Hello,
The plugin now appears to be translated into Italian. Thank you for your effort!
Best regards
** Changed in: pidgin-otr (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.l
** Changed in: procps (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2016318
Title:
free command: in Italian header is misaligned and wrongly tra
to restart the
system to have a correct wifi working
+
+ Output:
+
+ salvatore@salvatore-Inspiron-5515:~$ sudo dmesg | grep ath10k
+ [3.509206] ath10k_pci :02:00.0: enabling device ( -> 0002)
+ [3.511043] ath10k_pci :02:00.0: pci irq msi oper_irq_mode 2 irq_mode
0 reset_m
** Description changed:
OS Version: Ubuntu 24.04 LTS
network driver: ath10k
Behavior expected: reconnect correctly with wifi after suspend
Behavior real: network manager connects with wifi but I have no connection to
internet and when I open wifi settings, it does not find any wifi networ
Public bug reported:
OS Version: Ubuntu 24.04 LTS
network driver: ath10k
Behavior expected: reconnect correctly with wifi after suspend
Behavior real: network manager connects with wifi but I have no connection to
internet and when I open wifi settings, it does not find any wifi network.
I tried
Here's the one for Bionic to the applied/ubuntu/bionic-devel branch.
** Patch added: "Overwriting the unbound.prerm file (pulled from Bionic) and
removing DEBHELPER macro"
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/2072700/+attachment/5796754/+files/bionic_unbound_prerm_overwrite.
> changing this in a new package upgrade will not fix the underlying
issue, but will for the next upgrades.
No worries. Understood. Thank you for confirming that bit. Helps us set
expectations :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed t
No problem. Happy to help.
> Does unbound remain inactive after the upgrade, or does the postinst
maintainer script start it up again for you successfully?
The postinst script does indeed start it back up. As for timing, it was
~43 seconds between the prerm stop and postinst start in one example.
And here is the patch for the unbound.prerm file on Focal
** Patch added: "Patch file for unbound.prerm on Focal"
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/2072700/+attachment/5796028/+files/focal_unbound_prerm.diff
** Description changed:
- On both Bionic (EOL, yes, but applies
Here's the Bionic prerm patch
** Patch added: "Patch file for unbound.prerm on Bionic"
https://bugs.launchpad.net/ubuntu/+source/unbound/+bug/2072700/+attachment/5796027/+files/bionic_unbound_prerm.diff
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
Public bug reported:
On both Bionic (EOL, yes, but applies to the packages available within
ESM also) and Focal, we found that the unbound package's prerm
maintainer script does not confirm whether the action is "remove" before
it stops the service, causing a service stop and unnecessary unbound
d
** Changed in: nvidia-graphics-drivers-535 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065139
Title:
nvidia-dkms-545 545.29.06-0ubuntu0.22.04.2:
Also confirming 535.183.01-0ubuntu0.22.04.1 builds successfully against
kernel 5.15.0-112-generic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065139
Title:
nvidia-dkms-545 545.29.06-0ubuntu0.22.0
** Also affects: nvidia-graphics-drivers-535 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065139
Title:
nvidia-dkms-545 545.29.06-0ubuntu0.22.0
** Bug watch added: Debian Bug tracker #1067829
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067829
** Also affects: nfs-utils (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067829
Importance: Unknown
Status: Unknown
--
You received this bug notification be
According to https://bugzilla.redhat.com/show_bug.cgi?id=2044583 this is
CVE-2021-4217.
** Bug watch added: Red Hat Bugzilla #2044583
https://bugzilla.redhat.com/show_bug.cgi?id=2044583
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-4217
--
You received this bug notificati
Thank you for adding this to Jammy!
Is it possible to bring the new version in for Bionic and Focal as well?
Thank you in advance.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1955413
Title:
Upda
** Tags added: bionic
** Tags added: focal
** Tags added: hirsute impish jammy
** Summary changed:
- containerd 1.5.9 in bionic/focal
+ Update to containerd 1.5.9
** Description changed:
- Could containerd be updated to 1.5.9 in bionic and focal?
+ Could containerd be updated to 1.5.9?
- I
Updated the summary and title of this bug, since we would like to see
this package upgraded to version 1.5.9 now. Upgrading to 1.5.9 would not
only address the most recent CVE:
https://nvd.nist.gov/vuln/detail/CVE-2021-43816, but it would also
address https://bugs.launchpad.net/bugs/cve/2021-41190
** Summary changed:
- containerd 1.5.8 in bionic/focal
+ containerd 1.5.9 in bionic/focal
** Description changed:
- Could containerd be updated to 1.5.8 in bionic and focal?
+ Could containerd be updated to 1.5.9 in bionic and focal?
It addresses a number of CVEs compared to the current ver
** Bug watch added: Debian Bug tracker #989375
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989375
** Also affects: courier (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989375
Importance: Unknown
Status: Unknown
--
You received this bug notification because
CVE-2021-38084 seems to be assigned for this issue.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-38084
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1194892
Title:
pop3 and ima
** Attachment added: "trace_4.log"
https://bugs.launchpad.net/ubuntu/+bug/1910848/+attachment/5451223/+files/trace_4.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1910848
Title:
TB16 dock et
** Attachment added: "trace_3.log"
https://bugs.launchpad.net/ubuntu/+bug/1910848/+attachment/5451222/+files/trace_3.log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1910848
Title:
TB16 dock et
** Attachment added: "Trace 2"
https://bugs.launchpad.net/dell-sputnik/+bug/1910848/+attachment/5451221/+files/trace_2.log
** Also affects: ubuntu
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Having the same problem. After a normal apt-upgrade on my Kubuntu, the
5.8.0-34 kernel was installed and virtualbox-dkms fail to build the
related modules.
Not even the 5.8.0-36 (released today) works.
Please fix it.
** Attachment added: "5.8.0-36-generic bad build.txt"
https://bugs.launchpa
I can confirm problem persist on 20.04.01 after upgrade to
5.8.0-34-generic and 5.8.0-36 too.
** Attachment added: "5.8.0-34-generic bad build.txt"
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1899233/+attachment/5450875/+files/5.8.0-34-generic%20bad%20build.txt
--
You receive
I forgot to add the 5.8.0-36 fail build log.
Sorry.
** Attachment added: "5.8.0-36-generic bad build.txt"
https://bugs.launchpad.net/ubuntu/+source/virtualbox/+bug/1899233/+attachment/5450876/+files/5.8.0-36-generic%20bad%20build.txt
--
You received this bug notification because you are a me
This issue has been resolved in the following Ubuntu releases:
xenial: 1.0.4-1.1+deb8u1ubuntu0.1
bionic: 1.0.6-1.1+deb10u1ubuntu0.1
Please note that the version of pam-python in focal and groovy (1.0.7-1ubuntu1)
will still prevent loading 3rd party python modules from site-specific paths.
This
** Changed in: pam-python (Ubuntu Bionic)
Status: New => Fix Released
** Changed in: pam-python (Ubuntu Xenial)
Status: Confirmed => Fix Released
** Changed in: pam-python (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a mem
** Also affects: pam-python (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: pam-python (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: pam-python (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: pam-python (Ubu
** Also affects: pam-python (Ubuntu Bionic)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901606
Title:
security update broke module import in libpam-pyt
It may actually be caused because Py_NoSiteFlag is set. I'm still
investigating.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1901606
Title:
security update broke module import in libpam-python, "f
The issue occurs because the patch sets Py_NoUserSiteDirectory. I'm
currently looking into a fix.
For a temporary workaround, you can `sudo apt install libpam-
python=1.0.4-1` and then pin the package version by following the steps
here: https://serverfault.com/questions/435132/how-to-version-lock
** Also affects: pam-python (Ubuntu Xenial)
Importance: Undecided
Status: New
** Changed in: pam-python (Ubuntu)
Status: New => Confirmed
** Changed in: pam-python (Ubuntu Xenial)
Status: New => Confirmed
--
You received this bug notification because you are a member of
I haven't yet tried to reproduce it. It also works fine for me. My only
guess at this point is there's some difference between a machine that
has been upgrade to focal and a machine that has a freshly installed
focal.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Public bug reported:
On some focal 20.04 systems, users are seeing "QEMU/KVM - Not Connected"
when they attempt to use virt-manager to manage virtual machines.
AppArmor denials like the following are seen in the logs:
sudo grep libvirt /var/log/syslog | grep -i apparmor | grep -i denied
Jun 28 14
Public bug reported:
OS
Ubuntu Focal Fossa 20.04
Snapcraft Version
snapcraft, version 4.1.3
Contrary to the status of
https://bugs.launchpad.net/ubuntu/+source/snapcraft/+bug/1724788, not all umask
issues are fixed.
In general, I set my umask to 027 on my systems. When `snapcraft init`
is ru
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1608239 ***
https://bugs.launchpad.net/bugs/1608239
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1884380
Title:
screen lock and wifi hotspot is not working
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
nothing to add
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: gnome-shell 3.36.1-5ubuntu2
ProcVersionSignature: Ubuntu 5.4.0-29.33-generic 5.4.30
Uname: Linux 5.4.0-29-generic x86_64
ApportVersion: 2.20.11-0ubuntu27
Architecture: amd64
CasperMD5CheckResult: skip
Curren
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873794
Title:
Unattended upgrades fixes missing from security repo
To manage noti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Your bug report is more likely to get attention if it is made in
English, since this is the language understood by the majority of Ubuntu
developers. Additionally, please only mark a bug as "security" if it
shows evid
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872993
Title:
Security vulnerabilities of version 5.7.29
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1873514
Title:
Ubuntu uses insecure FreeRDP version
To manage notifications about
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I reviewed lxd-agent-loader 0.3 as checked into focal. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
lxd-agent-loader is just 2 systemd units. As such, this package does not really
have much of an attack surface to speak of. There's no code, just 2
configu
I reviewed python-tabulate 0.8.6-0ubuntu2 as checked into focal. This
shouldn't be
considered a full audit but rather a quick gauge of maintainability.
python-tabulate is both a library and command-line utility that pretty-prints
tabular data. It is written in Python and can create tables in a w
If possible, try to participate in the bug report that I have opened on gitlab
and to share your experiences
If I am the only one discussing the problem, it will hardly be considered soon
https://gitlab.freedesktop.org/drm/intel/issues/1377
--
You received this bug notification because you are
https://gitlab.freedesktop.org/drm/intel/issues/1377
This is the first time I open a report, so I don't know if I did it
correctly
PS: in the initial part I reported the problem as it was written by the
user who opened the bug here, I hope it is not a problem
** Bug watch added: gitlab.freedeskt
I confirm the bug
The bug applies to all the distros I have tried:
Ubuntu; Linux Mint; Manjaro; Fedora; Opensuse etc.
I also tried various DEs: Kde, Gnome, Cinnamon, Xfce, Mate etc.
It's a general problem, not just of mutter and Gnome
The bug exists only with Mesa and Modesetting, if you install xf
Released 6.0.3p1-6ubuntu0.2 for eoan
** Changed in: opensmtpd (Ubuntu Eoan)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864707
Title:
arbitrary command e
Released 6.0.3p1-1ubuntu0.2 for bionic.
** Changed in: opensmtpd (Ubuntu Bionic)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864707
Title:
arbitrary com
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1862705
Title:
firefox package vulnerable
To manage notifications about this bug g
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
Moodle in 18.04 and later does not work at all. The bug discussed in [1]
manifests as a result of moodle 3.0.3 requiring php5.4.x, php5.5.x, or
php7.0.x. PHP7.2 and later are available in ubuntu 18.04 and later, but
these version of PHP are not compatible with moodle 3.0.3 [2]
Similar here, issue with power management.
While dell 7530 with 35gb and 18.04.
Most of the time doesn't boot for powermanagement issue. Most of the time I
have to powercycle again, sometimes boots but i2c devices aren't enabled
(touchpad), 15% everything works.
[ 106.412564] usb usb3: New USB
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853545
Title:
discover did not ask for a password on an update
To manage notifica
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853371
Title:
discover did not ask for a password on an update
To manage notifica
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1850032
Title:
scanbd prevents HP printers to work correctly with HPLIP
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Same here:
[34617.702285] NETDEV WATCHDOG: eth0 (r8152): transmit queue 0 timed out
[34617.702302] WARNING: CPU: 0 PID: 0 at
/build/linux-hwe-9kWQFX/linux-hwe-5.0.0/net/sched/sch_generic.c:461
dev_watchdog+0x221/0x230
[34617.702303] Modules linked in: md4 nls_utf8 cifs ccm fscache snd_usb_audio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
This bug describes errors in the upstream version of the software, not
the version packaged with Ubuntu.
** Changed in: jhead (Ubuntu)
Status: New => Invalid
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a membe
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
1 - 100 of 599 matches
Mail list logo