These should now be fixed by the following update:
http://www.ubuntu.com/usn/usn-2943-1/
** Changed in: pcre3 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pcre3 in Ubuntu.
h
This is a bug in QtWebEngine.
The file
src/3rdparty/chromium/net/third_party/nss/patches/chacha20poly1305.patch
contains the following:
+/* This is a bodge to allow this code to be compiled against older NSS
+ * headers. */
+#ifndef CKM_NSS_CHACHA20_POLY1305
+#define CKM_NSS_CHACHA20_POLY1305
** Also affects: pam (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: pam (Ubuntu Xenial)
Importance: Critical
Assignee: Marc Deslauriers (mdeslaur)
Status: Triaged
** Changed in: pam (Ubuntu Precise)
Status: New => Triaged
** Changed in:
** Changed in: messaging-app (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to messaging-app in Ubuntu.
https://bugs.launchpad.net/bugs/1543070
Title:
Security breach: bubble displays me
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
It looks like the servers listed in the bug description require SIGN-
RSA-SHA384, which gnutls26 doesn't support.
The issue can be reproduced with gnutls28 by disabling the additional
signature algorithms:
gnutls-cli --priority "NORMAL:-SIGN-ECDSA-SHA256:-SIGN-RSA-SHA384:-SIGN-
ECDSA-SHA384:-SIGN
The point of the USN-2865-1 security update was to remove support for
RSA-MD5 certificates which are considered insecure and were previously
accepted in GnuTLS because of a design flaw.
See the following for more information:
http://lists.gnutls.org/pipermail/gnutls-devel/2015-April/007572.html
h
Marcin,
It looks like your bank renewed their SSL cert on Feb 9th, and they
forgot to include the intermediate certificate.
This is a configuration problem on their end and has nothing to do with
Ubuntu updates.
Tell them to go to the following page and type in ebank.db-pbc.pl for
more informati
Glad that it's working, thanks!
I'm closing this bug.
** Changed in: ca-certificates (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launc
We released updated openssl packages to handle that case:
http://www.ubuntu.com/usn/usn-2913-3/
What version of openssl do you have installed?
What specific site are you unable to access?
** Changed in: ca-certificates (Ubuntu)
Status: New => Incomplete
--
You received this bug notifica
Chrome 45 is too old. You need to update to Chrome 47 or later,
preferably to the current version, Chrome 48.
I am closing this bug as running an old version of Chrome is not
supported.
** Changed in: nss (Ubuntu)
Status: Incomplete => Won't Fix
--
You received this bug notification beca
tus: New => Confirmed
** Changed in: openssl (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: openssl (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: openssl (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Chan
You need to restart everything that uses libssl, perhaps only the web
server, you'll see when you try it.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1528645
Titl
Did you restart your server after the update in order to use the new
version of libssl?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1528645
Title:
Please update
What version of Chrome are you running?
** Package changed: ca-certificates (Ubuntu) => nss (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1550423
Title:
Thanks! I've closed the bug.
** Changed in: ca-certificates (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ca-certificates in Ubuntu.
https://bugs.launchpad.net/bugs/1549709
Tit
The openssl tools in Ubuntu 14.04 never did use the system CA file by
default. That was fixed in later releases. So it's normal that you don't
need to specify it manually when using 15.10 for example, but do need to
specify it in 14.04.
The path to it has always been /etc/ssl/certs/ca-certificates
Your example command doesn't work. You need to tell openssl where the
certificate store is, like so:
echo | openssl s_client -CAfile /etc/ssl/certs/ca-certificates.crt
-connect www.google.com:443
What version is your openssl package? Please do:
apt-cache policy libssl1.0.0
Thanks.
** Changed i
ca-certificates is now updated in all stable releases:
http://www.ubuntu.com/usn/usn-2913-1/
** Changed in: ca-certificates (Ubuntu Precise)
Status: Confirmed => Fix Released
** Changed in: ca-certificates (Ubuntu Trusty)
Status: Confirmed => Fix Released
** Changed in: ca-certifi
rtificates (Ubuntu Wily)
Importance: Undecided => Low
** Changed in: ca-certificates (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: c
@born2chill:
It is fixed by using the mini.iso in trusty-updates. Please use the
links in comment #10.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1546459
Title:
segfau
I can reproduce this issue with the mini.iso from the release version of
14.04.
Could you please try again with the newer mini.iso from trusty-updates
(available here:)
http://archive.ubuntu.com/ubuntu/dists/trusty-updates/main/installer-amd64/current/images/netboot/mini.iso
http://archive.ubuntu
Confirmed, the epoch wasn't supposed to get bumped in precise.
** Also affects: nss (Ubuntu Precise)
Importance: Undecided
Status: New
** Changed in: nss (Ubuntu Precise)
Status: New => Confirmed
** Changed in: nss (Ubuntu Precise)
Assignee: (unassigned)
How are you installing this? What image are you using?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to eglibc in Ubuntu.
https://bugs.launchpad.net/bugs/1546459
Title:
segfault at b774bd9d ip b7352a0d sp bfda8f30 error 7 in
Fixed in (1.2.4-1ubuntu1.1).
** Changed in: graphite2 (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: graphite2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
** Changed in: openssl (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/1526959
Title:
openssl 1.0.2e breaks sbsigntool
Status
signed) => Marc Deslauriers (mdeslaur)
** Changed in: gtk+3.0 (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: gtk+3.0 (Ubuntu Wily)
Status: New => Fix Released
** Changed in: gtk+3.0 (Ubuntu Xenial)
Status: New => Fix Released
--
You received this bug no
** Changed in: gtk+2.0 (Ubuntu Wily)
Importance: Undecided => Medium
** Changed in: gtk+2.0 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gtk+2.0 (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Cha
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnome-online-accounts in
Ubuntu.
https://bugs.launchpad.net/bugs/1543830
Title:
Please DONT use webkit 1
Stat
pg2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnupg in Ubuntu.
https://bugs.launchpad.net/bugs/1501634
Title:
GnuPG 1.4/2.0 requires a patch for GCC 5
S
Caused by 6f992d94ea708535b2f3a3de22b429401d59fac9
** Bug watch added: bugs.gnupg.org/gnupg/ #2246
http://bugs.gnupg.org/gnupg/issue2246
** Also affects: gnupg via
http://bugs.gnupg.org/gnupg/issue2246
Importance: Unknown
Status: Unknown
--
You received this bug notification bec
Ubuntu 15.10 and up now include manpages for nss tools. Marking this bug
as closed.
** Changed in: nss (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bug
Merge looks good. Uploading. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openldap in Ubuntu.
https://bugs.launchpad.net/bugs/1532648
Title:
Please merge openldap 2.4.42+dfsg-2 (main) from Debian testing (main)
ACK on the debdiff in comment #1, uploading now. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to wpa in Ubuntu.
https://bugs.launchpad.net/bugs/1517040
Title:
wpa 2.4 misses one patch from Debian to improve 2.4/5 GH
Yep, unfortunately those are signed with md5, so it's normal that gnutls
will no longer connect.
You need to request those certs be changed, and use the older version of
gnutls26 in the meantime.
Since this is expected behaviour, I am closing this bug. Thanks!
** Changed in: gnutls26 (Ubuntu)
ok, since you haven't pasted the actual certs, you need to run both of
them though "openssl x509 -noout -text" and see what it lists as the
"Signature Algorithm".
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubu
Oh, unfortunately not. I was hoping gnutls-cli would print out the
certs, but it appears it stops before it gets a chance to.
Perhaps:
openssl s_client -connect xx.xx.xx.xx:636
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to
Perhaps try:
gnutls-cli -p 636 xx.xx.xx.xx
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1534230
Title:
LDAP TLS connection stopped working
Status in gnutls26 package
The gnutls26 security update disabled md5 support. Are you sure one of your
server certs isn't using md5?
Could you perhaps attach them here?
** Changed in: gnutls26 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Touch seeded p
ibxml2 (Ubuntu Vivid)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Wily)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Xenial)
Status: New => Confirmed
** Changed in: libxml2 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mde
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Since you managed to get this to work, I am closing this bug. Thanks!
** Changed in: cups (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
http://www.ubuntu.com/usn/usn-2865-1/
** Information type changed from Private Security to Public Security
** Changed in: gnutls26 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to g
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/1475050
Title:
unprivileged guest to host real-root escape
Curiously, I can't reproduce that. This is what I get:
$ openssl s_client -connect localhost:631
SSL-Session:
Protocol : TLSv1.2
Cipher: AES256-SHA256
Please attach the output of "apt-cache policy libssl1.0.0" and your
/etc/cups/cupsd.conf
Thanks!
** Information type changed fr
** Summary changed:
- Cups SSL is vulernable to POODLE
+ Cups SSL is vulnerable to POODLE
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1505328
Title:
Cups SSL is vulnerabl
This is CVE-2015-7946
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2015-7946
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to unity8 in Ubuntu.
https://bugs.launchpad.net/bugs/1525981
Title:
Device can b
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/1482786
Title:
man-db daily cron job TOCTOU bug when proces
*** This bug is a security vulnerability ***
Public security bug reported:
USN-2834-1 contained a fix for CVE-2015-7499, but did not contain the
following subsequent commit:
https://git.gnome.org/browse/libxml2/commit/?id=ce0b0d0d81fdbb5f722a890432b52d363e4de57b
See post from Tom Lane here:
ht
ACK on the updated debdiff, thanks!
I've changed my mind, and will release it as a security update after all
if testing goes well.
Thanks!
** Changed in: cups (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because y
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Uploaded same fix to Wily for processing by the SRU team.
** Description changed:
+ [Impact]
+
+ On systems with a long hostname, nano either segfaults or refuses to
+ work properly.
+
+ [Test Case]
+ 1- set a long hostname with "hostname thisisareallyreallyreallylonghostname"
+ 2- try and edit
This part of the patch is wrong:
@@ -895,18 +922,6 @@ _cupsSetDefaults(void)
* Look for ~/.cups/client.conf...
*/
- snprintf(filename, sizeof(filename), "%s/.cups/client.conf", home);
- fp = cupsFileOpen(filename, "r");
-}
-else
- fp = NULL;
-
-if (!fp)
-
I can't reproduce this issue in midori at all.
I can reproduce it with https://te-st.ru
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1520568
Title:
All queries fails when '
nss 3.20.1 works, nss 3.21 doesn't.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1520568
Title:
All queries fails when 'google' is used: ERR_SSL_PROTOCOL_ERROR
Status in ch
OK, a few more notes on reproducing this:
1- I can't reproduce this by installing the daily live cd in a VM
2- I can reproduce it successfully by installing the daily live cd on real
hardware
This means it's probably not related to which Google servers are being
hit, and is likely hardware-depen
Publishing as a security update now, thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gnutls26 in Ubuntu.
https://bugs.launchpad.net/bugs/1510163
Title:
Poodle TLS1.0 issue in Trusty (and Precise)
Status in gnutls26
I can't seem to reproduce this. https://www.google.com works fine in an
up-to-date image with Chromium and nss 2:3.21-1ubuntu2.
Could you please give the exact steps require to see this issue?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which i
d => High
** Changed in: gnutls26 (Ubuntu Precise)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gnutls26 (Ubuntu Trusty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: gnutls26 (Ubuntu)
Status: New => Fix Released
--
Hi Bryan,
Thanks for the debdiffs!
Where did you obtain the patch from Hanno Boeck from?
** Also affects: gnutls26 (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: gnutls26 (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notifi
I'm not sure what the attack vector here is. /etc/hostname is only
writeable by root.
Is there any way for an attacker to control /etc/hostname?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to bash in Ubuntu.
https://bugs.lau
** Changed in: light-locker (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to lightdm in Ubuntu.
https://bugs.launchpad.net/bugs/1515662
Title:
Major security issue with light-locker - c
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
** Package changed: ubuntu => apt (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1518785
Title:
Root-owne
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Changed in: libpng (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Thanks for the debdiffs, building now for a security update!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple buffer overflows
Status
** Also affects: libpng (Ubuntu Precise)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libpng in Ubuntu.
https://bugs.launchpad.net/bugs/1516592
Title:
CVE-2015-8126: Multiple b
** Changed in: libxml2 (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libxml2 in Ubuntu.
https://bugs.launchpad.net/bugs/1498751
Title:
Please sync libxml2 2.9.2+zdfsg1
** Package changed: dovecot (Ubuntu) => apparmor (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1512131
Title:
Apparmor complains about multiple /run/dovecot fil
1- The debdiff in comment #9 still contains an extra
cups-1.7.2/lets_patch_this.patch section. Could you please remove it?
2- Please add an origin tag to the patch that traces back to redhat's 1161172
bug, since I believe that's what you based the backport on
3- Also, I don't think we should do
Also, please add "(LP: #1505328)" to the debian/changelog.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1505328
Title:
Cups SSL is vulernable to POODLE
Status in cups pack
** Bug watch added: bugzilla.sudo.ws/ #707
http://bugzilla.sudo.ws/show_bug.cgi?id=707
** Also affects: sudo via
http://bugzilla.sudo.ws/show_bug.cgi?id=707
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Touch seeded p
** Package changed: dash (Ubuntu) => unity (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dash in Ubuntu.
https://bugs.launchpad.net/bugs/1499322
Title:
Wily: No Dash Icon After Package Install Until New Session
** Information type changed from Private Security to Public Security
** Also affects: sudo (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: sudo (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: sudo (Ubuntu Trusty)
Importance: Undecided
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: freedesktop.org Bugzilla #92450
https://bugs.freedesktop.org/show_bug.cgi?id=92450
** Also affects: poppler via
https://bugs.freedesktop.org/show_bug.cgi?id=92450
Importance: Unknown
Status: Unknown
** Information type changed from Private Security to Public Se
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu-system-settings (Ubuntu) => location-service
(Ubuntu)
** Information type changed from Private Security to Public Security
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Uploaded packages for trusty-wily for processing by the SRU team.
** Changed in: steam (Ubuntu Trusty)
Status: Confirmed => In Progress
** Changed in: steam (Ubuntu Vivid)
Status: Confirmed => In Progress
** Changed in: steam (Ubuntu Wily)
Status: Confirmed => In Progress
-
** Changed in: steam (Ubuntu)
Status: Fix Released => In Progress
** Changed in: steam (Ubuntu Wily)
Status: Fix Released => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to systemd in Ubuntu.
https://b
** Information type changed from Private Security to Public Security
** Changed in: apport (Ubuntu Xenial)
Assignee: Martin Pitt (pitti) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
701 - 800 of 1121 matches
Mail list logo