Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Attached is a debdiff with the minimal fix for this issue. I've uploaded
an updated package for processing by the SRU team also.
** Patch added: "calibre_4.99.4+dfsg+really4.12.0-1ubuntu1.debdiff"
https://bugs.launchpad.net/ubuntu/+source/calibre/+bug/1898904/+attachment/5446311/+files/calibre
Let's fix the immediate problem first, then someone can file a new bug
and do the proper procedure to try and get a newer version into focal
and groovy.
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to calibre in Ubuntu.
https://bugs.laun
** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to calibre in Ubuntu.
https://bugs.launchpad.net/bugs/1898904
Title:
I took a look at the debdiffs in #2, #3, and #8, and here are my
comments:
For Bionic:
- The package doesn't build with the debdiff provided. Please fix and make sure
it builds before submitting it again.
- In CVE-2022-32990-2.patch, you dropped the section that patches
xcf_load_buffer, but in
There are no updated debdiffs to sponsor, unsubscribing ubuntu-security-
sponsors for now. Please resubscribe the group once updated debdiffs
have been attached to this bug. Thanks!
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to gimp in
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Visibility changed to: Public
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to ldm in Ubuntu.
https://bugs.launchpad.net/bugs/953340
Title:
ldm 2.2.x (using wwm) contains a keybinding allowing the user to get a
root shell
To mana
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2012-1166
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to ldm in Ubuntu.
https://bugs.launchpad.net/bugs/953340
Title:
ldm 2.2.x (using wwm) contains a keybinding allowi
nassigned) => Stéphane Graber (stgraber)
** Changed in: ldm (Ubuntu Natty)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ldm (Ubuntu Oneiric)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ldm (Ubuntu Natty)
Importance: Undecided => Hig
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: freemind (Ubuntu Quantal)
Importance: Undecided
Status: In Progress
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to freemind in Ubuntu.
https://bugs.launchpad.net/bugs/883008
Title:
No file association for .
Thanks for the merge proposal. I've uploaded a slightly modified version
of it to quantal, and have uploaded a slightly modified version of it to
precise-proposed for processing by the SRU team.
** Changed in: freemind (Ubuntu Quantal)
Status: In Progress => Fix Committed
--
You received
Opened upstream Debian bug also.
** Bug watch added: Debian Bug tracker #681219
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681219
** Also affects: freemind (Debian) via
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681219
Importance: Unknown
Status: Unknown
--
You recei
** Tags added: rls-q-incoming
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to gimp in Ubuntu.
https://bugs.launchpad.net/bugs/998156
Title:
GTK Print dialog sends broken custom page size attribute:
"PageSize=Custom.Custom.x"
To man
This is actually an issue with pygtk and recent glib versions:
https://bugs.launchpad.net/pygtk/+bug/1129309
Leaving this bug open for now, as a possible solution is to port dia to
gtk3
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to d
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for reporting this issue.
I have taken a look at the buzz.wav file. It does appear to contain
extra data at the end, including an elf header.
Fortunately, there doesn't seem to be enough of it to pose any sort of
threat. It is likely the extra part was, as you described, filesystem
corrupt
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to gimp in Ubuntu.
https://bugs.launchpad.net/bugs/1649428
Title:
Cannot open file from https location (URL)
To manage notificati
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Edubuntu
Bugsquad, which is subscribed to gimp in Ubuntu.
https://bugs.launchpad.net/bugs/1773561
Title:
Xenial/16.04: GIMP needs a security update - unfixed i
26 matches
Mail list logo