** Changed in: xmltooling (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1819912
Title:
CVE-2019-9628 XML parser cl
** Changed in: xml-security-c (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1816040
Title:
ECDSA XML signature generation segmentation fault
To m
Hey Alejandro,
Thanks for providing the patch.
Could you please test the versions that I've built?
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages?field.name_filter=xml-
security-c&field.status_filter=published&field.series_filter=
Thanks
--
You received this bu
** Changed in: xml-security-c (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1816040
Title:
ECDSA XML signature generation segmentation fault
To manage not
** Changed in: xml-security-c (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
** Changed in: xml-security-c (Ubuntu)
Status: Fix Released => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Changed in: xml-security-c (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1816040
Title:
ECDSA XML signat
** Changed in: xml-security-c (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1816040
Title:
ECDSA XML signat
: coturn (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
** Changed in: coturn (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchp
Hey Roger,
I've just released the fixes for Xenial, Bionic and Cosmic.
It should hit the archives in a few minutes.
Please let me know in case of new security requests, I will be glad to
help.
Thanks again for providing the patches and opening the bug.
** Changed in: mosquitto (Ubuntu)
S
** Changed in: coturn (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1813837
Title:
Multiple vulnerabilities affecting 4.5.0.7
To manage notification
** Changed in: mosquitto (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815695
Title:
Update incorrect, introduces possible crash
To manage notifica
Hey Roger,
Thanks for sending the patch and opening the bug.
I will work on it right away.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815695
Title:
Update incorrect, introduces possible crash
** Changed in: mosquitto (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815695
Title:
Update incorrect, introdu
** Changed in: krb5 (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1814501
Title:
package libgssapi-krb5-2:amd64 1
** Information type changed from Private Security to Public Security
** Changed in: coturn (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1813837
Title:
Mult
I reviewed python-django-debreach version 1.5.2-0ubuntu1 as checked into disco
as of this writing.
This shouldn't be considered a full audit but rather a quick gauge of
maintainability.
Django-debreach is a project that adds basic/extra mitigation against BREACH
attacks for Django projects.
- No
It truly does!
Thanks for the debdiffs.
Regarding trusty, my colleague mentioned that you will do a version update,
does it include this fix or should I update trusty anyway?
Thanks again
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the
** Changed in: python-django-debreach (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => Ubuntu Security Team
(ubuntu-security)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1805
Hi Gianfranco,
>It is possible that the current version 5.2.18-dfsg-2~ubuntu18.04.1 is not
>installed on some systems.
>> how?
I was wondering if anyone had version 5.2.18-dfsg-2 installed and didn't
do updates ever since, but this is a rare case.
>>5.2.18-dfsg-2~ubuntu18.04.1 updates (multiver
Hi Giangranco,
Thanks for providing debdiffs for the trusty and xenial!
Regarding the version on bionic, it will be 5.2.18-dfsg-2ubuntu18.04.2.
It is possible that the current version 5.2.18-dfsg-2~ubuntu18.04.1 is
not installed on some systems.
5.2.18-dfsg-2ubuntu18.04.2 will supersede 5.2.18-
Thanks Luca,
The packages are being uploaded and should be available in the archive in a few
minutes.
Thanks
** Changed in: zeromq3 (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu
** Changed in: python-django-debreach (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => Eduardo dos Santos
Barretto (ebarretto)
** Changed in: python-django-debreach (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a mem
ssues.
Security team ACK for promoting anope to main.
** Changed in: anope (Ubuntu)
Status: New => Confirmed
** Changed in: anope (Ubuntu)
Assignee: Eduardo dos Santos Barretto (ebarretto) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bug
** Changed in: zeromq3 (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
To manage notifications about this bu
Thanks for opening the ticket and attaching the patch.
I've generated a new version for bionic and cosmic, both can be found here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=zeromq3
Would anyone mind testing it before we release it?
Thanks
-
Thanks for opening the ticket and attaching the patch.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerability
To manage notifications about this bug go to:
http
** Changed in: zeromq3 (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811531
Title:
remote execution vulnerabil
Thanks for testing!!
Great catch on the versioning.
It actually needs to be 5.2.18-dfsg-2ubuntu18.14.2 (it could also be
5.2.18-dfsg-2ubuntu18.14.1, but I think this will be confusing for those
who check the changelog).
It can't be 5.2.18-dfsg-3~ubuntu18.14.1 because that would mean that we
are
** Changed in: virtualbox (Ubuntu)
Status: Confirmed => In Progress
** Changed in: virtualbox (Ubuntu)
Importance: Undecided => High
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/180
n for cosmic as well.
Thanks,
Eduardo
** Changed in: virtualbox (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs
Just confirming that the fix for precise was released:
xen-api (1.3.2-5ubuntu0.1) precise-security; urgency=low
* SECURITY UPDATE: PAM settings allowed any local user to issue remote API
commands (LP: #1031375)
- debian/patches/pam-auth-root-xapi-group: Xapi only authenticates the
precise has seen the end of its life and is no longer receiving any updates.
Marking the precise task for this ticket as 'Won't Fix'.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1033899
Title:
[Se
precise has seen the end of its life and is no longer receiving any updates.
Marking the precise task for this ticket as 'Won't Fix'.
** Changed in: python-pip (Ubuntu Precise)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, wh
I reviewed anope version 2.0.6-1 as checked into cosmic.
This shouldn't be considered a full audit but rather a quick gauge of
maintainability.
Anope is a set of services for IRC networks. It allow users/admins to
manage their nicks/channels/networks and more.
Quick list of services:
- NickServ
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Tags added: community-security
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1806961
Title:
Lock can be circumvented by switc
Daniel, since you are dealing with many reports on
screensavers/screenlockers, have you seen this before?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1805715
Title:
password exposed in cal
Hi smurfendrek,
Please check jarnos comment #89, you need to use light-locker, using dm-tool
for lock is not recommended.
You could also try with other screen lockers program.
Also this is an old bug, if you are still experiencing the problem, please open
a new bug.
I am unsubscribing the securi
Hi Peter,
are you still experiencing this issue?
** Changed in: gnome-screensaver (Ubuntu)
Status: New => Invalid
** Changed in: gnome-screensaver (Ubuntu)
Status: Invalid => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscr
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Sorry, for the duplicate message as sarnold already mentioned. Please
ignore it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1770655
Title:
nodejs is at 8.10 while 8.11 is a security release.
To
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1769383 ***
https://bugs.launchpad.net/bugs/1769383
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1769383, so it is being marked as such. Please look
*** This bug is a duplicate of bug 1769383 ***
https://bugs.launchpad.net/bugs/1769383
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1769383, so it is being marked as such. Please look
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1769383 ***
https://bugs.launchpad.net/bugs/1769383
Thank you for taking the time to report this bug and helping to make
Ubuntu better. This particular bug has already been reported and is a
duplicate of bug 1769383, so it is being marked as such and marked a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: anope (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => Eduardo dos Santos
Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1459692
Title:
[
Thanks SWick!
Tomcat7 with the fix published, should reach in the repositories in a
few minutes.
Thanks for all the feedback and in case of problems just let us know!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launc
Can anyone test the tomcat7 built here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages
My tests were successful but I would appreciate more feedback about it.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
So I've talked to upstream and Russel mentioned that a new version is coming
next year.
For more information:
https://sourceforge.net/p/pam-python/tickets/5/
** Changed in: pam-python (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubun
Thank you all for reporting the issue and sorry that it affected you.
I'm already working on the fix and will let you know here if you can also test
it before we publish it in the repository.
>From what I've looked this is a Xenial issue only, so I am marking Trusty as
>Invalid.
** Changed in:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
So I took another look at the patch and the current code and maybe I was too
hard in my response.
The current code is wrong as it will still make the string comparison even if
dot is null. So the patch fixes this problem and should be proposed to upstream.
As I mentioned the package also has oth
Thanks for taking the time to report this bug and helping to make Ubuntu better.
I took a look at your patch and I don't think it is the best solution. As far
as I can tell, the problem is actually caused because of toolchain (gcc)
version in bionic. I've tried to build the same version of pam-py
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1794565 ***
https://bugs.launchpad.net/bugs/1794565
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: libgxps (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1797785
Title:
heap buffer overflow in ft_font_face_hash of gxps-fonts.c
CVE-2018-1073
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi shaochieh.chiang,
Thanks for getting back to me.
I still need more information, how many services, processes and so on are you
monitoring?
Can you share your monitrc configuration?
Your log also contain errors from nginx ... have you tried to solve
them?
I'm still not convinced that your
Hi shaochieh.chiang,
Could you try to downgrade the package version as below:
sudo apt-get install monit=1:5.16-2
And see if you can reproduce the error?
I've also found this on monit bug tracker:
https://bitbucket.org/tildeslash/monit/issues/327
It might be related to what you're facing.
--
Hi shaochieh.chiang,
I appreciate you taking the time to report it and helping make Ubuntu
better.
My tests didn't give the "cannot parse response", and from the feedback
received above, it appears that no one faced this so far.
So could you give more information?
Which are the steps to reprodu
Thanks for testing the package and giving feedback!
I really appreciate it.
So based on your feedback and on my tests, we just released monit
1:5.16-2ubuntu0.2 to the repository.
It should be available for upgrade in a few minutes depending on the mirrors.
If you encounter any problems, please
Thanks to Carlos Peñas for proposing the fix.
Can anyone test the new version?
You can download it from here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages
This new version if approved will be released on Monday, as we don't
want to release today and not having any
Has anyone seen the same problem in Trusty (Ubuntu 14.04)?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786910
Title:
Latest patch breaks command line 'restart all'
To manage notifications about
** Changed in: monit (Ubuntu)
Assignee: (unassigned) => Eduardo dos Santos Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1786910
Title:
Latest patch breaks command l
Thanks for reporting this bug and helping make Ubuntu better.
I'm sorry this affected you all.
I would like you to ask the reporter and all the involved people in the
thread to always include the last person listed as Maintainer for the
package (you can check this in the debian/changelog) in the
** Changed in: gksu (Ubuntu)
Status: Incomplete => Invalid
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789700
Title:
S
*** This bug is a duplicate of bug 1783245 ***
https://bugs.launchpad.net/bugs/1783245
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/178
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789528
Title:
INSTALL CRASH
To manage notifications about this bug go to:
https://bugs.lau
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789585
Title:
package python-pyparsing 2.0.3+dfsg1-1ubuntu0.1 failed to
install/upgrade:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789630
Title:
package systemd-sysv 237-3ubuntu10.3 failed to install/upgrade:
installed s
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789328
Title:
'grub-efi-amd64-signed' failed to install into target/
To manage notificatio
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789072
Title:
package phpmyadmin 4:4.6.6-5 failed to install/upgrade: installed
phpmyadmi
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789116
Title:
grub isn't install
To manage notifications about this bug go to:
https://bug
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789143
Title:
package base-files 9.4ubuntu4.7 failed to install/upgrade: package
base-fil
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1789213
Title:
package libavcodec-extra 7:3.4.2-2 failed to install/upgrade: dpkg-deb
--fs
101 - 192 of 192 matches
Mail list logo