[Bug 2064962] Re: GIMP crashed with a fatal error: fatal error: Segmentation fault
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2064962 Title: GIMP crashed with a fatal error: fatal error: Segmentation fault To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gimp/+bug/2064962/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065092] Re: Download crash
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065092 Title: Download crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2065092/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 2065116] Re: package postgresql-16 16.2-1ubuntu4 failed to install/upgrade: installed postgresql-16 package post-installation script subprocess returned error exit status 127
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2065116 Title: package postgresql-16 16.2-1ubuntu4 failed to install/upgrade: installed postgresql-16 package post-installation script subprocess returned error exit status 127 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/postgresql-16/+bug/2065116/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1976339] Re: Openssl update to 1.0.2g-1ubuntu4.20+esm3 Breaks Php Openssl_get_cipher_methods Function
Hello Dimitar, I've just publish a new release with the fix (1.0.2g-1ubuntu4.20+esm4) for the issue you had. Can you check if this version is fine? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1976339 Title: Openssl update to 1.0.2g-1ubuntu4.20+esm3 Breaks Php Openssl_get_cipher_methods Function To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1976339/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971504] Re: Multiple vulnerabilities in Bionic, Focal, Impish, Jammy and Kinetic
Hello Luis, did you manage to test the bionic package? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971504 Title: Multiple vulnerabilities in Bionic, Focal, Impish, Jammy and Kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/varnish/+bug/1971504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1973054] Re: containerd regression for CVE-2022-23648 in latest version 1.5.9-0ubuntu1~20.04.1
** Changed in: containerd (Ubuntu) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: containerd (Ubuntu Focal) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: containerd (Ubuntu Impish) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1973054 Title: containerd regression for CVE-2022-23648 in latest version 1.5.9-0ubuntu1~20.04.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/containerd/+bug/1973054/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1971504] Re: Multiple vulnerabilities in Bionic, Focal, Impish, Jammy and Kinetic
Hello Luís, thanks for the debdiffs. I've changed the changelog a little bit in order to follow the security format and fit the patches into the DEP-3 guidelines (some of them were missing some header elements). I uploaded the packages into our security-proposed ppa and, if possible, please test using them. My plan is to push to archive next week. The link for the ppa is: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1971504 Title: Multiple vulnerabilities in Bionic, Focal, Impish, Jammy and Kinetic To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/varnish/+bug/1971504/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915911] Re: Tomcat9 package is old version with many security issues
Hello Evren, hmm I just published both bionic (9.0.16-3ubuntu0.18.04.2) and focal (9.0.31-1ubuntu0.2). I finished some tests yesterday. Foi bionic I had to do some changes and add an extra commit to support one of fixes. ** Changed in: tomcat9 (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1915911 Title: Tomcat9 package is old version with many security issues To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1915911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915911] Re: Tomcat9 package is old version with many security issues
Hello Evren, thanks for the debdiff. I'm using it to build the new release for Focal. I did some checks today and will continue on Monday. If all goes well I think we can have a new package in the archive next week. Meanwhile, I'm working on the bionic version. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1915911 Title: Tomcat9 package is old version with many security issues To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1915911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1915911] Re: Tomcat9 package is old version with many security issues
** Changed in: tomcat9 (Ubuntu) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1915911 Title: Tomcat9 package is old version with many security issues To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/tomcat9/+bug/1915911/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1961418] Re: snap failed to run with '/usr/bin/snap wait system seed.loaded'
What snapd version are you using? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1961418 Title: snap failed to run with '/usr/bin/snap wait system seed.loaded' To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/snapd/+bug/1961418/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1957106] Re: wif disconnected
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1957106 Title: wif disconnected To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1957106/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958786] Re: CRASH - [drm:amd gpu_cs_ioctl [amdgpu]] *ERROR* Failed to initialize parser -125!
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958786 Title: CRASH - [drm:amd gpu_cs_ioctl [amdgpu]] *ERROR* Failed to initialize parser -125! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1958786/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1958647] Re: no idia
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1958647 Title: no idia To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1958647/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959479] Re: frezzing up
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959479 Title: frezzing up To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1959479/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1959494] Re: touchpad stopped working hp envy dv6 laptop
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959494 Title: touchpad stopped working hp envy dv6 laptop To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-signed-hwe-5.13/+bug/1959494/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1960001] Re: indija
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1960001 Title: indija To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1960001/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1950193] Re: libqt5svg5 affected by CVE-2021-38593
Thanks! I didn't add the LP number because it was in the previous changelog entry. It seems that it needs to be in the latest one in order to identify it correctly. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1950193 Title: libqt5svg5 affected by CVE-2021-38593 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1950193/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1950193] Re: libqt5svg5 affected by CVE-2021-38593
I've just published focal and impish updates into the -security pocket. focal: 5.12.8+dfsg-0ubuntu2.1 impish: 5.15.2+dfsg-12ubuntu1.1 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1950193 Title: libqt5svg5 affected by CVE-2021-38593 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1950193/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1950193] Re: libqt5svg5 affected by CVE-2021-38593
Hello, I'm doing build for the -security pocket as Marc suggested. Will be published soon. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1950193 Title: libqt5svg5 affected by CVE-2021-38593 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1950193/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1939188] Re: CVE-2021-2389 & CVE-2021-2372 affect MariaDB in Ubuntu
Both 10.3 (focal) and 10.5 (hirsute) updates were released yesterday https://ubuntu.com/security/notices/USN-5022-2 ** Changed in: mariadb-10.5 (Ubuntu) Importance: Undecided => Medium ** Changed in: mariadb-10.5 (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939188 Title: CVE-2021-2389 & CVE-2021-2372 affect MariaDB in Ubuntu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mariadb-10.5/+bug/1939188/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1939188] Re: CVE-2021-2389 & CVE-2021-2372 affect MariaDB in Ubuntu
** Changed in: mariadb-10.5 (Ubuntu) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939188 Title: CVE-2021-2389 & CVE-2021-2372 affect MariaDB in Ubuntu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mariadb-10.5/+bug/1939188/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1934941] Re: Xorg freeze
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1934941 Title: Xorg freeze To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1934941/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1938053] Re: HDMI Problem
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1938053 Title: HDMI Problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1938053/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1938249] Re: Xorg freeze
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1938249 Title: Xorg freeze To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1938249/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1931303] Re: Thinkpad T14 AMD Gen1 fresh installation bug
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931303 Title: Thinkpad T14 AMD Gen1 fresh installation bug To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1931303/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1925985] Re: CVE-2021-22204
Hello Hugo, Thanks for the help! I've published your backport for bionic, focal, groovy, and hirsute. The changelog was a little different to be in the format that we use. About the version number, we use major numbers (like ubuntu1) when is a devel release otherwise we increment the minor number (like I did, ubuntu0.1). Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1925985 Title: CVE-2021-22204 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libimage-exiftool-perl/+bug/1925985/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1925985] Re: CVE-2021-22204
** Also affects: libimage-exiftool-perl (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: libimage-exiftool-perl (Ubuntu Groovy) Importance: Undecided Status: New ** Also affects: libimage-exiftool-perl (Ubuntu Hirsute) Importance: Undecided Status: New ** Also affects: libimage-exiftool-perl (Ubuntu Focal) Importance: Undecided Status: New ** Changed in: libimage-exiftool-perl (Ubuntu) Status: Fix Released => In Progress ** Changed in: libimage-exiftool-perl (Ubuntu Bionic) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: libimage-exiftool-perl (Ubuntu Hirsute) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: libimage-exiftool-perl (Ubuntu Focal) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: libimage-exiftool-perl (Ubuntu Groovy) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1925985 Title: CVE-2021-22204 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libimage-exiftool-perl/+bug/1925985/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911473] Re: Update for ghsa-4ppf-fxf6-vxg2
@Andrew, hello. Focal and Groovy with your backports are fine and ready to go. I still resistant about Bionic since I couldn't import the tests. I'll try to manually test it a little more tomorrow and if everything goes well I'll publish it on Monday. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911473 Title: Update for ghsa-4ppf-fxf6-vxg2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1911473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911473] Re: Update for ghsa-4ppf-fxf6-vxg2
Thanks. I managed to backport version 1.2 to bionic (1.0.9). I had to exclude the tests because the framework is very different between both versions. I'll test in on Monday. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911473 Title: Update for ghsa-4ppf-fxf6-vxg2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1911473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911473] Re: Update for ghsa-4ppf-fxf6-vxg2
Just a heads up. Your focal backport seems fine, no problems there. I'm working on the bionic version but, since it's based on 1.0.9, it's not straightforward. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911473 Title: Update for ghsa-4ppf-fxf6-vxg2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1911473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911473] Re: Placeholder for ghsa-4ppf-fxf6-vxg2
Ok thanks. I've tried to backport all commits with "Part-of: GHSA-4ppf- fxf6-vxg2" for hirsute but it fails to build. More commits are required in order to work. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911473 Title: Placeholder for ghsa-4ppf-fxf6-vxg2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1911473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1911473] Re: Placeholder for ghsa-4ppf-fxf6-vxg2
Hello Andrew, it seems that there is no CVE assigned to it, right? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911473 Title: Placeholder for ghsa-4ppf-fxf6-vxg2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1911473/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1906968] Re: install crashed
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1906968 Title: install crashed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1906968/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1907744] Re: package unattended-upgrades 2.3ubuntu0.1 failed to install/upgrade: installed unattended-upgrades package post-installation script subprocess was killed by signal (Aborted)
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1907744 Title: package unattended-upgrades 2.3ubuntu0.1 failed to install/upgrade: installed unattended-upgrades package post-installation script subprocess was killed by signal (Aborted) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/unattended-upgrades/+bug/1907744/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909338] Re: package virtualbox-guest-dkms 5.2.42-dfsg-0~ubuntu1.18.04.1 failed to install/upgrade: installed virtualbox-guest-dkms package post-installation script subprocess returned error exit
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909338 Title: package virtualbox-guest-dkms 5.2.42-dfsg-0~ubuntu1.18.04.1 failed to install/upgrade: installed virtualbox-guest-dkms package post- installation script subprocess returned error exit status 10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1909338/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909364] Re: Please Help My Package Is Correct and crashed
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909364 Title: Please Help My Package Is Correct and crashed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/1909364/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909512] Re: its suddenly stop instaling ubuntu
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909512 Title: its suddenly stop instaling ubuntu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1909512/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909621] Re: my gnome control center is not opeaning and working
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909621 Title: my gnome control center is not opeaning and working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1909621/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909765] Re: package grub-efi-amd64-signed 1.155.1+2.04-1ubuntu35.1 failed to install/upgrade: o subprocesso instalado, do pacote grub-efi-amd64-signed, o script post-installation retornou erro d
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909765 Title: package grub-efi-amd64-signed 1.155.1+2.04-1ubuntu35.1 failed to install/upgrade: o subprocesso instalado, do pacote grub-efi- amd64-signed, o script post-installation retornou erro do status de saída 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2-signed/+bug/1909765/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909845] Re: TouchPad Not Working
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909845 Title: TouchPad Not Working To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1909845/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909896] Re: package virtualbox-ext-pack 6.1.14-2 failed to install/upgrade: installed virtualbox-ext-pack package post-installation script subprocess returned error exit status 1
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909896 Title: package virtualbox-ext-pack 6.1.14-2 failed to install/upgrade: installed virtualbox-ext-pack package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/virtualbox-ext-pack/+bug/1909896/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1909901] Re: PCI/internal sound card not detected
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1909901 Title: PCI/internal sound card not detected To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1909901/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1910295] Re: package nvidia-dkms-390 (not installed) failed to install/upgrade: el subproceso instalado paquete nvidia-dkms-390 script post-installation devolvió el código de salida de error 10
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910295 Title: package nvidia-dkms-390 (not installed) failed to install/upgrade: el subproceso instalado paquete nvidia-dkms-390 script post-installation devolvió el código de salida de error 10 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/1910295/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1910449] Re: package nvidia-dkms-390 390.138-0ubuntu0.20.04.1 failed to install/upgrade: nvidia-dkms-390 paketi post-installation betiği kuruldu alt süreci 10 hatalı çıkış kodu ile sona erdi
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1910449 Title: package nvidia-dkms-390 390.138-0ubuntu0.20.04.1 failed to install/upgrade: nvidia-dkms-390 paketi post-installation betiği kuruldu alt süreci 10 hatalı çıkış kodu ile sona erdi To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/1910449/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1907322] Re: Fatal error-file could'nt be installed
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1907322 Title: Fatal error-file could'nt be installed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1907322/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1870876] Re: docker stopped when containerd updated
*** This bug is a duplicate of bug 1870514 *** https://bugs.launchpad.net/bugs/1870514 For the record, running "apt install --reinstall containerd" is enough to reproduce it. It seems fine after restarting it. Investigating... root@sec-bionic-amd64:~# systemctl status docker ● docker.service - Docker Application Container Engine Loaded: loaded (/lib/systemd/system/docker.service; disabled; vendor preset: enabled) Active: inactive (dead) since Tue 2020-12-01 16:00:41 UTC; 7min ago Docs: https://docs.docker.com Process: 4877 ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock (code=exited, status=0/SUCCES Main PID: 4877 (code=exited, status=0/SUCCESS) Dec 01 15:59:29 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T15:59:29.713508745Z" level=info msg="Default bridge (docker0) Dec 01 15:59:29 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T15:59:29.736687490Z" level=info msg="Loading containers: done Dec 01 15:59:29 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T15:59:29.757566608Z" level=info msg="Docker daemon" commit=36 Dec 01 15:59:29 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T15:59:29.757781776Z" level=info msg="Daemon has completed ini Dec 01 15:59:29 sec-bionic-amd64 systemd[1]: Started Docker Application Container Engine. Dec 01 15:59:29 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T15:59:29.773817892Z" level=info msg="API listen on /var/run/d Dec 01 16:00:41 sec-bionic-amd64 systemd[1]: Stopping Docker Application Container Engine... Dec 01 16:00:41 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T16:00:41.297477601Z" level=info msg="Processing signal 'termi Dec 01 16:00:41 sec-bionic-amd64 dockerd[4877]: time="2020-12-01T16:00:41.297999367Z" level=info msg="Daemon shutdown complete Dec 01 16:00:41 sec-bionic-amd64 systemd[1]: Stopped Docker Application Container Engine. root@sec-bionic-amd64:~# sudo systemctl restart docker root@sec-bionic-amd64:~# sudo systemctl status docker ● docker.service - Docker Application Container Engine Loaded: loaded (/lib/systemd/system/docker.service; disabled; vendor preset: enabled) Active: active (running) since Tue 2020-12-01 16:07:49 UTC; 889ms ago Docs: https://docs.docker.com Main PID: 5246 (dockerd) Tasks: 8 CGroup: /system.slice/docker.service └─5246 /usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.423538001Z" level=warning msg="Your kernel does not Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.423617408Z" level=warning msg="Your kernel does not Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.423689794Z" level=warning msg="Your kernel does not Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.423861920Z" level=info msg="Loading containers: star Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.474290225Z" level=info msg="Default bridge (docker0) Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.495593769Z" level=info msg="Loading containers: done Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.516250280Z" level=info msg="Docker daemon" commit=36 Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.516470764Z" level=info msg="Daemon has completed ini Dec 01 16:07:49 sec-bionic-amd64 systemd[1]: Started Docker Application Container Engine. Dec 01 16:07:49 sec-bionic-amd64 dockerd[5246]: time="2020-12-01T16:07:49.536722771Z" level=info msg="API listen on /var/run/d root@sec-bionic-amd64:~# root@sec-bionic-amd64:~# apt install --reinstall containerd Reading package lists... Done Building dependency tree Reading state information... Done The following packages were automatically installed and are no longer required: linux-headers-5.4.0-42-generic linux-hwe-5.4-headers-5.4.0-42 linux-image-5.4.0-42-generic linux-modules-5.4.0-42-generic linux-modules-extra-5.4.0-42-generic Use 'sudo apt autoremove' to remove them. 0 upgraded, 0 newly installed, 1 reinstalled, 0 to remove and 0 not upgraded. Need to get 0 B/21.7 MB of archives. After this operation, 0 B of additional disk space will be used. (Reading database ... 209664 files and directories currently installed.) Preparing to unpack .../containerd_1.3.3-0ubuntu1~18.04.3_amd64.deb ... Unpacking containerd (1.3.3-0ubuntu1~18.04.3) over (1.3.3-0ubuntu1~18.04.3) ... Setting up containerd (1.3.3-0ubuntu1~18.04.3) ... Processing triggers for man-db (2.8.3-2ubuntu0.1) ... root@sec-bionic-amd64:~# systemctl status docker ● docker.service - Docker Application Container Engine Loaded: loaded (/lib/systemd/system/docker.service; disabled; vendor preset: enabled) Active: inactive (dead) since Tue 2020-12-01 16:08:01 UTC; 6s ago Docs: https://docs.docker.com Main PID: 5246 (code=exited, status=0/SUCCESS) Dec 01 16:07:49
[Bug 1883702] Re: [Satellite P55W-C, Realtek ALC233, Mic, Internal] Recording problem
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883702 Title: [Satellite P55W-C, Realtek ALC233, Mic, Internal] Recording problem To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1883702/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1883454] Re: Java swing on repl.it doesn't load the GUI but the code works flawlessly
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1883454 Title: Java swing on repl.it doesn't load the GUI but the code works flawlessly To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/openjdk-lts/+bug/1883454/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1866065] [NEW] weechat can't load python plugins (undefined symbol: _Py_NoneStruct)
Public bug reported: I updated to focal this week and weechat fails to load python plugins. It shows the following message: Error: unable to load plugin "/usr/lib/x86_64-linux-gnu/weechat/plugins/python.so": /usr/lib/x86_64-linux-gnu/weechat/plugins/python.so: undefined symbol: _Py_NoneStruct There was an update yesterday but it doesn't fixed this problem. ** Affects: weechat (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1866065 Title: weechat can't load python plugins (undefined symbol: _Py_NoneStruct) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/weechat/+bug/1866065/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1843403] Re: [MIR] nfs-ganesha, ntirpc
I reviewed nfs-ganesha 3.0.3-0ubuntu1 as checked into focal. This shouldn't be considered a full audit but rather a quick gauge of maintainability. nfs-ganesha is an user-mode file server for NFS v3, 4.0, 4.1, 4.1 pNFS, and 4.2; and for 9P from the Plan9 operating system. It provides a FUSE-compatible File System Abstraction Layer(FSAL) to allow the file-system developers to plug in their own storage mechanism and access it from any NFS client. - No CVE History found. - It has Build-Depends for some libraries. Most relevant one is kerberos that provides integrity (krb5i) or integrity and encryption (krb5p). - There aren't pre/post inst/rm scripts. - It has three systemd units: - nfs-ganesha-config.service: For configuration - nfs-ganesha.service: The main service - nfs-ganesha-lock.service: File locking (the main service needs it) - It has a dbus service called org.ganesha.nfsd and the following interfaces: - org.freedesktop.DBus.Introspectable: returns an xml data string that describes all of the other interfaces and their methods for the particular object path. Every object path in NFS Ganesha's server provides this interface. - org.freedesktop.DBus.Properties: This interface is for setting and retrieving key/value pairs of properties. NFS Ganesha currently does not supply this interface yet. - org.ganesha.nfsd.admin: Used to administer the server itself. - org.ganesha.nfsd.CBSIM: Only for development. It's a callback simulator. - No setuid binaries found. - Relevant binaries: - usr/bin/ganesha.nfsd - usr/lib/x86_64-linux-gnu/libganesha_nfsd.so.3.0 - No sudo fragments found. - No udev rules found. - It has ad-hoc tests (src/test) and Google G-Test framework tests (src/gtest). - The tests seems basic. There are more realistic tests using network that can be done by using extra tools. - No cron job found. - Build logs: - There are some warnings during the build. Nothing relevant found. - Lintian failed because of "shlib-in-multi-arch-foreign-package" which means: "The package is marked as Multi-Arch: foreign, but it includes a shared library in a public library directory." - Memory management seems ok. - File IO is intensive depending on the usage. Nothing to worry was found by looking the code and coverity results. - Logging seems safe. - Use privileged functions not found. - There is a use of cryptography when used with kerberos. - Temporary file handling uses mkstemp but it seems safe. - Use of networking seems fine. Addresses and inputs are sanitized before the use. - No use of WebKit or PolicyKit found. - All errors found in cppcheck are "Uninitialized variable" ones. Nothing to worry. - Coverity found use-after-free, out-of-bound accesses and other issues. The issues were analysed and they were not considered showstoppers to get the project in main. Security team ACK for promoting nfs-ganesha to main. Still pending ntirpc analysis. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1843403 Title: [MIR] nfs-ganesha, ntirpc To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nfs-ganesha/+bug/1843403/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1861923] Re: install error
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1861923 Title: install error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1861923/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862459] Re: ubuntu 18 screen flicker/blink
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862459 Title: ubuntu 18 screen flicker/blink To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1862459/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862476] Re: Bug install grub in /dev/sda
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862476 Title: Bug install grub in /dev/sda To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1862476/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862553] Re: gnome-control-center crashed with SIGSEGV in cc_panel_get_title_widget()
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862553 Title: gnome-control-center crashed with SIGSEGV in cc_panel_get_title_widget() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1862553/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862658] Re: el applet meteorológico falla al cerrar sesión
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862658 Title: el applet meteorológico falla al cerrar sesión To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/1862658/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862521] Re: nvidia-kernel-source-390 390.116-0ubuntu0.18.04.3: nvidia kernel module failed to build
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862521 Title: nvidia-kernel-source-390 390.116-0ubuntu0.18.04.3: nvidia kernel module failed to build To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/1862521/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862530] Re: package mariadb-common 1:10.3.22-0ubuntu0.19.10.1 failed to install/upgrade: o subprocesso instalado, do pacote mariadb-common, o script post-installation retornou erro do status de
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862530 Title: package mariadb-common 1:10.3.22-0ubuntu0.19.10.1 failed to install/upgrade: o subprocesso instalado, do pacote mariadb-common, o script post-installation retornou erro do status de saída 2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mariadb-10.3/+bug/1862530/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1862586] Re: Grub is not getting installed
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1862586 Title: Grub is not getting installed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1862586/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863049] Re: plz rectify this bugs
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863049 Title: plz rectify this bugs To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1863049/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1863050] Re: package nvidia-340 (not installed) failed to install/upgrade: a tentar sobre-escrever '/lib/udev/rules.d/71-nvidia.rules', que também está no pacote nvidia-kernel-common-390 390.132-
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1863050 Title: package nvidia-340 (not installed) failed to install/upgrade: a tentar sobre-escrever '/lib/udev/rules.d/71-nvidia.rules', que também está no pacote nvidia-kernel-common-390 390.132-0ubuntu2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-340/+bug/1863050/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1790856] Re: [MIR] pmdk
I reviewed pmdk 1.7-1ubuntu1 as checked into focal. This shouldn't be considered a full audit but rather a quick gauge of maintainability. pmdk comes from Persistent Memory Development Kit and it's a collection of libraries and tool which allows applications to access persistent memory as memory-mapped files. - No CVEs found. - No encryption dependency in particular. - No pre/post inst/rm scripts - No init scripts. - No systemd units. - No dbus services. - No setuid binaries. - binaries in PATH: - ./usr/bin/daxio (pmdk-tools) - ./usr/bin/pmempool (pmdk-tools) - ./usr/bin/rpmemd (pmdk-tools) - No sudo fragments found. - No udev rules. - 262 unit tests present. - No autopkgtests. - No cronjobs. - Build logs - Minor warnings during the build: - install: WARNING: ignoring --strip-program option as -s option was not specified - dpkg-gencontrol: warning: Depends field of package libpmemlog-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libvmmalloc-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libvmem-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libpmemblk-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libpmem-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package librpmem-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libpmempool-dev: substitution variable ${shlibs:Depends} used, but is not defined - dpkg-gencontrol: warning: Depends field of package libpmemobj-dev: substitution variable ${shlibs:Depends} used, but is not defined - No relevant process spawning found. - Memory management seems to be done properly. The project have its own implementation of memcpy and memset to be used by the user. No problems found on this part. - No issues with log found. - Those environment variable were found: - NON_PMEM_FS_DIR - PMEM_FS_DIR - PMEM_IS_PMEM_FORCE - PMEM_MMAP_HINT - PMEM_MOVNT_THRESHOLD - PMEM_NO_CLFLUSHOPT - PMEM_NO_CLWB - PMEM_NO_FLUSH - PMEM_NO_MOVNT - PMREORDER_EMIT_LOG - PMREORDER_MARKER_NAME - RPMEM_CMD - RPMEM_ENABLE_SOCKETS - RPMEM_ENABLE_VERBS - RPMEM_MAX_NLANES - RPMEM_SSH - RPMEM_WORK_QUEUE_SIZE - VMMALLOC_FORK - VMMALLOC_POOL_DIR - VMMALLOC_POOL_SIZE - No use of privileged functions. - No use of cryptography. - Use of temp files looks safe. Most of them for tests. - No use of networking. - No use of WebKit. - No use of PolicyKit. - cppcheck shows multiple uninitialized variable cases. Nothing concerning. No serious issues found in coverity results. Upstream also has a coverity instance and they do a good job tracking and fixing the found issues. Most of the issues are in examples and tests. Security team ACK for promoting pmdk to main only for amd64 since arm 64-bit is experimental. Also keep librpmem* packages in universal since they are experimental too (doc/README). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1790856 Title: [MIR] pmdk To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pmdk/+bug/1790856/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1854373] Re: CVE affecting phpMyAdmin 4.x
Hello it0001, I did the triage and updated the link you referred to in comment #7. This page is updated daily so you're only going to see the new status, not-affected, tomorrow. As I said, only focal was affected but it's already fixed. Trusty, xenial, bionic, and disco are not affected, the code is not present. All of them uses a version before 4.7.7 (as William said in the comment #9). I really appreciate your concern. Please let me know if I missed some point in our discussion. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1854373 Title: CVE affecting phpMyAdmin 4.x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/phpmyadmin/+bug/1854373/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1854373] Re: CVE affecting phpMyAdmin 4.x
Hello it0001, PMASA-2019-5 points to commit 4ba7d2fac6f384. Both afected files (move.js and database_tables.twig) are only present in focal and the last release (4:4.9.2+dfsg1-1) fixed the issue. Can you clarify why the releases are affected? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1854373 Title: CVE affecting phpMyAdmin 4.x To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/phpmyadmin/+bug/1854373/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853063] Re: SQL injection and Persistent XSS in textile formatting
Hi Lucas, I published the new version with the fix. Thanks. I made two modifications in the changelog. The first was the version. Security update uses minor version naming, so 0.1, not 1. In this update I ended up using 0.2 because I made a mistake and had to upload the source again so I burned 0.1. Other change was to add the LP number to it so launchpad tracks it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853063 Title: SQL injection and Persistent XSS in textile formatting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/redmine/+bug/1853063/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853063] Re: SQL injection and Persistent XSS in textile formatting
I just marked precise and trusty as invalid since they are out of standard support. Xenial version will be uploaded soon. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853063 Title: SQL injection and Persistent XSS in textile formatting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/redmine/+bug/1853063/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853063] Re: SQL injection and Persistent XSS in textile formatting
** Changed in: redmine (Ubuntu Precise) Status: New => Invalid ** Changed in: redmine (Ubuntu Trusty) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853063 Title: SQL injection and Persistent XSS in textile formatting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/redmine/+bug/1853063/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1853063] Re: SQL injection and Persistent XSS in textile formatting
** Changed in: redmine (Ubuntu) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: redmine (Ubuntu Trusty) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: redmine (Ubuntu Xenial) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1853063 Title: SQL injection and Persistent XSS in textile formatting To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/redmine/+bug/1853063/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852566] Re: [OptiPlex 3050, Intel ID 280b, Digital Out, HDMI] No sound at all
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852566 Title: [OptiPlex 3050, Intel ID 280b, Digital Out, HDMI] No sound at all To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/alsa-driver/+bug/1852566/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852525] Re: package oca-core 11.0.20180730-1 failed to install/upgrade: installed oca-core package post-installation script subprocess returned error exit status 1
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852525 Title: package oca-core 11.0.20180730-1 failed to install/upgrade: installed oca-core package post-installation script subprocess returned error exit status 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oca-core/+bug/1852525/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852574] Re: oggvideotools heap overflow
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852574 Title: oggvideotools heap overflow To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/oggvideotools/+bug/1852574/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852109] Re: CVE-2019-2974: MariaDB & MySQL
** Changed in: mariadb-10.1 (Ubuntu) Assignee: Otto Kekäläinen (otto) => Paulo Flabiano Smorigo (pfsmorigo) ** Changed in: mariadb-10.3 (Ubuntu) Assignee: Otto Kekäläinen (otto) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852109 Title: CVE-2019-2974: MariaDB & MySQL To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/mariadb-10.1/+bug/1852109/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1851887] Re: Sound only works works again if the volume is raised more than 50%
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1851887 Title: Sound only works works again if the volume is raised more than 50% To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/1851887/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852173] Re: GUI applications with root access don't open
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852173 Title: GUI applications with root access don't open To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-shell-extension-appindicator/+bug/1852173/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1852129] Re: package sendmail 8.15.2-13 failed to install/upgrade: problemas de dependencias - se deja sin configurar
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1852129 Title: package sendmail 8.15.2-13 failed to install/upgrade: problemas de dependencias - se deja sin configurar To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/sendmail/+bug/1852129/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844587] Re: weather applet crashes on logout
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844587 Title: weather applet crashes on logout To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/1844587/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844486] Re: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1
*** This bug is a duplicate of bug 1844487 *** https://bugs.launchpad.net/bugs/1844487 Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** This bug has been marked a duplicate of bug 1844487 package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844486 Title: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous- processus script post-installation installé a retourné une erreur de sortie d'état 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/1844486/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844487] Re: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross privilege boundaries nor directly cause loss of data/privacy. Please feel free to report any other bugs you may find. ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844487 Title: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous- processus script post-installation installé a retourné une erreur de sortie d'état 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/1844487/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1844485] Re: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1
*** This bug is a duplicate of bug 1844487 *** https://bugs.launchpad.net/bugs/1844487 ** This bug has been marked a duplicate of bug 1844487 package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus script post-installation installé a retourné une erreur de sortie d'état 1 ** Information type changed from Private Security to Public -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1844485 Title: package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous- processus script post-installation installé a retourné une erreur de sortie d'état 1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/ssmtp/+bug/1844485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1832163] Re: Me acaban de dar BANNN SIN NINGUNA RAZON POR QUE ESTABA JUGANDO SKYWAR Y DE REPENDE ME DIERON BAN Llevo 3 años sin jugar me meto a un servidor a recordad los viejos tiempo y me dan b
** Changed in: apache2 (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1832163 Title: Me acaban de dar BANNN SIN NINGUNA RAZON POR QUE ESTABA JUGANDO SKYWAR Y DE REPENDE ME DIERON BAN Llevo 3 años sin jugar me meto a un servidor a recordad los viejos tiempo y me dan ban! Me gustaria que me lo quitaran y Andemas no entendi por que EL THANOS ME DIO BAN AHH YA VEO ACABO DE LEER DICE QUE USO HACK!! MIRA RIDUCULO YO NO TENGO HACCK ! quitenle el ban a mi personaje que no hice nada malo jugue legal me llamo izzuzzu To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/1832163/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1821811] Re: New upstream microrelease flatpak 1.0.8
Hello Andrew, can you check/test if the packages bellow are working properly? https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=flatpak -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821811 Title: New upstream microrelease flatpak 1.0.8 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/1821811/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1821760] Re: CVE-2019-9917 - Invalid encoding crash
** Changed in: znc (Ubuntu Disco) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1821760 Title: CVE-2019-9917 - Invalid encoding crash To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/znc/+bug/1821760/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1814895] Re: display blinking and showing content of screen on sleep mode
*** This bug is a duplicate of bug 1570053 *** https://bugs.launchpad.net/bugs/1570053 ** This bug has been marked a duplicate of bug 1570053 Screen content is fully visible after unlocking screen -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1814895 Title: display blinking and showing content of screen on sleep mode To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/1814895/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1814935] Re: Screen not locked when coming out of suspend/hibernate - Dock bar is visible
*** This bug is a duplicate of bug 1769383 *** https://bugs.launchpad.net/bugs/1769383 ** This bug has been marked a duplicate of bug 1769383 Ubuntu dock/launcher is shown on the lock screen -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1814935 Title: Screen not locked when coming out of suspend/hibernate - Dock bar is visible To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-screensaver/+bug/1814935/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1815589] Re: launchbar allowing actions while os is locked
*** This bug is a duplicate of bug 1769383 *** https://bugs.launchpad.net/bugs/1769383 ** This bug has been marked a duplicate of bug 1769383 Ubuntu dock/launcher is shown on the lock screen ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1815589 Title: launchbar allowing actions while os is locked To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+bug/1815589/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1815298] Re: Screen locking security issue when session is resumed
*** This bug is a duplicate of bug 1570053 *** https://bugs.launchpad.net/bugs/1570053 ** This bug has been marked a duplicate of bug 1570053 Screen content is fully visible after unlocking screen ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1815298 Title: Screen locking security issue when session is resumed To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnome-screensaver/+bug/1815298/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1811122] Re: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1
New version with the fix (0.6.1-2ubuntu0.3): https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=xrdp Please, use this new package and let me know if it's working fine. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1811122 Title: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1811122/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1811122] Re: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1
Yes, I hit the error when I was doing the trusty version. It works if you install the original version and then this version. It's trick. I'm working on it. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1811122 Title: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1811122/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1811122] Re: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1
I fixed the issue in 0.6.1-2ubuntu0.2 that can be downloaded in the link bellow: https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa /+delete- packages?field.name_filter=xrdp_filter=published_filter= Please, test this new package and let me know it's working properly. ** Changed in: xrdp (Ubuntu) Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1811122 Title: Cannot use xrdp to login to sesman-Xvnc after 0.6.1-2ubuntu0.1 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/xrdp/+bug/1811122/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs