It's completely normal for programs to use shared memory segments.
That's why they're there! :) rkhunter reports them because they're
persistent like the filesystem but not really visible, unlike the
filesystem. You have to know to look for them.
rkhunter is a tool for you to use as part of your i
Public bug reported:
Hello; I hit Control+L to focus the URL bar, then typed:
http://www.debian.org/
This loads a Google search page for http.
I tried again with: https://www.debian.org/
This loaded a Google search page for https.
Typing just: www.debian.org
leads to the expected Debian websi
@reliable-robin-22 this specific message is almost certainly unrelated
to whatever problem you're facing. There's millions of people using
Ubuntu and surely several of them print from time to time. (I may only
print once a year, but it does work for me. :)
You should open a new bug report and popu
nem000 I'm sure I've seen this bug fixed a dozen times in the last
fifteen years or something. It's just a popular bug to re-implement.
Please file a bug with 'ubuntu-bug gnome-shell' if you're using Gnome;
replace 'gnome-shell' with whatever screenlocker you're using if you're
on a different envir
On Mon, Apr 03, 2023 at 06:57:36AM -, Ralf Dünkelmann wrote:
> the bug (https://bugs.launchpad.net/bugs/2013453), that nem000 created
> was marked as a duplicate of this one. This is the case for most of the
> related bugs listed here. So it seems that this here is the issue to go
> ahead with?
** Information type changed from Private Security to Public Security
** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-screensaver in Ubuntu.
https://bugs.launchp
ignore me
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xwayland in Ubuntu.
https://bugs.launchpad.net/bugs/2019734
Title:
Gnome+Wayland Ubuntu 22.04 freezes. All USB devices disconnect on ASUS
Prime Z790-A Wifi
Status in xwayland
jammy, lunary, and mantic:
for distro in jammy lunar mantic ; do for component in main universe
multiverse restricted ; do for-archive
/srv/mirror/ubuntu/dists/$distro/$component/source/Sources.gz
/srv/mirror/ubuntu/ ~/bin/for-archive-tools/unpack-search '/system-
connections' ; done ; done | tee
Here's the relevant bit from the dpkg logs:
Préparation du dépaquetage de .../firefox_1%3a1snap1-0ubuntu2_amd64.deb ...
=> Installing the firefox snap
==> Checking connectivity with the snap store
==> Installing the firefox snap
erreur : snap "firefox" has "install-snap" change in progress
[1mdpk
Alberto, it looks like nobody verified
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-515/+bug/1988836
You can find the bugs that need verification or that failed verification
on https://ubuntu-archive-team.ubuntu.com/pending-sru.html
Thanks
--
You received this bug notifica
Hello Cristobal, can you make changes from that interface? Or is it
read-only?
Thanks
** Information type changed from Private Security to Public Security
** Changed in: ubuntu-settings (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of
** Changed in: ubuntu-settings (Ubuntu)
Status: Incomplete => New
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to ubuntu-settings in Ubuntu.
https://bugs.launchpad.net/bugs/2021484
Title:
Editing a VPN ask to introduce credentia
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Jussi, thanks for the report. I believe this is an intentional
design choice -- if someone cannot stop music gently they may do so
violently.
Thanks
** Changed in: gnome-shell (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Deskto
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to remmina in Ubuntu.
https://bugs.launchpad.net/bugs/2061249
Title:
remmina crashed with SIGABRT in freerdp_settings_get_bool()
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/2063536
Title:
flickering screen
Status in xorg package in Ubuntu:
New
Bug
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of D
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm concerned about this patch:
A versioned Conflicts entry is not something that someone adds lightly
-- probably an abstraction file or policy language feature was added in
that version of AppArmor, and policy compilation will fail if that
version isn't installed before the newer versions of the
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/2046633
Title:
Don't include 'nmcli -f all con' output in b
Microsoft has implemented an IPSec stack:
https://learn.microsoft.com/en-us/windows/win32/fwp/ipsec-
configuration#how-to-use-wfp-to-configure-ipsec-policies
"The Microsoft implementation of IPsec uses Windows Filtering Platform
to setup IPsec policies."
This page is a bit thin on which applicati
Robie, good idea, I've added a note about pptpd and bcrelay being
removed, with a link back here:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2041751
Thanks
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager-pptp i
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/2049625
Title:
CVE-2024-0519: Out of bounds memory access
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/2052832
Title:
Desktop lock-screen is bypassed after switching
Scarlett, Simon and I had discussed preparing a small program that could
prepare a wrapper profile: given a path to an appimage, it could emit a
small profile to /etc/apparmor.d/ for the file, with the right
attachment path and then load the profile.
As I understand our new strategy, it would prob
I suggest talking with the virtualbox devs:
[4.040754] UBSAN: array-index-out-of-bounds in
/tmp/vbox.0/common/log/log.c:1791:41
It may or may not be related to your audio issues, but it can't be good.
Thanks
** Information type changed from Private Security to Public
--
You received this
Hello, thanks for the bug report. I suggest taking your dmesg output
(from CurrentDmesg.txt) to the virtualbox developers, it looks very
unhappy.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages
** Changed in: libmysofa (Ubuntu)
Status: New => Won't Fix
** Changed in: libmysofa (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to libmysofa in Ubuntu
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to gnome-shell in Ubuntu.
https://bugs.launchpad.net/bugs/2012672
Title:
[lunar] Screen content is shown shortly when res
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to freerdp2 in Ubuntu.
https://bugs.launchpad.net/bugs/2000670
Title:
package libfreerdp-server2-2:amd64 2.6.1+dfsg1-3ubuntu2.3 fa
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to texlive-extra in Ubuntu.
https://bugs.launchpad.net/bugs/2002061
Title:
package texlive-latex-extra 2022.20220722-2 failed to i
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
mrs sheep, your kernel logs indicate AppArmor is blocking attempts to
load fonts located in /home/mrssheep/Documents/SystemFonts/truetype
/ubuntu-font-family/
The ttf-ubuntu-font-family package installs fonts into the directory
/usr/share/fonts/truetype/ubuntu-font-family/
It's possible you've go
This is an unwinnable race condition; if it is important to you that
your session be locked upon resume, please manually lock your session
before suspending.
Thanks
** Changed in: gnome-screensaver (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a me
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for taking the time to report this bug and helping to make
Ubuntu better.
You appear to be running a release of Ubuntu that is no longer supported.
Please see https://wiki.ubuntu.com/Releases for information on our
currently supported releases; consider using one of the LTS releases,
as
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
David, this should download and install all updates, including this one,
that your system needs:
sudo apt-get update && sudo apt-get -u dist-upgrade
Thanks
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to language-selector in Ubuntu.
htt
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
apt may not be the best place for this bug but I believe it is closer to
correct than xorg. Thanks
** Package changed: xorg (Ubuntu) => apt (Ubuntu)
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.n
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
xrdb has supported this feature for longer than the operating system
kernel we're all using has even existed. I see no reason to break
backwards compatibility just for the sake of breaking it.
Thanks
--
You received this bug notification because you are a member of Desktop
Packages, which is sub
Try this in a terminal:
sudo apt-get update && sudo apt-get -u dist-upgrade
If you get any error messages, please post them here.
Thanks
** Information type changed from Private Security to Public
** Information type changed from Public to Public Security
--
You received this bug notificatio
http://www.ubuntu.com/usn/usn-2506-1/
** Changed in: thunderbird (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to thunderbird in Ubuntu.
https://bugs.launchpad.net/bugs/1427555
Title:
Update
** Information type changed from Private Security to Public
** Changed in: xorg (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1431598
Title:
Micr
Public bug reported:
I use an openvpn vpn through network manager to connect to the canonical
vpn; when I suspend and resume my laptop the openvpn vpn does not come
up again. However the DNS server that it inserted into my
/etc/resolv.conf is left there, causing all dns lookups to take six
seconds
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
There were plenty of messages in your dmesg about an external hard
drive; it may be dying, or the usb equipment used to attach it to the
computer may be bad, but it looks like something worth worrying about.
Thanks
--
You received this bug notification because you are a member of Desktop
Package
*** This bug is a duplicate of bug 1432395 ***
https://bugs.launchpad.net/bugs/1432395
** This bug has been marked a duplicate of bug 1432395
Hard showing some error
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
It looks like you moved your home directories away from /home:
[11617.240214] audit: type=1400 audit(1426607239.103:39):
apparmor="DENIED" operation="open" profile="/usr/bin/evince"
name="/ssdhome/cpbl/.Xauthority" pid=20599 comm="evince"
requested_mask="r" denied_mask="r" fsuid=1000 ouid=1000
To
** Changed in: evince (Ubuntu)
Status: Incomplete => Invalid
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to evince in Ubuntu.
https://bugs.launchpad.net/bugs/1433165
Title:
evince fails to run due to a gdk_mir_display_open
Sta
Excellent, thanks for reporting back Christopher. The kernel follows
symlinks before prompting AppArmor to allow or deny something. which is
why the reports include the 'real' name. This all appears to be working
as expected.
Thanks
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
The intention is to prevent someone local to the computer from just
pulling the power cord or hitting the reset button when the system is
locked and they want to shut it down or log in as a different user. I
believe these dialog options are configurable via PolicyKit if you've
taken the time to har
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Is this bug about xorg or about clamtk?
Thanks
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1422808
Title:
ClamTk not updating
Status in xorg package in Ubuntu:
New
Bug descriptio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
A beer to whoever uploads SRUs for the postrm fix suggested in comment
#7 payable the next time we meet. I'd so love to be rid of this annoying
message even though I know full well it doesn't actually affect
anything. We won't be rid of it "now", only some vague point in the
future, but if all supp
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I noticed the following error early in the logs:
May 13 09:50:29 server kernel: [47923.441413] type=1400
audit(1431474629.549:812): apparmor="DENIED" operation="mknod"
profile="/usr/sbin/cupsd" name="/data/var/log/cups/error_log" pid=7814
comm="cupsd" requested_mask="c" denied_mask="c" fsuid=0 oui
Great, I'm glad that was it! Have fun.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1454463
Title:
CUPS not allowed to mknod to /var/log by apparmor
Status in cups package in Ubuntu:
Mardy, AppArmor always allows directory execute access.
/foo/directory/ r, is needed to enumerate files in the directory.
/foo/directory/* r, is needed to access the files in the directory,
regardless if the names were guessed or read via getdents(2).
--
You received this bug notification becau
ls -li can confirm or deny the delete-and-recreate theory.
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to firefox in Ubuntu.
https://bugs.launchpad.net/bugs/1415744
Title:
Firefox changes Files that are owned by root and read only
St
Check the "Automatic login" selector in the User Accounts section of the
control center, chances are good you're still set to log in
automatically.
** Changed in: unity-control-center (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Desk
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I'm sorry, I don't know when this can be fixed; I only made the bug
visible to everyone.
Thanks
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to xorg in Ubuntu.
https://bugs.launchpad.net/bugs/1417804
Title:
Ubuntu 14.04 LTS i915 hatas
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to chromium-browser in Ubuntu.
https://bugs.launchpad.net/bugs/1469428
Title:
22-june-2015 security fixes not available
Probably you need a new hard drive:
[ 905.956725] ata1.00: exception Emask 0x0 SAct 0x800 SErr 0x0 action 0x0
[ 905.956735] ata1.00: irq_stat 0x4008
[ 905.956743] ata1.00: failed command: READ FPDMA QUEUED
[ 905.956756] ata1.00: cmd 60/08:d8:90:2a:81/00:00:0a:00:00/40 tag 27 ncq 4096
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I suspect it is Ubuntu One:
Jul 13 17:55:16 hostname org.gnome.keyring.SystemPrompter[1889]: Gtk-Message:
GtkDialog mapped without a transient parent. This is discouraged.
Jul 13 17:55:18 hostname com.ubuntu.OneConf[1889]:
ERROR:oneconf.networksync.ssohandler:credential error
$ grep "credential
** Bug watch added: Mozilla Bugzilla #1186390
https://bugzilla.mozilla.org/show_bug.cgi?id=1186390
** Also affects: thunderbird via
https://bugzilla.mozilla.org/show_bug.cgi?id=1186390
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a mem
** Changed in: network-manager (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Desktop
Packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/1270257
Title:
NetworkManager failed to function aft
Twente, that's because this bug is useless for fixing any issues -- I
originally filed the bug with 13.10, which has been EOL for 1.5 years.
Others added completely unrelated bugs here along the way rather than
filing new bugs for their issues. Once this turned into a wasteland of
unrelated informa
Ken,
The ptrace mediation in 12.04 LTS is very rudimentary; if you add
capability sys_ptrace, to a profile then processes running in that
profile are allowed to trace any process the discretionary access
controls allow. The fine-grained permissions introduced in 14.04 LTS
require both the new kern
*** This bug is a duplicate of bug 1443766 ***
https://bugs.launchpad.net/bugs/1443766
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
*** This bug is a duplicate of bug 1444336 ***
https://bugs.launchpad.net/bugs/1444336
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
1 - 100 of 1208 matches
Mail list logo