Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1748450 ***
https://bugs.launchpad.net/bugs/1748450
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
*** This bug is a duplicate of bug 1763878 ***
https://bugs.launchpad.net/bugs/1763878
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs
*** This bug is a duplicate of bug 1713581 ***
https://bugs.launchpad.net/bugs/1713581
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.lau
*** This bug is a duplicate of bug 1755064 ***
https://bugs.launchpad.net/bugs/1755064
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bu
You can of course use pam_umask(8) on Ubuntu as well if you wish.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-terminal in Ubuntu.
https://bugs.launchpad.net/bugs/1685754
Title:
gnome-terminal unduly forces umask=00
** Also affects: network-manager-openvpn (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to network-manager-openvpn in Ubuntu.
https://bugs.launchpad.net/bugs/1752417
Title:
Out of t
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1759929
Title:
gnome-shell crashed with signal 5
To manage notificat
*** This bug is a duplicate of bug 1444580 ***
https://bugs.launchpad.net/bugs/1444580
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to rhythmbox in Ubuntu.
https://bugs.la
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bugs.launchpad.net/bugs/1759517
Title:
gnome-software crashed with SIGABRT in g_assertion_
I reviewed volume-key version 0.3.9-3 as checked into bionic. This should
not be considered a full security audit but rather a quick gauge of
maintainability.
- No CVEs in our database.
- volume-key's main purpose is to provide some key escrow capabilities for
encrypted storage
- Build-Depends:
The security review is underway. I'm sad that tracking this test case
failure down is as complicated as it is -- the code feels overly-
generic, tracking call chains through to where anything is *done* is
harder than other code bases. Each individual line of code looks fine
but getting a handle on
*** This bug is a duplicate of bug 1748450 ***
https://bugs.launchpad.net/bugs/1748450
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
*** This bug is a duplicate of bug 1756576 ***
https://bugs.launchpad.net/bugs/1756576
** Information type changed from Private Security to Public
** Also affects: bamf (Ubuntu)
Importance: Undecided
Status: New
** Also affects: desktop-file-utils (Ubuntu)
Importance: Undecided
The tests run during the build failed on my machine yet the build did
not fail:
Error creating passphrase-encrypted packet: Unknown error getting encryption
result
FAIL tests/packet_roundtrips.sh (exit status: 1)
Testsu
This line certainly looks suspicious:
source "(%rdi)" (0x2c6e616d656c6f63) not located in a known VMA
That hex represents the ascii string ",cameloc". Does this look
familiar?
Have you filed a bug report upstream yet? If you have, could you paste
the bug url here? Thanks
** Information type cha
*** This bug is a duplicate of bug 1679903 ***
https://bugs.launchpad.net/bugs/1679903
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-keyring in Ubuntu.
https://bug
I wonder if this is related:
mars 13 10:33:52 hostname gnome-software[2180]: Creating pipes for
GWakeup: Too many open files
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscr
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gvfs in Ubuntu.
https://bugs.launchpad.net/bugs/1753528
Title:
gvfsd-mtp assert failure: corrupted double-linked list
To ma
*** This bug is a duplicate of bug 1741119 ***
https://bugs.launchpad.net/bugs/1741119
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bu
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1752168
Title:
Lock screen bypass by disconnecting monitor
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1731420
Title:
gnome-shell hangs (goes into key repeat runaway) when k
*** This bug is a duplicate of bug 1748450 ***
https://bugs.launchpad.net/bugs/1748450
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
*** This bug is a duplicate of bug 1726156 ***
https://bugs.launchpad.net/bugs/1726156
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-disk-utility in Ubuntu.
https://bugs.launchpad.net/bugs/1743510
Title:
gnome-disks crashed with signal 5 in g_closure_
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1743288
Title:
I can't install programms from Ububtu Software...package
Does this still happen on currently-supported releases? Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
https://bugs.launchpad.net/bugs/1741248
Title:
After resume from suspend gdm reveals content from the des
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1740279
Title:
Two keyring login prompts "access prompt want to inh
Antoine, you'll need to add an alias line:
alias /usr/share/icons/ -> /path/to/whatever/
to the /etc/apparmor.d/tunables/alias file
You'll need to reload the profiles; easiest is to reboot.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is
Public bug reported:
Similar to bug 1484027, but that's marked 'Fix released', so something
must have regressed in the meantime.
$ journalctl | grep "Duplicate line" | wc -l
58
$ grep "/var/log " /usr/lib/tmpfiles.d/*
/usr/lib/tmpfiles.d/00rsyslog.conf:# Override systemd's default
tmpfiles.d/va
*** This bug is a duplicate of bug 1720768 ***
https://bugs.launchpad.net/bugs/1720768
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gimp in Ubuntu.
https://bugs.launchpad.net/bugs/1726014
Title:
gimp-2.8 crashed with SIGSEGV in printf_positional()
To mana
*** This bug is a duplicate of bug 1720400 ***
https://bugs.launchpad.net/bugs/1720400
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in Ubuntu.
htt
*** This bug is a duplicate of bug 1505409 ***
https://bugs.launchpad.net/bugs/1505409
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-shell in Ubuntu.
https://bugs.
** Information type changed from Private Security to Public
** Package changed: gnome-screensaver (Ubuntu) => elementaryos
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-screensaver in Ubuntu.
https://bugs.launchpad.net/bugs/17
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in Ubuntu.
https://bugs.launchpad.net/bugs/1717626
Title:
gnome-control-center crashed with SIGSEGV
To
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bugs.launchpad.net/bugs/1717499
Title:
gnome-software crashed with SIGSEGV in gs_app_kv_pr
Are you sure you're using gnome-screensaver and not e.g. lightdm's
locker?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-screensaver in Ubuntu.
https
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 49579 ***
https://bugs.launchpad.net/bugs/49579
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 49579, so it is being marked as such.
This is a fundam
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Even Rouault has been checking in a huge number of fixes for upstream
openjpeg, and he's been remarkably responsive to Agostino Sarubbo's
fuzzing efforts. I suspect the next time I review the openjpeg codebase
I'll find something far more sustainable than the last time around.
Thanks
--
You rece
The dep-3 tags appear to have been overlooked :)
+Origin: ,
etc
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-control-center in Ubuntu.
https://bugs.launchpad.net/bugs/1706421
Title:
Wifi hotspot password is hard
I reviewed gdm3 version 3.24.2-1ubuntu2 as checked into artful. This
should not be considered a full security audit but a quick gauge of
maintainability.
UCT has two CVEs: first, holding esc key allowed bypassing the lock screen.
Second, one REJECTed CVE that was assigned for the usual "desktop vi
Greg, Sebastien, does this look like a duplicate of bug 1685754? It's
tough for me to tell. Of course ~/.profile is only used by some shells,
nothing else, so this may not be a bug at all.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subs
Oh, one more possible confusion -- when a process's parent dies, it is
reparented to pid 1. This guarantees that _some_ process will wait(2) on
every dead child. So seeing 'ppid 1' in a process listing simply means
the process's parent died before you looked for it.
Thanks
--
You received this b
I believe even Gnome on 16.04 LTS is using the upstart user session
rather than system user session. This could be part of why the Gnome bug
discussion seemed to go around in circles.
Other possible sources of confusion:
- ~/.profile and ~/.bashrc are strictly for shells. Nothing else reads
them.
Hi Iain, this has not been forgotten, but keeps being superseded with
other work.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gdm3 in Ubuntu.
https://bugs.launchpad.net/bugs/1686393
Title:
[MIR] gdm3
To manage notificat
*** This bug is a duplicate of bug 1699360 ***
https://bugs.launchpad.net/bugs/1699360
Hello, note that whatever is on sdb is probably dying.
Thanks
** Also affects: debconf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi Troy, note the df output indicates a full /dev filesystem:
udev 1488828 1488828 0 100% /dev
Among my three physical machines, use is 0, 0, and 4K. This is probably
worth investigating.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Deskto
I'm just getting started and thought I'd give some early feedback. There
appears to be a lot more noise in the build logs than usual:
- 88 cases of "deprecation warning"
- chown and chmod errors in the build logs (below)
- lintian error and warning:
E: gdm3 source: missing-build-dependency-for-
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Etienne, the upstream bug comments suggest it may not be limited to just
gnome-terminal. You may have success finding what component / process is
performing the umask() calls via perf or auditd:
$ sudo perf record -e syscalls:sys_enter_umask -ag
-in another terminal change umask-
^C[ perf record
Hello Jerome, it appears there's a WARNING in your kernel logs that may
be useful to track down (unrelated to this) -- could you also run
ubuntu-bug linux and make sure the uploaded logs include:
Apr 21 20:31:20 hostname kernel: r8169 :04:00.0: can't disable ASPM; OS
doesn't have ASPM control
Hello, thanks for the bug report; chances are good this is expected
behaviour and probably better handled via http://askubuntu.com or irc.
If you can reproduce the issue reliably, please report the steps here
and set the status back to New.
Thanks
** Information type changed from Private Security
Hello Jeremy, I had trouble building these packages locally before
uploading. I downloaded new tarballs from
https://download.gnome.org/sources/epiphany/ and renamed them as needed,
applied your debdiffs, and got the following errors when trying to
build:
dpkg-source: info: using source format '3.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
I'm resetting these to Confirmed since it looks to me like Amir may have
accidentally set them to incorrect statuses.
Thanks
** Changed in: initramfs-tools (Ubuntu)
Status: Fix Committed => Confirmed
** Changed in: systemd (Ubuntu)
Status: Fix Released => Confirmed
--
You receive
*** This bug is a duplicate of bug 49579 ***
https://bugs.launchpad.net/bugs/49579
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 49579, so it is being marked as such.
This is a fundam
*** This bug is a duplicate of bug 49579 ***
https://bugs.launchpad.net/bugs/49579
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 49579, so it is being marked as such.
This is a fundam
Hello; if you've enabled automatic login, that's what you get: logged in
automatically. The login password is usually passed through the PAM
stack to the keychain, but because you've selected to bypass the
authentication, the keychain prompts you for the password manually. You
can ignore it or not
gethin, that seems plausibly like it could suffer from the same problems
as #49579 -- if you have a menu open or a virtualbox window to a guest
or similar, the screensaver 'lock' command may not be able to lock the
display.
That's why we recommend using the lock interface in the menus or
keyboard
Note that your Dependencies.txt reports at least one file looks
different than expected:
libgbm1 10.1.3-0ubuntu0.6 [modified: usr/lib/i386-linux-
gnu/libgbm.so.1.0.0]
sudo apt-get install --reinstall libgbm1 would probably be a good idea.
It might not hurt to run sudo debsums -c and see what oth
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Here's the bit from the logs about the looping triggers, this is the
longest chain I recall seeing recently:
dpkg: cycle found while processing triggers:
chain of packages whose triggers are or may be responsible:
gnome-menus -> ca-certificates
packages' pending triggers which are or may be un
Public bug reported:
The following function looks like it will access a 32-bit data element
that is improperly aligned:
void zmq::socket_base_t::monitor_event (int event_, int value_, const
std::string &addr_)
{
if (monitor_socket) {
// Send event in first frame
zmq_msg_t ms
Public bug reported:
Hello, the zmq::mechanism_t::socket_type_string function in
./src/mechanism.cpp appears to have an off-by-one mistake:
const char *zmq::mechanism_t::socket_type_string (int socket_type) const
{
static const char *names [] = {"PAIR", "PUB", "SUB", "REQ", "REP",
Jonathan, have you restarted your session since installing this update?
thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bugs.launchpad.net/bugs/1592382
Title:
Updates are notified even when
*** This bug is a duplicate of bug 1605950 ***
https://bugs.launchpad.net/bugs/1605950
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
** Also affects: unity (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to seahorse in Ubuntu.
https://bugs.launchpa
Please run apport-collect 1590463 to add debugging data for the gnome-
software package to this bug report.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bugs.launchpad.net/bugs/1590463
Titl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Can confirm that adding or removing USB devices makes this insanely more
annoying.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-software in Ubuntu.
https://bugs.launchpad.net/bugs/1580836
Title:
Gnome Software ignor
*** This bug is a duplicate of bug 1579712 ***
https://bugs.launchpad.net/bugs/1579712
** Information type changed from Private Security to Public
** This bug has been marked a duplicate of bug 1579712
Refresh hangs indefinitely, appstreamcli using 100% CPU
--
You received this bug notif
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
CVE-2016-5104 was assigned for this issue:
http://www.openwall.com/lists/oss-security/2016/05/26/6
Thanks
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-5104
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to libi
This probably should go through the security pocket.
https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
Does anyone know if there's already a CVE assigned for this issue?
Thanks
--
You received this bug notification because you are a member of
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
Trying to use evince over X11 forwarding via ssh -X:
$ ssh -X sec-xenial-amd64 evince sp800-38a.pdf
Failed to connect to Mir: Failed to connect to server socket: No such file or
directory
Unable to init server: Could not connect: Connection refused
Cannot parse arguments: Ca
mbp, this looks like a 'garbage pit' style bug report; the original
complaint from two years ago is filed against gnome-screensaver but the
automatically included text reports unity was being used. Comments since
then include complaints about xfce and gnome 3 environments too.
There's no actionabl
Tobias, thanks for the report; after discussion we've decided to not
handle this as a security vulnerability. Mixing root and not-root
applications in one X11 session is a bad idea and this is further
demonstration of the known issues.
It might still be worth reporting upstream -- the Nautilus dev
I've requested CVEs here http://www.openwall.com/lists/oss-
security/2016/02/10/2
It appears this flaw was copy-pasted to a lot of programs.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gtk+2.0 in Ubuntu.
https://bugs.launc
Public bug reported:
I just upgraded my trusty system and the X11 / unity7 screen turned
black for ~200ms twice during the upgrade; it appeared roughly when the
systemd-logind services were stopped and started in this log. Music
playing via youtube in firefox kept playing without issue and the X11
Do you know if this issue has a CVE assigned yet? I didn't see one in
the linked bug reports but those references may not have migrated to
those sources yet.
Thanks
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubunt
Thanks Samy, closing as invalid then. Have fun!
** Changed in: nautilus (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/1509068
Title:
"Ask
Thanks Samy, I assume these lines are the ones you're referring to:
Oct 22 18:30:35 username kernel: DMAR-IR: [Firmware Bug]: ioapic 2 has no
mapping iommu, interrupt remapping will be disabled
Oct 22 18:30:35 username kernel: DMAR-IR: Failed to enable irq remapping. You
are vulnerable to irq-in
Samy, please explain the privilege boundary that is being crossed, I
don't understand how this could be used by an attacker to gain
privileges otherwise unavailable.
Thanks
** Changed in: nautilus (Ubuntu)
Status: New => Incomplete
** Information type changed from Private Security to Publ
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
See also https://bugzilla.gnome.org/show_bug.cgi?id=743298
** Information type changed from Private Security to Public Security
** Bug watch added: GNOME Bug Tracker #743298
https://bugzilla.gnome.org/show_bug.cgi?id=743298
--
You received this bug notification because you are a member of Ub
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Alan, those are some surprising errors. It looks a lot like you've got /
symlinked to /mnt/stoarge0/ or something else similar.
If so, you'd probably be better served with a rule like:
alias / -> /mnt/storage0/,
in the /etc/apparmor.d/tunables/alias file.
Then you could clean up the @{HOME} var
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Desktop Bugs, which is subscribed to gnome-keyring in Ubuntu.
https://bugs.launchpad.net/bugs/1490918
Title:
counting bits is hard
To manage notifications about
101 - 200 of 321 matches
Mail list logo