Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This was fixed in libav/precise in
https://bugs.launchpad.net/ubuntu/+source/libav/+bug/980963 , closing
that task.
** Changed in: libav (Ubuntu Precise)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to oneconf in Ubuntu.
https://bugs.launchpad.net/bugs/1105274
Title:
oneconf-service crashed with signal 5 in g_object_newv()
Status in
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to oneconf in Ubuntu.
https://bugs.launchpad.net/bugs/958035
Title:
oneconf-query crashed with SIGSEGV in PyFunction_New()
Status in
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to oneconf in Ubuntu.
https://bugs.launchpad.net/bugs/1046468
Title:
oneconf-service crashed with OSError in save_json_file_update():
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to oneconf in Ubuntu.
https://bugs.launchpad.net/bugs/1106232
Title:
oneconf-query crashed with dbus.exceptions.DBusException in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Note that your dmesg is full of the following kernel warnings:
[ 58.456045] WARNING: CPU: 0 PID: 897 at
/home/kernel/COD/linux/drivers/gpu/drm/drm_irq.c:1268
drm_wait_one_vblank+0x1b5/0x1c0 [drm]()
[ 58.456046] vblank wait timed out on crtc 0
This may or may not indicate a hardware problem
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to rhythmbox in Ubuntu.
https://bugs.launchpad.net/bugs/1545502
Title:
rhythmbox crashed with SIGSEGV in rhythmdb_entry_cache_metadata()
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for the report. Since the report is public elsewhere, I'm making
this public as well.
** Information type changed from Private Security to Public Security
** Bug watch added: GNOME Bug Tracker #755532
https://bugzilla.gnome.org/show_bug.cgi?id=755532
** Also affects: cogl via
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Also, in order to run apt-get update, you will need to have
administrative privileges, usually gained through the sudo command, like
so:
sudo apt-get update
sudo apt-get upgrade
This should prompt you for your password, if your account is considered
to be an admin on this system.
--
You
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report your issue. In this case, the tools
you're highlighting do not use sudo, but instead use policykit-1 to
verify privileges. In order to require the root password instead of your
user's password to operate those utilities, you'll need to modify your
policykit
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: ghostscript (Ubuntu)
Importance: Undecided => Critical
** Changed in: ghostscript (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ghostscript in
Hi, sorry for the inconvenience. I've prepared fixed packages in the
ubuntu-security-proposed ppa https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/ for all supported releases, though I need
to test them further before publishing. It would be great if people
could confirm that
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
This was fixed upstream in libxslt 1.1.27 (commits
14ee81b06c12743a88fbc1676f3d35a86a74e08e and
aebfee35d1106035dddf897e0e81d72d110b5e63). Marking this bug closed.
** Changed in: libxslt (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a
Ubuntu 14.04 LTS (trusty) has libxslt 1.1.28, which should have
addressed this issue.
Thanks!
** Changed in: libxslt (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to libxslt in Ubuntu.
Public bug reported:
Failed during Ubuntu 14.04 to 16.04 upgrade.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: texlive-latex-base-doc 2015.20160320-1ubuntu0.1
ProcVersionSignature: Ubuntu 4.4.0-93.116-generic 4.4.79
Uname: Linux 4.4.0-93-generic x86_64
ApportVersion:
Public bug reported:
Performing an upgrade from Ubuntu 14.04 to 16.04.
ProblemType: Package
DistroRelease: Ubuntu 16.04
Package: ppp (not installed)
ProcVersionSignature: Ubuntu 4.4.0-93.116-generic 4.4.79
Uname: Linux 4.4.0-93-generic x86_64
ApportVersion: 2.20.1-0ubuntu2.10
Architecture: amd64
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1720419
Title:
ibus-x11 crashed with SIGSEGV in __cxa_finalize()
Status in ibus
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1711870
Title:
Praticamente todas as atualizações apresentaram erro.
Status
Yes, zesty is affected. artful is not affected, as upstream did not
apply the fix for CVE-2017-183 to trunk, due to the introduction of
using libarchive by default. trusty is also not affected, as the mime
types configure processing is handled differently there.
--
You received this bug
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1732120
Title:
i can't login correctly..
Status in xorg package in Ubuntu:
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Package changed: banshee (Ubuntu) => rhythmbox (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to rhythmbox in Ubuntu.
https://bugs.launchpad.net/bugs/1771196
Title:
daap plugin opens port by default
Status in rhythmbox
This was addressed in https://usn.ubuntu.com/usn/usn-3650-1 and in xdg-
utils 1.1.2-1ubuntu3 for cosmic. Thanks for the report!
** Changed in: xdg-utils (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is
Looking at the dmesg log, it seems that the ubuntu image or device
you're installing from is corrupt:
[ 7412.559612] SQUASHFS error: zlib decompression failed, data probably
corrupt
[ 7412.559621] SQUASHFS error: squashfs_read_data failed to read block
0x3b6a61
** Information type changed
Hi,
Thanks for preparing the debiff. However, this issue was addressed in
the interim in USN 3706-1 http://www.ubuntu.com/usn/usn-3706-1 (libjpeg-
turbo 1.3.0-0ubuntu2.1) for trusty.
Thanks again.
** Changed in: libjpeg-turbo (Ubuntu Trusty)
Status: Confirmed => Fix Released
** Changed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hi geez,
Your issue is different, the commit to fix the regression was included in the
upstream ghostscript 9.22 release. As the traceback shows, ghostscript has
deprecated the DELAYBIND command, and inkscape needs to adjust to take that
into account; the bug report for that is
** Bug watch added: Debian Bug tracker #880650
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880650
** Also affects: pstoedit (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880650
Importance: Unknown
Status: Unknown
--
You received this bug notification
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
** This bug is no longer a duplicate of bug 1773820
package nvidia-340 340.106-0ubuntu3 failed to install/upgrade: попытка
перезаписать «/lib/udev/rules.d/71-nvidia.rules», который уже имеется в пакете
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
** This bug is no longer a duplicate of bug 1767116
package nvidia-340 (not installed) failed to install/upgrade: trying to
overwrite '/lib/udev/rules.d/71-nvidia.rules', which is also in package
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
** This bug is no longer a duplicate of bug 1767116
package nvidia-340 (not installed) failed to install/upgrade: trying to
overwrite '/lib/udev/rules.d/71-nvidia.rules', which is also in package
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
** This bug is no longer a duplicate of bug 1767116
package nvidia-340 (not installed) failed to install/upgrade: trying to
overwrite '/lib/udev/rules.d/71-nvidia.rules', which is also in package
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1768499, so it is being marked as such. Please
*** This bug is a duplicate of bug 1768499 ***
https://bugs.launchpad.net/bugs/1768499
** This bug is no longer a duplicate of bug 1767116
package nvidia-340 (not installed) failed to install/upgrade: trying to
overwrite '/lib/udev/rules.d/71-nvidia.rules', which is also in package
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg-server in Ubuntu.
https://bugs.launchpad.net/bugs/1796437
Title:
X11 crashed when attempting to open Budgie Welcome
Status in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1803059
Title:
Nullpointer dereference
Status in evince package in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1803527
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: gnome-desktop3 (Ubuntu Bionic)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-desktop3 in Ubuntu.
https://bugs.launchpad.net/bugs/1807127
Title:
Fixing
For bionic, I've uploaded the gnome-desktop3 package with the fix for
32bit systems to the ubuntu-security-proposed ppa (https://launchpad.net
/~ubuntu-security-proposed/+archive/ubuntu/ppa/) for people to test. Any
feedback would be appreciated.
Thanks!
--
You received this bug notification
** Changed in: bubblewrap (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
** Changed in: gnome-desktop3 (Ubuntu)
Assignee: (unassigned) => Steve Beattie (sbeattie)
--
You received this bug notification because you are a member of Desktop
Packages, which is subs
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1821052
Title:
Unavailable connexion with mobile broadband DW5811e
The linux kernel apport hook is provided by apport directly, so needs to
be fixed there:
$ grep -i Wifi /usr/share/apport/package-hooks/source_linux.py
apport.hookutils.attach_wifi(report)
$ dpkg -S /usr/share/apport/package-hooks/source_linux.py
apport:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1813921
Title:
The ubuntu doesn't work when there is a second monitor and the
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to tracker in Ubuntu.
https://bugs.launchpad.net/bugs/1843083
Title:
tracker-store crashed with SIGSEGV
Status in tracker
** Package changed: gnupg2 (Ubuntu) => seahorse (Ubuntu)
** Changed in: seahorse (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to seahorse in Ubuntu.
https://bugs.launchpad.net/bugs/1841051
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Oh, and I have no crash files in /var/crash/.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/1871538
Title:
dbus timeout-ed during an upgrade, taking services down including gdm
Hi, I had a similar crash this morning upgrading focal, after trying to
get unattended-upgrades to stop spinning on missing focal-security apt
list files. In this case, I don't use gnome-shell as my desktop
environment, but it still tore down my entire desktop environment and
caused gdm3 to
I also hit this again in focal on 2020-06-25, with an update to systemd
245.4-4ubuntu3.1; I had previously updated dbus to 1.12.16-2ubuntu2.1 on
2020-06-17 without event. It's still an issue at least with updates to
systemd in focal.
Similar messages end up in the journal:
Jun 25 13:04:55 kryten
Thanks for the report. From the advisory, this particular issue only
affected Firefox on Windows, so this should be a non-issue on Ubuntu:
"Note: This issue only affected Windows operating systems. Other
operating systems are unaffected."
** Information type changed from Private Security to
Hello,
Thanks for the report. This issue was addressed in
https://ubuntu.com/security/notices/USN-4687-1 .
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-16044
** Information type changed from Private Security to Public Security
--
You received this bug notification because
Hi, it seems that for some reason cracklib has failed to generate
/var/cache/cracklib/cracklib_dict.pwd (or
/var/cache/cracklib/cracklib_dict.pwd.gz).
There is a daily cronjob that is supposed to regenerate
/var/cache/cracklib/cracklib_dict.pwd if the dictionaries it used as
input are newer. I'm
Hi Adam,
Marking public given the public bug reports elsewhere.
It looks like upstream addressed this in network-manager 1.28, which has
not made it into Ubuntu yet.
** Information type changed from Private Security to Public Security
** Changed in: network-manager (Ubuntu)
Status: New
Upstream issue: https://gitlab.gnome.org/GNOME/gnome-autoar/-/issues/7
and associated fix https://gitlab.gnome.org/GNOME/gnome-
autoar/-/commit/adb067e645732fdbe7103516e506d09eb6a54429
Given that this is public upstream, I'm going to open this issue ap as
well.
** Bug watch added:
** Changed in: firefox (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1910518
Title:
Mozilla Firefox / Firefox ESR Arbitrary Code
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
101 - 200 of 234 matches
Mail list logo