Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1460766
Title:
scripts run on every site,slows my computer down
Status in xorg
Marking the apparmor task as 'Invalid' since the evince AppArmor profile
is shipped in the evince package.
** Changed in: apparmor (Ubuntu)
Status: Triaged => Invalid
** Changed in: evince (Ubuntu)
Status: New => Triaged
** Changed in: evince (Ubuntu)
Importance: Undecided => Lo
Confirmed on Vivid (evince 3.14.2-0ubuntu1).
At first glance, it looks like the evince-previewer profile needs to
'#include ' in order to connect to the system bus. However,
testing is needed to confirm that there are no additional accesses
needed after granting permission to connect to the system
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to totem in Ubuntu.
https://bugs.launchpad.net/bugs/1429515
Title:
can not play movies
Status in totem package in Ubuntu:
New
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1442751
Title:
[Inspiron 3420, Cirrus Logic CS4213, Speaker, Internal] N
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to opengtl in Ubuntu.
https://bugs.launchpad.net/bugs/1440592
Title:
package libgtlcore0.8 0.9.18-0ubuntu1 failed to install/upgra
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1440466
Title:
Updation Error
Status in xorg package in Ubuntu:
New
Bug des
** Changed in: linux (Ubuntu)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Changed in: ecryptfs
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Changed in: ecryptfs
Importance: Undecided => Critical
--
You received this bug notification because you are a member o
Thanks for the in-depth triage of this bug, Rocko. As you pointed out, I
can easily reproduce this using cp's --reflink=always option.
I'm marking nautilus as Invalid since this is definitely an eCryptfs
bug. I'll start determining the best way to fix this issue.
** Changed in: nautilus (Ubuntu)
The `cp --reflink=always test test.bak` is always issuing the
BTRFS_IOC_CLONE ioctl, even on non-btrfs filesystems. eCryptfs passes
ioctls down to the lower filesystem but I suspect that it should stop
doing that altogether or possibly only allow a white list of known good
ioctls.
--
You received
On 2015-02-24 04:32:21, Rocko wrote:
> I think it is still useful for ecryptfs to support the btrfs clone ioctl
> for the case where both source and target higher files are in the same
> ecryptfs mount, since this saves disk space.
I don't like the idea of eCryptfs supporting the clone ioctl by de
Hi Mark - I've taken a look at the details in this bug, the upstream
sudo bug, the /r/linux thread, and the upstream sudo fix. I appreciate
and respect your thoroughness.
After taking all of the details into account, I consider this issue to
be low severity due to the mitigating factors involved.
Assigning to Chad, as he's the one the one that typically produces the
chromium-browser updates.
** Changed in: chromium-browser (Ubuntu)
Importance: Undecided => Medium
** Changed in: chromium-browser (Ubuntu)
Status: New => Confirmed
** Changed in: chromium-browser (Ubuntu)
Assi
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1469451
Title:
PCI/internal sound card not detected
Status in alsa-driv
Are you downloading these files through firefox and opening them in
libreoffice? If so, are you saving the files to disk before opening them
in libreoffice?
** Changed in: firefox (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Desktop
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to texlive-extra in Ubuntu.
https://bugs.launchpad.net/bugs/1478489
Title:
package texlive-fonts-extra-doc 2014.20140717-1 failed
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to texlive-extra in Ubuntu.
https://bugs.launchpad.net/bugs/1478490
Title:
package texlive-fonts-extra-doc 2014.20140717-1 failed
I'm assigning this bug to network-manager for now while we wait on more
information from the reporter.
** Package changed: ubuntu => network-manager (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
http
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nvidia-graphics-drivers-331 in Ubuntu.
https://bugs.launchpad.net/bugs/1478237
Title:
nvidia-331-uvm 331.113-0ubuntu0.0.4: nvid
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1478209
Title:
Xorg freeze
Status in xorg package in Ubuntu:
New
Bug descri
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1475908
Title:
Xorg freeze
Status in xorg package in Ubuntu:
New
Bug descri
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1475401
Title:
system crashes
Status in xorg package in Ubuntu:
New
Bug des
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to fglrx-installer in Ubuntu.
https://bugs.launchpad.net/bugs/1479872
Title:
fglrx 2:8.970-0ubuntu1: fglrx kernel module failed to
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nvidia-graphics-drivers-331 in Ubuntu.
https://bugs.launchpad.net/bugs/1474687
Title:
nvidia-331-uvm 331.113-0ubuntu0.0.4: nvid
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ppp in Ubuntu.
https://bugs.launchpad.net/bugs/1479993
Title:
package ppp 2.4.5-5.1ubuntu2.1 failed to install/upgrade: unable
I can confirm this on Wily. If you click "clear the usage data" from the
Security & Privacy, then the document no longer shows up in the dash but
it seems like adding an excluded directory does not cause the cache to
be invalidated.
I don't see how this could allow attackers to cross privilege bou
Making this public since the Fedora bug is already public. It'll help to
get more developers access to the report.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to netwo
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1441958
Title:
Screen is shaking after installing 14.01
Status in xorg package
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to alsa-driver in Ubuntu.
https://bugs.launchpad.net/bugs/1443778
Title:
[Inspiron 3420, Intel PantherPoint HDMI, Digital Out, HDM
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gdm in Ubuntu.
https://bugs.launchpad.net/bugs/1064584
Title:
Locked gnome session unlocks without password authentication
Stat
** Also affects: gnome-shell (Ubuntu)
Importance: Undecided
Status: New
** Changed in: gnome-shell (Ubuntu)
Status: New => Confirmed
** Changed in: gnome-shell (Ubuntu)
Importance: Undecided => Medium
** No longer affects: gdm (Ubuntu)
** Project changed: gdm => gnome-shell
igned him but I can obviously help out as needed.
** Also affects: lightdm (Ubuntu)
Importance: Undecided
Status: New
** Changed in: lightdm (Ubuntu)
Status: New => In Progress
** Changed in: lightdm (Ubuntu)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Change
iet the
denials, as they can generate quite a few log entries. Since we already
grant read permissions on /proc//status, it seems like adding read
permissions on /proc//stat is appropriate.
** Affects: lightdm (Ubuntu)
Importance: Low
Assignee: Tyler Hicks (tyhicks)
Status:
Here's the lightdm debdiff to allow the guest session to start with
AppArmor signal and ptrace mediation. It is tested on Trusty amd64.
** Patch added: "lightdm_1.9.14-0ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064056/+files/lightdm_1.9.14-0u
Here's an updated libvirt debdiff. I rebase Jamie's debdiff on top of
the libvirt that was uploaded to the archive yesterday.
** Patch added: "libvirt_1.2.2-0ubuntu9.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064063/+files/libvirt_1.2.2-0ubuntu9.debdi
Here's the apparmor debdiff. The testing performed in described in the
bug description. Let me know if there are any questions.
** Patch added: "apparmor_2.8.95~2430-0ubuntu4.debdiff"
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1298611/+attachment/4064098/+files/apparmor_2.8.95%7E2
;/usr/lib/lightdm/lightdm-
guest-session" pid=2746 comm="killall" requested_mask="receive"
denied_mask="receive" signal=kill peer="unconfined"
The lightdm abstraction should allow guest session processes to receive
signals from unconfined processes.
** Affe
This bug was fixed in lightdm 1.9.15-0ubuntu1
** Changed in: lightdm (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1304015
Title:
Hello Guy - a fix is currently in progress and should make it into the
Saucy release.
** Changed in: evince (Ubuntu)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
https://bugs.lau
)
Importance: Undecided => Medium
** Changed in: apparmor (Ubuntu Saucy)
Status: New => Confirmed
** Changed in: apparmor (Ubuntu Saucy)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
** Changed in: apparmor (Ubuntu T-series)
Importance: Undecided => Medium
** Changed
Updated debdiff containing an audio abstraction change for bug #1211380
** Patch added: "apparmor_2.8.0-0ubuntu30.debdiff"
https://bugs.launchpad.net/apparmor/+bug/1208988/+attachment/3860413/+files/apparmor_2.8.0-0ubuntu30.debdiff
** Patch removed: "apparmor_2.8.0-0ubuntu30.debdiff"
http
Here's the debdiff containing fixes for this bug and for bug #1235216.
It has received the following testing:
- Manual verification of this both fixes
+ Viewing PDFs and printing PDFs
- Passed QRT's test-evince.py
** Patch added: "evince_3.10.0-0ubuntu2.debdiff"
https://bugs.launchpad.net/ub
I should have mentioned that jdstrand will be sponsoring this debdiff.
It depends on a change in the apparmor package, which he will also be
sponsoring in a different upload.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubunt
ethod_call"
bus="session" path="/org/freedesktop/DBus"
interface="org.freedesktop.DBus" member="Hello" mask="send"
name="org.freedesktop.DBus" pid=30726 profile="/usr/bin/evince-
thumbnailer" peer_profile="uncon
Updated debdiff containing a fix for bug #1236082. jdstrand will sponsor
this debdiff, as it requires a pending apparmor update.
** Patch added: "evince_3.10.0-0ubuntu2.debdiff"
https://bugs.launchpad.net/ubuntu/+source/evince/+bug/1226141/+attachment/3863259/+files/evince_3.10.0-0ubuntu2.debd
nce: Undecided => Medium
** Changed in: apparmor (Ubuntu)
Assignee: (unassigned) => Tyler Hicks (tyhicks)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1231778
Title:
** Also affects: apparmor
Importance: Undecided
Status: New
** Changed in: apparmor
Status: New => In Progress
** Changed in: apparmor
Importance: Undecided => Medium
** Changed in: apparmor
Assignee: (unassigned) => Tyler Hicks (tyhicks)
--
You received
The AppArmor abstraction needs some updates due to AppArmor mediation
changes that happened in Saucy. I need to do a little more testing with
the policy changes and then I'll push an updated branch.
--
You received this bug notification because you are a member of Desktop
Packages, which is subsc
I pushed my branch with the AppArmor changes to lp:~tyhicks/lightdm
/guest-wrapper-with-apparmor-changes and proposed a merge into Robert's
branch.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.
I manually tested the guest session by viewing pages in firefox and
chromium-browser, opening libreoffice, printing to a PDF, and viewing
the PDF with evince.
I'm not sure how to test the remote sessions. Is that something you
could do, Robert?
--
You received this bug notification because you a
** Description changed:
+ [Impact]
+
+ On older kernels that are missing certain AppArmor patches related to
+ AppArmor D-Bus mediation, the presence of dbus rules in the binary
+ AppArmor policy will result in policy load failures and, as a result,
+ applications may run unconfined. On newer ker
** Description changed:
[Impact]
On older kernels that are missing certain AppArmor patches related to
AppArmor D-Bus mediation, the presence of dbus rules in the binary
AppArmor policy will result in policy load failures and, as a result,
applications may run unconfined. On newer ker
Here's a Saucy debdiff for apparmor to fix this bug and bug 1243932.
I've tested it using the manual tests mentioned in the description of
both bugs, as well as with QRT's test-apparmor.py test script.
** Patch added: "apparmor_2.8.0-0ubuntu31.1.debdiff"
https://bugs.launchpad.net/apparmor/+bu
Here's a Trusty debdiff for apparmor to fix this bug, bug 1243932, and
bug 1247269. I've tested it using the manual tests mentioned in the
description of the first two bugs, as well as with QRT's test-
apparmor.py test script.
I've smoke tested the chromium-browser profile changes and manually
ver
I've added tests for this bug and bug 1243932 to QRT's test-apparmor.py.
I've successfully ran the new tests on Trusty and Saucy. I ran the tests
under a Trusty/Saucy, Raring, and Lucid kernels to test all potential
policy load scenarios. All scenarios pass.
** Description changed:
[Impact]
** Changed in: apparmor (Ubuntu Trusty)
Status: Triaged => In Progress
** Changed in: apparmor (Ubuntu Saucy)
Status: Triaged => In Progress
** Changed in: apparmor
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Deskto
I've verified that the test added to QRT's test-apparmor.py succeeds
under Ubuntu Saucy kernel 3.11.0-13.20-generic, using the
2.8.0-0ubuntu31.1 package from -proposed.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ub
Hi min-soo-cho - this fix has not yet been released in the upstream
apparmor project so I'm changing this back to 'fix committed'
** Changed in: apparmor
Status: Fix Released => Fix Committed
--
You received this bug notification because you are a member of Desktop
Packages, which is subs
AppArmor denial from the accessibility dbus-daemon:
dbus[2835]: apparmor="DENIED" operation="dbus_method_call"
bus="accessibility" name="org.freedesktop.DBus"
path="/org/freedesktop/DBus" interface="org.freedesktop.DBus"
member="Hello" mask="send" pid=14848 profile="/usr/bin/evince"
peer_profile="
** Changed in: evince (Ubuntu)
Importance: Undecided => High
** Changed in: evince (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1226141
Title
On 2013-10-22 18:46:37, Marc Deslauriers wrote:
> We'll probably need to also add the following to
> data/apparmor/abstractions/lightdm:
>
> # Allow all DBus communications
> dbus,
After giving this some more thought, it is best to include the dbus
abstractions:
# Allow all DBus communicat
This bug is very finicky to reproduce. I've been testing with completely
up to date and pristine Saucy virtual machines on both amd64 and i386,
*without* the AppArmor mediation dbus package (so I'm testing dbus
1.6.12.0ubuntu2).
These are throw away VMs that I create and trash as needed. I'll crea
Here's another data point from another VM:
* dbus 1.6.12-0ubuntu2
* at-spi2-core 2.9.90-0ubuntu1
* ~/.xsession-errors is clean
* at-spi2-core is running:
$ ps aux | grep at-spi2
tyhicks 1444 0.0 0.3 337552 3384 ?Ssl 15:14 0:00
/usr/lib/at-spi2-core/at-spi-bus-launcher --launch
** Changed in: dbus (Ubuntu)
Assignee: Tyler Hicks (tyhicks) => (unassigned)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to at-spi2-core in Ubuntu.
https://bugs.launchpad.net/bugs/1217757
Title:
Error retrieving accessibil
Marking this bug as incomplete since there are no recent comments and it
isn't clear if this is still a bug. If it is still a valid bug, please
provide new information and move the bug status to NEW.
** Changed in: evolution (Ubuntu)
Status: New => Incomplete
--
You received this bug noti
I believe that this bug has been solved long ago with a lightdm upload.
Marking the ecryptfs-utils task as fix released as this issue seems to
be fixed.
** Changed in: ecryptfs-utils (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a mem
Marking the ecryptfs-utils task as invalid. Encryption is a cpu
intensive operation and there's nothing that can be done, from an
eCryptfs standpoint, for this specific bug.
Software depending on hard-coded timeout values is troublesome since the
home directory may be encrypted, may be in an NFS m
** Package changed: dbus (Ubuntu) => nautilus (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/1359896
Title:
nautilus crashes after sshfs disconnects
Status in “nautilus” pa
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Package changed: ubuntu => nautilus (Ubuntu)
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a m
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Tags added: hardy
--
You received this bug notification because you are a member of Desktop
Packages,
I've confirmed this in oneiric (0.9.1.90-0ubuntu6) and precise
(0.9.1.90-0ubuntu7).
I glanced at the network-manager-applet code and believe that wpa-none
should be supported for ad-hoc networks. I don't see any obvious fixes
in the upstream git repo, nor any related upstream bugs. However, I did
** Bug watch removed: GNOME Bug Tracker #654772
https://bugzilla.gnome.org/show_bug.cgi?id=654772
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/905748
Title:
Create WPA2 a
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** This bug is no longer flagged as a security vulnerability
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-terminal in Ubuntu.
https://bugs.launchpad.net/bugs/880891
T
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Tags removed: gutsy
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-nettool in Ubuntu.
https://bugs.launchpad.net/bugs/880274
Title:
will not update using 8.10
Status in “gnome-nettool” package in Ubuntu:
New
Bug descripti
Hi Fred - Thanks for taking the time to file this bug report.
If your concern is only about the /media directory, the guest user
should be able to read and search that directory. The guest account
should not be able to write to that directory. I've verified that to be
the case on several freshly i
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
1 - 100 of 303 matches
Mail list logo