** Changed in: lightdm (Ubuntu)
Status: New = Confirmed
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1049849
Title:
Remote Login account not confined by guest AppArmor
I'm closing the eclipse task because the update to tzdata and openjdk-7
should have addressed the issue. Please re-open this bug or file a new
one if that's not the case. Thanks!
** Changed in: eclipse (Ubuntu Precise)
Status: Confirmed = Invalid
--
You received this bug notification
Attached is a screenshot. I get here from File - Reinstall Previous
Purchases ...
** Attachment added: connect-error.png
https://bugs.launchpad.net/ubuntu/+source/software-center/+bug/1007109/+attachment/3170853/+files/connect-error.png
--
You received this bug notification because you are
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to software-center in Ubuntu.
https://bugs.launchpad.net/bugs/827023
Title:
piston_get_reviews_helper.py crashed with AttributeError in __main__:
'module'
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to jockey in Ubuntu.
https://bugs.launchpad.net/bugs/819483
Title:
jockey-text crashed with AttributeError in available(): 'Backend'
object has no
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to software-center in Ubuntu.
https://bugs.launchpad.net/bugs/827615
Title:
software-center crashed when double clicking on google chrome stable
.deb file
Attached is a debdiff for this issue and for bug 982619 and bug 1091642
for an SRU for precise. I've confirmed that the package rebuilds
correctly via sbuild and that the result passes the apparmor tests from
lp:qa-regression-testing.
** Patch added: apparmor_2.7.102-0ubuntu3.8.debdiff
*** This bug is a security vulnerability ***
Public security bug reported:
Network Manager starts dnsmasq to provide better performing DNS service
to the end user; however, it starts dnsmasq as user nobody:
$ ps auwwx | grep [d]nsmasq
nobody 993 0.0 0.1 33072 1120 ?S
One of the worst affected by this bug is jjohansen; I suspect copy-and-
waste code may be to blame.
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Assignee: (unassigned) = John Johansen (jjohansen)
** Changed in: linux (Ubuntu)
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for the report! Assigning the task to myself.
** Changed in: empathy (Ubuntu)
Assignee: (unassigned) = Steve Beattie (sbeattie)
** Changed in: empathy (Ubuntu)
Status: New = In Progress
** Changed in: empathy (Ubuntu)
Importance: Undecided = High
--
You received this bug
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-3635
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to empathy in Ubuntu.
https://bugs.launchpad.net/bugs/879301
Title:
HTML injection in nicknames
Status in
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/941086
Title:
nautilus crashed with SIGABRT in __assert_fail_base()
Status in “nautilus” package in
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/929606
Title:
nautilus crashed with SIGSEGV in g_mutex_get_impl()
Status in “nautilus” package in
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
https://bugs.launchpad.net/bugs/944178
Title:
nautilus crashed with SIGSEGV in gtk_box_pack()
Status in “nautilus” package in
Making this report public since the issue is public elsewhere:
https://bugzilla.gnome.org/show_bug.cgi?id=671537
http://www.openwall.com/lists/oss-security/2012/05/04/4
** Visibility changed to: Public
--
You received this bug notification because you are a member of Desktop
Packages,
Hi Robert,
I'm still seeing this in oneiric with the current version in oneiric-
proposed, 1.0.6-0ubuntu1.3. What particular version were you thinking it
would be fixed in?
Thanks.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to
Actually, to clarify, I'm seeing this fill up the log file
/var/log/lightdm/x-0-greeter.log.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/884239
Title:
lightdm writes continously
Public bug reported:
lightdm's shutdown menu option fails silently if a user is logged in
over ssh or via a text tty session. It should probably warn why it
refuses to shut down.
ProblemType: Bug
DistroRelease: Ubuntu 12.04
Package: lightdm 1.1.7-0ubuntu1
ProcVersionSignature: Ubuntu
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/954284
Title:
Shutdown option fails silently if there are users logged in via ssh
Status in “lightdm” package in Ubuntu:
Confirmed
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
** Visibility changed to: Public
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Apparmor 2.9.0 has been released; closing.
** Changed in: ac100
Status: New = Fix Released
** Changed in: apparmor
Status: Fix Committed = Fix Released
** Changed in: network-manager (Ubuntu)
Status: Invalid = Fix Released
** Changed in: network-manager (Ubuntu Saucy)
So it turns out that ld hanging on the backtrace is actually glibc bug
https://sourceware.org/bugzilla/show_bug.cgi?id=16159 getting tickled.
Setting the MALLOC_CHECK_ environment variable causes it not to hang, by
not trying to emit the back trace and deadlocking on reacquiring the
malloc lock:
Unfortunately, the workaround prescribed, adding hardening-wrapper as a
build dependency doesn't always work, and it's not clear why it does
work occasionally. First, in order for hardened-cc to do anything at
all, DEB_BUILD_HARDENING needs to be set, and second, if it detects
'-static' or other
Here's a similar debdiff for e-d-s, confirmed to build on i386.
** Patch added: evolution-data-server_3.10.3-0ubuntu2.debdiff
https://bugs.launchpad.net/ubuntu/+source/binutils/+bug/1266492/+attachment/3961568/+files/evolution-data-server_3.10.3-0ubuntu2.debdiff
--
You received this bug
Here's a patch to glibc to set the default value of MALLOC_CHECK_ to 1
(from 3). By doing so, the malloc specific error passed to
malloc_printerr() will still be displayed by default, but libc will not
attempt to generate a backtrace, which is what is causing the deadlock
to occur. Even if the
The first part of the traceback is a bit of a red herring; it's an
expected exception that is being handled: apport now wants to pass two
arguments to add_info(), but the apparmor hook hasn't been updated to
take into account the added ui argument, so apport falls back to
invoking add_info() with
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-session in Ubuntu.
https://bugs.launchpad.net/bugs/1310003
Title:
The program 'gnome-session-properties' is currently not
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1431073 ***
https://bugs.launchpad.net/bugs/1431073
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to nautilus in Ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 403110 ***
https://bugs.launchpad.net/bugs/403110
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: openssh (Ubuntu) = xorg (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1450871
Title:
xserver crashes ATI AMD Radeon 7700 driver 12.20
Status in xorg
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
The attached debdiff fixes the issue.
** Patch added: akonadi_1.13.0-2ubuntu4.debdiff
https://bugs.launchpad.net/ubuntu/+source/apparmor/+bug/1440501/+attachment/4376471/+files/akonadi_1.13.0-2ubuntu4.debdiff
** Changed in: apparmor (Ubuntu)
Status: Confirmed = Invalid
--
You
Ah, this merge http://bazaar.launchpad.net/~ubuntu-
branches/ubuntu/vivid/akonadi/vivid-proposed/revision/102#debian/rules
disabled the override_dh_installinit: target in debian/rules, preventing
dh-apparmor from generating the postinst script that would create
For some reason, the dh-apparmor hook invocation in the akonadi package
is not causing the postinst script to be created for the akonadi-
backend-mysql package that would create the
/etc/apparmor.d/local/usr.sbin.mysqld-akonadi file on package
installation, despite the dh-apparmor script calling
*** This bug is a duplicate of bug 1422004 ***
https://bugs.launchpad.net/bugs/1422004
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to hplip in Ubuntu.
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1378117
Title:
ibus-ui-gtk3 crashed with signal 5 in _XEventsQueued()
Status in ibus
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ibus in Ubuntu.
https://bugs.launchpad.net/bugs/1379822
Title:
ibus-ui-gtk3 crashed with SIGABRT
Status in ibus package in Ubuntu:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Bah, sorry about that. Thanks for taking the time to report this bug and
helping to make Ubuntu better. We appreciate the difficulties you are
facing, but this appears to be a regular (non-security) bug. I have
unmarked it as a security issue since this bug does not show evidence of
allowing
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1486569 ***
https://bugs.launchpad.net/bugs/1486569
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1486569, so it is being marked as such. Please
*** This bug is a duplicate of bug 1481798 ***
https://bugs.launchpad.net/bugs/1481798
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1481798, so it is being marked as such. Please
*** This bug is a duplicate of bug 1479913 ***
https://bugs.launchpad.net/bugs/1479913
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
*** This bug is a duplicate of bug 1479913 ***
https://bugs.launchpad.net/bugs/1479913
This seems to be the DKMS build problem:
FATAL: modpost: GPL-incompatible module fglrx.ko uses GPL-only symbol
'pci_ignore_hotplug'
** Changed in: fglrx-installer-updates (Ubuntu)
Status: New =
*** This bug is a duplicate of bug 1479913 ***
https://bugs.launchpad.net/bugs/1479913
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1479913, so it is being marked as such. Please
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a regular (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to miniupnpc in Ubuntu.
https://bugs.launchpad.net/bugs/1506017
Title:
TALOS-2015-0035 (CVE-2015-6031)
Status in
Public bug reported:
apport in Ubuntu 15.04 and 15.10 includes in bug reports a file
JournalErrors.txt that is the recorded output of the command 'journalctl
-b --priority warning'. Apport also makes a best effort attempt to
filter out information that bug reporters would like to keep private,
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks, Martin, reviewing these now.
** Changed in: postgresql-9.4 (Ubuntu Vivid)
Assignee: Ubuntu Security Team (ubuntu-security) => Steve Beattie
(sbeattie)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to postgresql-
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
1 - 100 of 234 matches
Mail list logo