I have built packages in the security team proposed PPA for testing.
Additional packages required no-change rebuilds in the -security pocket
also. For Jammy, the additional packages are breeze, libksysguard,
layer-shell-qt, kwin, kwayland-server. For Focal, the additional
packages are kwin and bree
ACK on the debdiffs, packages are building now!
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to plasma-workspace in Ubuntu.
https://bugs.launchpad.net/bugs/2067742
Title:
[SRU] CVE-2024-36041 Fix ksmserver: Unauthorized users can access
** Changed in: kio (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kio in Ubuntu.
https://bugs.launchpad.net/bugs/2046653
Title:
kioslave5 assert failure: *** buffer overflow detected ***: terminate
I have tested the lunar-proposed package (2.4.2-3ubuntu2.3), and after
updating the package, and recreating the printer, it now defaults to
printing in colour when using Okular.
** Tags removed: verification-needed verification-needed-lunar
** Tags added: verification-done verification-done-lunar
Unfortunately the package in -proposed was superseded by a security
update, and will need to be updated again.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to okular in Ubuntu.
https://bugs.launchpad.net/bugs/1971242
Title:
printing PDF ap
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/plasma-workspace/+bug/1989823/+attachment/5616227/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Kubuntu
Bugs, whic
Great, I uploaded a new package to jammy a few minutes ago.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1962862
Title:
usb creator crashes on startup
To manage notifications about this b
usbcreator/misc.py, line 44 probably needs to change from:
return isinstance(obj, collections.Callable)
to
return isinstance(obj, collections.abc.Callable)
I'll install jammy and test it when I get a minute.
--
You received this bug notification because you are a member of Kub
Since there is no actionable item to be sponsored here, unsubscribing
the ubuntu-security-sponsors. If someone adds a new debdiff to this bug,
please subscribe ubuntu-security-sponsors again. Thanks!
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscrib
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: kde4libs (Ubuntu Trusty)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kauth in Ubuntu.
https://bugs.launchpad.net/bugs/1689759
Title:
CVE 2017-8422 - kauth: Local privilege escal
Since there is nothing left to sponsor, I am unsubscribing ubuntu-
security-sponsors. Please re-subscribe the group when attaching another
debdiff. Thanks!
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kdepim in Ubuntu.
https://bugs.launchp
ACK on the debdiffs in comments #9 and #10. Packages are building with a
changelog whitespace and pocket change and will be released as security
updates. Thanks!
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde4libs in Ubuntu.
https://bugs
There was no build log, probably a launchpad failure. I've mashed the
retry button.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde4libs in Ubuntu.
https://bugs.launchpad.net/bugs/1668871
Title:
kio: Information Leak when accessing htt
Subscribing ubuntu-security-sponsors so this gets looked at.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to ark in Ubuntu.
https://bugs.launchpad.net/bugs/1655507
Title:
CVE-2017-5330 - Ark: unintended execution of scripts and executable
** No longer affects: mysql-5.5 (Ubuntu)
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to akonadi in Ubuntu.
https://bugs.launchpad.net/bugs/1633855
Title:
akonadi fails to start after upgrade to yakkety
To manage notifications about this
Lars,
Akonadi is failing because of the new secure_file_priv default location.
Since akonadi doesn't install the full mysql-server-5.5 package, but
only the mysql-server-core-5.5 package, the secure_file_priv directory
isn't created, and mysql won't start.
This was fixed by having Akonadi set the
After installing updated akonadi packages, users may still be required
to remove their ~/.local/share/akonadi/mysql.conf file to get the system
one copied over again.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to akonadi in Ubuntu.
https://
onadi (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: akonadi (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to akonad
Unsubscribing ubuntu-security-sponsors for now since there is nothing to
sponsor. Once a debdiff is attached, please re-subscribe the group.
Thanks!
** Changed in: kcoreaddons (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: kcoreaddons (Ubuntu Precise)
Status: In Progress
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to plasma-workspace in Ubuntu.
https://bugs.launchpad.net/bugs/1554656
Title:
plasma-workspace CVE-2016-2312
To manage notif
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: kio-extras (Ubuntu Precise)
Status: New => Invalid
** Changed in: kio-extras (Ubuntu Trusty)
Status: New => Invalid
** Changed in: kio-extras (Ubuntu Utopic)
Status: New => Invalid
--
You received this bug notification because you are a member of Kubuntu
Bugs
** Changed in: kde-workspace (Ubuntu Vivid)
Status: New => Invalid
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde-workspace in Ubuntu.
https://bugs.launchpad.net/bugs/1389665
Title:
privilage escalation in clock kcontrol
To ma
ACK on the debdiffs. Building now, thanks!
** Changed in: kde4libs (Ubuntu Precise)
Status: New => In Progress
** Changed in: kde4libs (Ubuntu Trusty)
Status: New => In Progress
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to
Looks like libdbusmenu-qt was built against qt 5.2.1, which is still in
-proposed
** Package changed: ubuntu-touch-meta (Ubuntu) => libdbusmenu-qt
(Ubuntu)
** Summary changed:
- ubuntu-sdk can't resolve symbols
+ libdbusmenu-qt can't resolve symbols
--
You received this bug notification becaus
This issue has been rated "low" by the security team, so a fix for this
issue will be bundled in the next security update that contains a
"medium" or higher.
Unsubscribing sponsors for now.
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to kde
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Summary changed:
- inability to QA utterly broke DistUpgradeViewKDE
+ DistUpgradeViewKDE broken since lastupdate
** Summary changed:
- DistUpgradeViewKDE broken since lastupdate
+ DistUpgradeViewKDE broken since last security update
--
You received this bug notification because you are a me
: update-manager (Ubuntu Maverick)
Importance: Undecided
Status: New
** Also affects: update-manager (Ubuntu Precise)
Importance: Critical
Assignee: Marc Deslauriers (mdeslaur)
Status: Triaged
** Changed in: update-manager (Ubuntu Hardy)
Status: New => Confir
** Changed in: rekonq (Ubuntu)
Importance: Undecided => Low
** Changed in: rekonq (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to rekonq in Ubuntu.
https://bugs.launchpad.net/bugs/798438
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: Red Hat Bugzilla #484370
https://bugzilla.redhat.com/show_bug.cgi?id=484370
** Also affects: kdebase via
https://bugzilla.redhat.com/show_bug.cgi?id=484370
Importance: Unknown
Status: Unknown
** Package changed: kdebase (Ubuntu) => kdelibs (Ubuntu)
** Bug watc
** Visibility changed to: Public
--
integer overflows and unchecked allocation vulnerabilities
https://bugs.launchpad.net/bugs/318555
You received this bug notification because you are a member of Kubuntu
Bugs, which is subscribed to amarok in ubuntu.
--
kubuntu-bugs mailing list
kubuntu-bugs@l
37 matches
Mail list logo