Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Changed in: poppler (Ubuntu)
Status: New => Confirmed
** Changed in: poppler (Ubuntu)
Importance: Undecided => Low
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959591
Title:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960469
Title:
package mysql-server-8.0 8.0.28-0ubuntu0.20.04.3 failed to
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960736
Title:
Libnss3 doesn't log SEC_ERROR_UNKNOWN_PKCS11_ERROR properly ( NSS
error
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
We are still waiting for the bug reporter to test the packages, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951490
Title:
Can't print after update to 4.13
To manage notifications about
Unfortunately, as Oracle does not provide details on the exact security
issues that get CVEs assigned, we are unable to backport patches for
MySQL and are forced to update to newer MySQL releases.
The removal of TLSv1 and TLSv1.1 is an upstream change in MySQL 8.0.28.
Unfortunately, pinning an
8.0.28-0ubuntu0.20.04.3 is the current version, and it still contains
the patch for this issue.
What version did you install that triggered the issue, and where did you
get it?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I've uploaded a test package for focal into the security team ppa here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Could you please test it and see if it fixes your printing problem?
Thanks!
--
You received this bug notification because you are a member of
ACK from the security team on the changes in the MP.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1863930
Title:
SSH 1.99 clients fail to connect to openssh-server 1:7.6p1-4ubuntu0.3
To manage
This update needs to go in the -security pocket since it is a security
fix, but it likely can't just be copied, it would need to be rebuilt.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
Thanks for testing!
https://ubuntu.com/security/notices/USN-5191-1
** Changed in: flatpak (Ubuntu)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946578
The following updates may help with this issue in certain environments:
https://ubuntu.com/security/notices/USN-5174-2
https://ubuntu.com/security/notices/USN-5142-3
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I have uploaded packages that include an additional regression fix into
the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Unfortunately the whole point of the security update was to change how
name lookups work. There is more information on the changes in the
upstream advisory here:
https://www.samba.org/samba/security/CVE-2020-25717.html
--
You received this bug notification because you are a member of Ubuntu
I wonder if the new "min domain uid" parameter is related to this issue.
See:
https://www.samba.org/samba/security/CVE-2020-25717.html
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-25717
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
This was released today: https://ubuntu.com/security/notices/USN-5179-1
** Changed in: busybox (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953337
Thanks for reporting this issue, but the exploit linked above is not the
exploit for CVE-2021-21703, but an exploit for an unfixed use-after-free
in SplDoublyLinkedList which upstream doesn't consider to be a security
issue. It can be used to escape the sandbox, which is why it was used as
the
** Changed in: samba (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953231
Title:
Samba vfs_full_audit not working as it should
To manage notifications about
** Changed in: samba (Ubuntu Bionic)
Status: New => Fix Released
** Changed in: samba (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
It's "low" because I don't believe our use of busybox runs untrusted awk
scripts.
There are test packages available in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
They will probably be released this week.
--
You received this bug
Hi,
The patch was backported from Squid 4 as no patch for Squid 3 was
available. The code in wccp2.cpp is almost identical. The resulting code
in wccp2.cpp is almost identical to the code in 4.13 in impish, so I
suspect you'll hit the same regression with current versions of Squid.
The only two
I've uploaded updated Bionic packages that fix Samba bug #14901 in the
security team's PPA here for testing:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
** Changed in: samba (Ubuntu Jammy)
Status: In Progress => Fix Committed
--
You received this bug
I've uploaded updated packages that include the upstream fix in the
security team's PPA here for testing:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If you do try them out, please let us know in this bug if that helped in
your environment. Thanks!
--
You
The packages released with USN-5142-1 did contain the fix for Samba bug
#14899, but not for Samba bug #14901. I've uploaded updated packages
that do fix bug #14901 in the security team's PPA here for testing:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If you
Upstream updated the bug to indicate multichannel is to be disabled in
4.13.
It looks like it's an experimental feature that finally got completed in
4.15, per the release notes.
Since they will not be providing a fix for 4.13, and there is a
workaround for the issue, we are closing this bug.
I don't see opendir and chown in the manpage, there may be others that
need fixing:
https://www.samba.org/samba/docs/4.13/man-html/vfs_full_audit.8.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
LGTM, uploading now. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946007
Title:
pkcs11-helper: Fail to build against OpenSSL 3.0
To manage notifications about this bug go to:
This is possibly a dupe of bug 1950803
Do you have "smbd_audit[.]: Could not find opname rename, logging
all" in your log files?
If so, you need to use renameat and unlinkat instead of rename and
unlink.
** Changed in: samba (Ubuntu)
Status: New => Incomplete
--
You received this
ACK on the package. Looks good, uploaded. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945795
Title:
krb5: Fail to build against OpenSSL 3.0
To manage notifications about this bug go to:
Oh! Right, I didn't notice it was just an extra changelog entry for the
ppa.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945795
Title:
krb5: Fail to build against OpenSSL 3.0
To manage
Hi, thanks for preparing the package, but to be sponsored the
debian/changelog needs a better description than "PPA upload". Could you
please update it with an appropriate changelog including the patch name,
what the patch does, and a LP tag to this bug?
Thanks!
--
You received this bug
That is correct, samba 4.7.6 in bionic is not vulnerable to
CVE-2021-23192.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950363
Title:
Nov 2021 security update tracking bug
To manage
** Bug watch added: Debian Bug tracker #998355
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998355
** Also affects: samba via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998355
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a
** Bug watch added: Samba Bugzilla #14918
https://bugzilla.samba.org/show_bug.cgi?id=14918
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14918
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
In case we end up having to update bionic to a more recent samba, I've
stuck the update package and dependencies in my ppa here:
https://launchpad.net/~mdeslaur/+archive/ubuntu/testing/+packages
The current plan is to use the update in comment #5.
--
You received this bug notification because
There is an updated Samba package for bionic in the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
It contains fixes for CVE-2016-2124, CVE-2020-25717, CVE-2020-25722 and
CVE-2021-3671 which appear to be the most severe issues. Upstream has
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1944788
Title:
URI defined for connectivity check is relative to search domain
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945388
Title:
opening application
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
If you look into the openvpn configuration file that Network Manager
creates for your connection in /etc/NetworkManager/system-connections,
could you please paste the [ipv4] and [ipv6] sections?
** No longer affects: ubuntu
** Changed in: network-manager (Ubuntu)
Status: New =>
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948714
Title:
After reboot, the password set at install time doesn't work.
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
This was fixed in the following update:
https://ubuntu.com/security/notices/USN-5127-1
** Information type changed from Private Security to Public Security
** Changed in: webkitgtk (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949225
Title:
screen lock is not
** Package changed: linux (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950035
Title:
suspend does not
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Summary changed:
- security issue!
+ When screen is locked the top bar with apps shows
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
** Information type changed from Private Security to Public
** Changed in: golang-github-cloudflare-cfssl (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/freecad/+bug/1951748/+attachment/5542454/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Bug watch added: Samba Bugzilla #14867
https://bugzilla.samba.org/show_bug.cgi?id=14867
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14867
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
ACK on the debdiffs, I've uploaded them with a slight changelog
formatting change, and I've specified a specific version for the
libseccomp Build-Depends on bionic and focal.
I've build the packages, along with the required libseccomp updates in
the following PPA:
@alex Do you think we can do a no-change rebuild of libseccomp into
bionic-security and focal-security? Are there any dependencies we need
to rebuild too?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Bug watch added: Samba Bugzilla #14910
https://bugzilla.samba.org/show_bug.cgi?id=14910
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14910
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Older releases of Ubuntu used a group called "admin" instead of "sudo"
which is the name Debian chose later on.
We need to maintain the "admin" group rights in our sudoers file for
people upgrading from earlier Ubuntu releases. If we remove it, they
will no longer have sudo rights after
Fixing this issue on Ubuntu 18.04 LTS is going to be problematic.
The backport to 4.10 of the patchset to fix most of the CVEs contains
686 commits. Backporting that to bionic's 4.7.6 may not be feasible.
The main issue with updating bionic to 4.13.14 is the lack of support
for python 2.7. I
A security update for Impish was just released which bumped samba to a
whole new version. I don't think this is necessary anymore.
https://ubuntu.com/security/notices/USN-5142-1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
201 - 300 of 12539 matches
Mail list logo