse/dconf/tree/service/dconf-gvdb-utils.c#n177
https://git.gnome.org/browse/dconf/tree/service/dconf-keyfile-writer.c#n210
** Also affects: d-conf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are
and another:
https://git.gnome.org/browse/gnome-session/tree/gnome-session/gsm-util.c?h=gnome-3-26#n99
** Also affects: gnome-session (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
Here is one:
http://bazaar.launchpad.net/~ubuntu-desktop/session-migration/trunk/view/head:/src/session-migration.c#L270
** Package changed: ubuntu => session-migration (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
Public bug reported:
accountsservice doesn't honour the UID_MAX settings in /etc/login.defs,
resulting in system users being displayed at the login screen and in the
users control panel.
See attached screenshot to see that the "libvirt-qemu" user is being
displayed when it shouldn't.
** Information type changed from Private Security to Public Security
** Changed in: tiff (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
** Changed in: binutils (Ubuntu Bionic)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763098
Title:
Multiple memory corruption in gprof
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
** Changed in: binutils (Ubuntu Bionic)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763101
Title:
OOM-Bug in cxxfilt
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763102
Title:
Multiple memory corruptions in objdump
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1767201
Title:
KVPM pam_unix(sudo:auth): auth could not identify
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to binutils in Ubuntu.
https://bugs.launchpad.net/bugs/1763099
Title:
Stack-Overflow in nm-new
** Information type changed from Private Security to Public Security
** Changed in: librsvg (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to librsvg in Ubuntu.
The EXTRACT_UNSAFE_SYMLINKS variable was backed out in busybox 1.28.2 by
the following commit:
https://git.busybox.net/busybox/commit/?h=1_28_stable=37277a23fe48b13313f5d96084d890ed21d5fd8b
Two new commits were added to later 1.28 releases to fix more symlink
issues:
There is no CVE to assign, as there is no flaw here.
As an administrator, you are requesting that the password be a space,
and the system allows it since the administrator knows best. This is
expected behaviour. If you don't want the password to be a space, enter
an adequate password.
--
You
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725351
Title:
Systemd - Remote DOS of systemd-resolve
Hello?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to busybox in Ubuntu.
https://bugs.launchpad.net/bugs/1753572
Title:
cpio in Busybox 1.27 ingnores "unsafe links"
Status in busybox package in Ubuntu:
Confirmed
Status
Hi, Thanks for reporting this issue, but that is not a comment at all.
>From the sudoers man page:
It is possible to include other sudoers files from within the sudoers
file currently being parsed using the #include and #includedir direcā
tives.
While # is used in some
Hi,
Thanks for commenting on this issue.
We have rated CVE-2016-10009 as a low-priority issue because an attacker
would need to control both the forwarded agent socket and write access
to the filesystem of the host running the agent, an unlikely scenario.
Other Linux distributions have also
We will likely be releasing openssh updates that include this issue in
the next couple of weeks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE]
Updated have now been published:
https://usn.ubuntu.com/usn/usn-3538-1/
** Changed in: openssh (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
Yes, I've started working on them.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE] Security Vulnerabilities in OpenSSH on Ubuntu 14.04
Status in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: lightdm (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1743423
Title:
frozen login window' unable to login; must
Related bug in ubuntu-mate-welcome: bug 1745929
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security problems with incorrect permissions for ubuntu 17.10
Hello. Yes, USN-3558-1 included the fix for Ubuntu 16.04 LTS for
environments where systemd-resolved is manually enabled. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
Sorry, I don't know the answer to that question.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1725351
Title:
Systemd - Remote DOS of systemd-resolve service
Status in
Hi! I've prepared a busybox update and uploaded it to my PPA here:
https://launchpad.net/~mdeslaur/+archive/ubuntu/testing
Could you please see if it resolves your issue? If so, I'll upload it to
cosmic and SRU it to bionic.
Thanks!
** Also affects: busybox (Ubuntu Bionic)
Importance:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
s/from a security/from the security team's/
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1783810
Title:
[SRU] blocks boot on core18
Status in util-linux package in
I think this is acceptable from a security point of view, especially
since this is an upstream change.
Before randutils.c implemented support for the getrandom() call, it used
/dev/urandom. The patch simply falls back to using /dev/urandom if there
is no enough entropy for getrandom().
--
You
/proc/*/loginuid is set by the pam_loginuid module when you login.
Policykit isn't involved in that process at all.
Are you using gdm to log into the graphical session?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
What's the output of "id" in a broken shell?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1784964
Title:
Regression due to CVE-2018-1116 (processes not inheriting
Are you using local passwd/shadow/group files, or are you authenticating
using something else?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to policykit-1 in Ubuntu.
https://bugs.launchpad.net/bugs/1784964
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1787752
Title:
mirror.fail - security issue in mirror:// -
Do not change the line from "admin" to "adm".
The "admin" group was renamed to "sudo". The "adm" group is used for
something else and should not be part of the sudoers file.
The "admin" group needs to stay in that file to properly handle people
who upgraded systems from earlier releases.
Oh, we don't track security updates in bugs, we track them in our
tracker.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libsoup2.4 in Ubuntu.
https://bugs.launchpad.net/bugs/1779901
Title:
CVE-2018-12910
Status in
Sorry about that.
You can look up the CVE in our tracker, and see if someone is in the
Assigned-to section:
https://people.canonical.com/~ubuntu-
security/cve/2018/CVE-2018-12910.html
For a security update, it's probably best to just ask us.
--
You received this bug notification because you
** Also affects: pam (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1777415
Title:
Local authorization bypass by using
You're welcome!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1732172
Title:
[CVE] Security Vulnerabilities in OpenSSH on Ubuntu 14.04
Status in openssh package in
Any further progress on these issues?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security problems with incorrect permissions for ubuntu 17.10
Status
All CVEs are currently fixed in bionic.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to mpg123 in Ubuntu.
https://bugs.launchpad.net/bugs/1753450
Title:
[MIR] mpg123
Status in mpg123 package in Ubuntu:
Incomplete
Bug
I just researched current open CVEs in bionic. The only one open is
CVE-2017-15019, which is a minor issue.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15019
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
Is there anything left to land here? I just installed the 2018-04-13
desktop iso, and while ~/.config has correct permissions, ~/.local does
not.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
Here's another:
https://cgit.freedesktop.org/xorg/xserver/tree/hw/xfree86/common/xf86Helper.c#n1136
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security
** Also affects: xorg-server (Ubuntu)
Importance: Undecided
Status: New
** Changed in: xorg-server (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: xorg-server (Ubuntu Bionic)
Importance: Undecided => High
** Changed in: xorg-server (
Hi daniel,
I wasn't able to reproduce with 16.04. Did you install the regular
Ubuntu desktop, or a specific flavour?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
I tested the 2018-04-21 daily image, and the permissions on ~/.config
and ~/.local are OK now.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to d-conf in Ubuntu.
https://bugs.launchpad.net/bugs/1735929
Title:
security
Unfortunately, this SRU was superseded by a security update.
New debdiffs need to be prepared on top of the security updates.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
** Information type changed from Private Security to Public Security
** Package changed: xorg (Ubuntu) => gnome-shell (Ubuntu)
** Changed in: gnome-shell (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
) => ghostscript (Ubuntu)
** Also affects: ghostscript (Ubuntu Bionic)
Importance: Undecided
Status: New
** Changed in: ghostscript (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: ghostscript (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers
601 - 700 of 1108 matches
Mail list logo