** Also affects: openssh (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: openssh (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: openssh (Ubuntu Cosmic)
Importance: Undecided
Status: New
** Also affects: openssh (Ubuntu Xenial)
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1794169
Title:
AWS ubuntu became unreachable after ssh login
That's not supposed to happen. Could you please attach your /var/log
/dist-upgrade/apt-term.log file?
Did you update manually, or was this done automatically?
Thanks.
** Changed in: openssh (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a
It looks like you upgraded from Ubuntu 16.04 to Ubuntu 18.04.
>From the log file:
Unpacking openssh-server (1:7.6p1-4) over (1:7.2p2-4ubuntu2.4) ...
Then the upgrade asked you what to do with the modified conffile, again,
from the log:
Configuring openssh-server
sshd_config: A new version
Oh, sorry about that, I didn't notice the date...and also requested the
wrong log file.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1802090
Title:
update overwrites
>From the new log:
Preparing to unpack .../openssh-sftp-server_1%3a7.6p1-4ubuntu0.1_amd64.deb ...
Unpacking openssh-sftp-server (1:7.6p1-4ubuntu0.1) over (1:7.6p1-4) ...
Preparing to unpack .../openssh-server_1%3a7.6p1-4ubuntu0.1_amd64.deb ...
Unpacking openssh-server (1:7.6p1-4ubuntu0.1) over
** Changed in: openssh (Ubuntu Cosmic)
Status: In Progress => Fix Released
** Changed in: openssh (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
Big ACK from the security team. We would like to see this backported
into bionic at some point and having it in cosmic first would allow us
to identify and fix any issues.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
I just uploaded this for bionic to be processed by the SRU team.
Bryan, do you have an example archive that can be used to test this?
Thanks!
** Changed in: busybox (Ubuntu Bionic)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to coreutils in Ubuntu.
https://bugs.launchpad.net/bugs/1808095
Title:
uniq is not checking and handling all file
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to coreutils in Ubuntu.
https://bugs.launchpad.net/bugs/1808092
Title:
Checking and handling various filetypes in fmt
The upstream commit was assigned CVE-2018-19149.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-19149
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to poppler in Ubuntu.
This is an ancient bug and likely no longer applies to recent releases.
As such, I am closing it.
If anyone is still hitting this issue with current releases, please file
a new bug.
** Changed in: ca-certificates-java (Ubuntu)
Status: Confirmed => Invalid
** Changed in: empathy (Ubuntu)
A rebuild of netplan.io into the security pocket was performed an hour
ago and should fix this issue.
I am marking this bug as fix released, feel free to re-open it if the
issue isn't actually resolved.
Thanks!
** Changed in: initramfs-tools (Ubuntu)
Status: New => Confirmed
** Changed
** Changed in: apt (Ubuntu Precise)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1812353
Title:
content injection in http method
Public bug reported:
Rebuilding busybox on trusty breaks wget name resolution.
Introduced by:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0d23a5c1b1908700d25b7e3c6cece148e19dded4
fixed by:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=93bad7c97c7047ecaf7664859e2b49c0fe995443
**
*** This bug is a duplicate of bug 1818089 ***
https://bugs.launchpad.net/bugs/1818089
** This bug has been marked a duplicate of bug 1818089
Cups can not print with "filter failed" error just after ghostcript update
--
You received this bug notification because you are a member of
Thanks!
** Tags removed: verification-needed verification-needed-bionic
** Tags added: verification-done verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to busybox in Ubuntu.
Could you please provide a log file to the authentication failure?
Which version of OpenSSH works?
** Changed in: openssh (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tar in Ubuntu.
https://bugs.launchpad.net/bugs/1810241
Title:
NULL dereference when decompressing
** Changed in: cron (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cron in Ubuntu.
https://bugs.launchpad.net/bugs/1813833
Title:
User without read permission on cron.allow can
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.launchpad.net/bugs/1803441
Title:
BASH_CMDS is writable in restricted bash
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Bug watch added: gitlab.gnome.org/GNOME/gdk-pixbuf/issues #95
https://gitlab.gnome.org/GNOME/gdk-pixbuf/issues/95
** Also affects: choreographics via
https://gitlab.gnome.org/GNOME/gdk-pixbuf/issues/95
Importance: Unknown
Status: Unknown
** Project changed: choreographics =>
Hi Bryan,
Could you please test the package that is now in bionic-proposed, and
post your results here?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to busybox in Ubuntu.
https://bugs.launchpad.net/bugs/1753572
This is likely a bug in network-manager, not policykit...adding network-
manager to this.
Also, I don't see any activity on the upstream bug that would suggest
it's been addressed in any way.
** Also affects: network-manager (Ubuntu)
Importance: Undecided
Status: New
--
You received
What happens when you try to connect?
What kind of wireless connection are you using?
Do you have anything relevant in your log files?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
Reassigning to the kopanocore package as that is what contains the
problematic profile.
** Package changed: apparmor (Ubuntu) => kopanocore (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
ACK from the security team on the low CVE being included in this SRU.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1828215
Title:
openssl ca -spkac output regressed
ACK from the security team on the low CVE being included in this SRU.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832522
Title:
openssl maintainer scripts do not
Hi,
> Linux bitfenix-server 5.1.6-050106-generic #201905311031 SMP Fri May
31
That's not an Ubuntu kernel. Did you install a custom kernel?
> dbus[19216]: Failed to start message bus: Failed to open
"/etc/selinux/default/contexts/dbus_contexts": No such file or directory
It looks like dbus
Oh wow, I'm not sure how that happened. I'll release an update for this.
** Changed in: sudo (Ubuntu)
Status: New => Confirmed
** Changed in: sudo (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Also affects: sudo (Ubuntu Xenial)
Importance: Und
I've uploaded it to build in the following PPA:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
You can get it from there if you need it before tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is
I'll release it tomorrow.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/1832257
Title:
regression: sudo returns exit code 0 if child is killed with SIGTERM
Status in sudo
This will also require usb-creator to be modified to have a single
policykit prompt.
** Also affects: usb-creator (Ubuntu)
Importance: Undecided
Status: New
** Changed in: usb-creator (Ubuntu)
Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)
** Changed in:
I have run bionic-proposed cosmic-proposed and disco-proposed through
the usual security team test procedure. They can be released with the
fix for CVE-2019-1543.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-1543
--
You received this bug notification because you are a
> If you go to It Linux kernel web page you see kernel is at 5.1.x
Your issues are caused by the fact that you're running an unsupported
kernel that isn't configured to work properly with Ubuntu. Please switch
back to running a proper Ubuntu kernel.
--
You received this bug notification because
Where exactly are you seeing that message?
Does it work after rebooting?
** Changed in: dbus (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dbus in Ubuntu.
*** This bug is a duplicate of bug 1828401 ***
https://bugs.launchpad.net/bugs/1828401
** This bug has been marked a duplicate of bug 1828401
9.26~dfsg+0-0ubuntu0.18.04.9 breaks cups printing of pdf
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
There are qemu packages for testing in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unattended-upgrades in
Ubuntu.
Great, thanks for testing, I'll release these early next week!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1781699
Title:
DHCPv6 server crashes regularly (bionic)
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1797386
Title:
[SRU] OpenSSL 1.1.1 to 18.04 LTS
Status in
)
Importance: Undecided
Status: New
** Changed in: isc-dhcp (Ubuntu Bionic)
Status: New => In Progress
** Changed in: isc-dhcp (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: isc-dhcp (Ubuntu Cosmic)
Status: New => In
Packages for this issue are now available in the security team test ppa
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Could someone please try them out and make sure they resolve the issue?
Thanks!
--
You received this bug notification because you are a
** Bug watch added: gitlab.com/federicomenaquintero/bzip2/issues #24
https://gitlab.com/federicomenaquintero/bzip2/issues/24
** Also affects: bzip2 via
https://gitlab.com/federicomenaquintero/bzip2/issues/24
Importance: Unknown
Status: Unknown
--
You received this bug
ium
** Changed in: python3.5 (Ubuntu Xenial)
Status: New => In Progress
** Changed in: python3.5 (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: python2.7 (Ubuntu Xenial)
Importance: Undecided => Medium
** Changed in: python2.7 (Ubuntu Xe
Thanks for updating the bug! I'll close it now.
** Changed in: openssh (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1834129
** Tags removed: verification-needed-bionic
** Tags added: verification-done-bionic
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1832919
Title:
installed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Hi! Have you had a chance to report this issue to Debian?
** Changed in: adduser (Ubuntu)
Status: New => Incomplete
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
*** This bug is a duplicate of bug 1842022 ***
https://bugs.launchpad.net/bugs/1842022
** This bug has been marked a duplicate of private bug 1842022
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch
** Information type changed from Private Security to Public Security
** Changed in: sudo (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
This was fixed a while ago:
https://usn.ubuntu.com/3938-1/
Marking this bug as fix released. Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/ncurses/+bug/1822218/+attachment/5250342/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to initramfs-tools in Ubuntu.
https://bugs.launchpad.net/bugs/1791691
Title:
PATH broken in systemd units
Status in
Hi! Have you reported this issue to the upstream systemd developers?
If not, could you please report it to them so that it can get fixed?
Thanks!
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch
** Information type changed from Private Security to Public Security
** Changed in: dnsmasq (Ubuntu)
Status: New => Confirmed
** Changed in: systemd (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
Hi Brian,
Is this bug on your radar?
Thanks!
** Changed in: apport (Ubuntu)
Status: New => Confirmed
** Changed in: linux (Ubuntu)
Status: Confirmed => Invalid
** Changed in: apport (Ubuntu)
Assignee: (unassigned) => Brian Murray (brian-murray)
--
You received this bug
Olivier,
Did this fix make it to Thunderbird?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1801383
Title:
the WifiSyslog apport hook (used in firefox/tb)
** Changed in: eog (Ubuntu)
Status: New => Incomplete
** Changed in: eog (Ubuntu)
Status: Incomplete => Invalid
** Changed in: gdk-pixbuf (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1752417
Title:
[ffe] including
*** This bug is a duplicate of bug 1532264 ***
https://bugs.launchpad.net/bugs/1532264
I am going to mark this as a dupe of bug 1532264 since it looks to be
the same root cause. Thanks!
** Information type changed from Private Security to Public Security
** This bug has been marked a
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1792004
Title:
built-in PATH seems to have sbin and bin out of
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to jbigkit in Ubuntu.
https://bugs.launchpad.net/bugs/1823419
Title:
jbig-kit calls abort() on invalid data,
Thanks!
** Also affects: adduser (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940577
Importance: Unknown
Status: Unknown
** Changed in: adduser (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of
** Also affects: nss (Ubuntu Eoan)
Importance: High
Assignee: Vineetha Kamath (vineetha)
Status: New
** Also affects: nss (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: nss (Ubuntu Disco)
Importance: Undecided
Status: New
** Also affects:
ACK on the debdiffs. Uploaded to eoan and to previous releases for
processing by the SRU team, with slight versioning adjustment and the
bug tag added to the changelog.
Thanks!
** Changed in: nss (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: nss (Ubuntu Bionic)
WifiSyslog does contain SSID information. While this will be removed
from the thunderbird and firefox packages, I don't think it would be
appropriate to remove it from the linux kernel apport reports.
For linux packages, this information is helpful in debugging wireless
driver issues.
While a
** Changed in: python3.6 (Ubuntu)
Assignee: (unassigned) => Ubuntu Security Team (ubuntu-security)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to python2.7 in Ubuntu.
https://bugs.launchpad.net/bugs/1452115
Title:
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bzip2 in Ubuntu.
https://bugs.launchpad.net/bugs/1834494
Title:
latest bzip2 reports crc errors incorrectly
Status
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1850032
Title:
scanbd prevents HP printers to work correctly with
** Changed in: bluez (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bluez in Ubuntu.
https://bugs.launchpad.net/bugs/1791405
Title:
bluetooth always in discoverable mode (security
** Changed in: jbigkit (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to jbigkit in Ubuntu.
https://bugs.launchpad.net/bugs/1823419
Title:
jbig-kit calls abort() on invalid data,
** Changed in: lightdm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1717490
Title:
LightDM keeps plain text login password in
** Changed in: isc-dhcp (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/1717476
Title:
DHCP Transaction ID (xid) is logged with
** Changed in: openssh (Ubuntu Cosmic)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1832356
Title:
Upgrade OpenSSH to 7.9p1-10 or
*** This bug is a duplicate of bug 1832356 ***
https://bugs.launchpad.net/bugs/1832356
*** This bug is a security vulnerability ***
Public security bug reported:
Now that OpenSSL 1.1.1 has been added to Bionic, we would like to update
OpenSSH to a version that can be linked to OpenSSL
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Is anyone actively working on the glib2.0 SRUs? We are blocked on them
for our ibus security update...
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1844853
Title:
IBus no
ACK on the debdiff in comment #3. Uploaded to focal. Thanks!
** Changed in: util-linux (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util-linux in Ubuntu.
Perhaps the hash is missing in debian/openssh-server.ucf-md5sum?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1861472
Title:
upgrade from fresh bionic to focal
signee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: python-apt (Ubuntu Bionic)
Importance: Undecided => High
** Changed in: python-apt (Ubuntu Bionic)
Status: New => Confirmed
** Changed in: python-apt (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mde
** Changed in: ubuntu-release-upgrader (Ubuntu Xenial)
Status: Confirmed => Invalid
** Changed in: ubuntu-release-upgrader (Ubuntu Bionic)
Status: Confirmed => Invalid
** Changed in: ubuntu-release-upgrader (Ubuntu Disco)
Status: Confirmed => Invalid
** Changed in:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1856494
Title:
system program problem detected
Status in apport
** Changed in: lightdm (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1854120
Title:
Screen contents visible briefly on lock screen
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
What desktop environment are you using?
** Changed in: lightdm (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1864982
Title:
** Information type changed from Private Security to Public Security
** Changed in: isc-dhcp (Ubuntu Focal)
Status: New => In Progress
** Changed in: isc-dhcp (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification becau
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://bugs.launchpad.net/bugs/1865474
Title:
sysytemd-resolved automatically use an ipv6 dns
701 - 800 of 1108 matches
Mail list logo