[Bug 1950363] [NEW] Nov 2021 security update tracking bug

2021-11-09 Thread Marc Deslauriers
vulnerability. https://www.samba.org/samba/security/CVE-2021-23192.html ** Affects: samba (Ubuntu) Importance: Undecided Assignee: Marc Deslauriers (mdeslaur) Status: In Progress ** Affects: samba (Ubuntu Bionic) Importance: Undecided Status: New

[Bug 1943842] Re: rustc 1.53 and cargo 0.54 required by firefox 94

2021-11-01 Thread Marc Deslauriers
Just FYI, I may use cmake-mozilla to build webkit2gtk too since the newer version also requires a newer cmake... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1943842 Title: rustc 1.53 and cargo

[Bug 1947994] Re: MySQL Server Multiple Vulnerabilities

2021-10-25 Thread Marc Deslauriers
https://ubuntu.com/security/notices/USN-5123-1 ** Changed in: mysql-5.7 (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1947994 Title: MySQL

[Bug 1948657] Re: Oct 2021 security update tracking bug

2021-10-25 Thread Marc Deslauriers
** Changed in: apport (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1948657 Title: Oct 2021 security update tracking bug To manage notifications about

[Bug 1948657] [NEW] Oct 2021 security update tracking bug

2021-10-25 Thread Marc Deslauriers
*** This bug is a security vulnerability *** Public security bug reported: This is the tracking bug for the October 2021 security udpdate. ** Affects: apport (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1945311] Re: Fix for CVE-2021-40438 breaks existing configs

2021-09-28 Thread Marc Deslauriers
** Changed in: apache2 (Ubuntu Impish) Status: Confirmed => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1945311 Title: Fix for CVE-2021-40438 breaks existing configs To

[Bug 1945311] Re: Fix for CVE-2021-40438 breaks existing configs

2021-09-28 Thread Marc Deslauriers
The updates are currently building in the security team PPA here, in case someone wants to try them before they are published: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1945311] Re: Fix for CVE-2021-40438 breaks existing configs

2021-09-28 Thread Marc Deslauriers
** Changed in: apache2 (Ubuntu Bionic) Importance: Undecided => High ** Changed in: apache2 (Ubuntu Focal) Importance: Undecided => High ** Changed in: apache2 (Ubuntu Hirsute) Importance: Undecided => High ** Changed in: apache2 (Ubuntu Impish) Importance: Undecided => High --

[Bug 1945311] Re: Fix for CVE-2021-40438 breaks existing configs

2021-09-28 Thread Marc Deslauriers
Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: apache2 (Ubuntu Focal) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: apache2 (Ubuntu Hirsute) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: apache2 (Ubuntu Imp

[Bug 1945311] Re: Fix for CVE-2021-40438 breaks existing configs

2021-09-28 Thread Marc Deslauriers
Here are the 2.4.x backports: https://github.com/apache/httpd/commit/6e768a811c59ca6a0769b72681aaef381823339f https://github.com/apache/httpd/commit/81a8b0133b46c4cf7dfc4b5476ad46eb34aa0a5c I will prepare updates that add those commits and will release them likely today. -- You received this

[Bug 1944481] Re: Distrust "DST Root CA X3"

2021-09-23 Thread Marc Deslauriers
** Changed in: ca-certificates (Ubuntu Impish) Status: New => Fix Committed ** Changed in: ca-certificates (Ubuntu Trusty) Status: New => Fix Released ** Changed in: ca-certificates (Ubuntu Xenial) Status: New => Fix Released -- You received this bug notification because

[Bug 1912050] Re: Use after free in libgetdata v0.10.0 may lead to arbitrary code execution

2021-09-23 Thread Marc Deslauriers
** Changed in: libgetdata (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1912050 Title: Use after free in libgetdata v0.10.0 may lead to arbitrary code

[Bug 1923273] Re: buffer-overflow on libcaca-0.99.beta20/export.c export_tga, export_troff

2021-09-23 Thread Marc Deslauriers
** Changed in: libcaca (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1923273 Title: buffer-overflow on libcaca-0.99.beta20/export.c export_tga,

[Bug 1933832] Re: Path traversal leads to arbitrary file read

2021-09-23 Thread Marc Deslauriers
** Changed in: openjdk-13 (Ubuntu) Status: New => Won't Fix ** Changed in: openjdk-14 (Ubuntu) Status: New => Won't Fix ** Changed in: openjdk-15 (Ubuntu) Status: New => Won't Fix ** Changed in: openjdk-16 (Ubuntu) Status: New => Won't Fix ** Changed in: openjdk-17

[Bug 1939870] Re: The package fail2ban is vulnerable to arbitrary command execution via CVE-2021-32749.

2021-09-23 Thread Marc Deslauriers
** Changed in: fail2ban (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1939870 Title: The package fail2ban is vulnerable to arbitrary command execution via

[Bug 1942542] Re: gedit causes loss of extended attributes (xattrs)

2021-09-23 Thread Marc Deslauriers
** Also affects: gedit via https://gitlab.gnome.org/GNOME/gedit/-/issues/464 Importance: Unknown Status: Unknown ** Changed in: gedit (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the

[Bug 1943734] Re: package lxd (not installed) failed to install/upgrade: il sottoprocesso nuovo pacchetto lxd script pre-installation ha restituito lo stato di errore 1

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1943757] Re: package publicfile-installer 0.14 failed to install/upgrade: il sottoprocesso installato pacchetto publicfile-installer script post-installation ha restituito lo stato di errore 1

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1943760] Re: package radioclk 1.0.pristine-2 failed to install/upgrade: il sottoprocesso installato pacchetto radioclk script post-installation ha restituito lo stato di errore 1

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1943758] Re: package shim-signed 1.40.7+15.4-0ubuntu9 failed to install/upgrade: il sottoprocesso installato pacchetto shim-signed script post-installation ha restituito lo stato di errore 7

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1944090] Re: package libmpeg2encpp-2.1-0:amd64 1:2.1.0+debian-6build1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configurat

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1944385] Re: REGRESSION: After GRUB update, 32-bit Ubuntu is no more bootable

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1944505] Re: package mysql-server-8.0 8.0.26-0ubuntu0.20.04.2 failed to install/upgrade: installed mysql-server-8.0 package post-installation script subprocess returned error exit status 1

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1944464] Re: gnome-screensaver locked screen leaks text to underlying windows

2021-09-23 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security ** Changed in: gnome-screensaver (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1944464

[Bug 1944703] Re: grub error

2021-09-23 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1944481] Re: Distrust "DST Root CA X3"

2021-09-23 Thread Marc Deslauriers
) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: ca-certificates (Ubuntu Focal) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: ca-certificates (Ubuntu Hirsute) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: ca-cer

[Bug 1944120] [NEW] Regression in USN-5079-1

2021-09-20 Thread Marc Deslauriers
*** This bug is a security vulnerability *** Public security bug reported: USN-5079-1 introduced a regression in bionic: https://ubuntuforums.org/showthread.php?t=2467177 Focal+ appear to work as intended. ** Affects: curl (Ubuntu) Importance: Undecided Status: New -- You

[Bug 1933832] Re: Path traversal leads to arbitrary file read

2021-09-16 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1933832 Title: Path traversal leads to arbitrary file read To manage

[Bug 1934308] Re: Arbitrary file read in general hook (ubuntu.py)

2021-09-16 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1934308 Title: Arbitrary file read in general hook (ubuntu.py) To manage

[Bug 1940656] Re: Potential use after free bugs in 1.1.1

2021-09-14 Thread Marc Deslauriers
I'd rather these go through the SRU process first, and they will get picked up automatically next time we do an openssl security update. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940656 Title:

[Bug 1940314] Re: Aug 2021 security update

2021-09-07 Thread Marc Deslauriers
** Changed in: haproxy (Ubuntu Impish) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940314 Title: Aug 2021 security update To manage notifications

[Bug 1928648] Re: expiring trust anchor compatibility issue

2021-09-07 Thread Marc Deslauriers
The backported patches in comments #1 and #2 look reasonable to me. +1 from the security team. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1928648 Title: expiring trust anchor compatibility issue

[Bug 1921518] Re: OpenSSL "double free" error

2021-08-25 Thread Marc Deslauriers
No, they do not include the fixes from this bug. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1921518 Title: OpenSSL "double free" error To manage notifications about this bug go to:

[Bug 1934040] Re: openssl s_client's '-ssl2' & '-ssl3' options gone, prematurely!

2021-08-24 Thread Marc Deslauriers
Thanks for reporting this issue, but we disabled SSLv3 in 2015 in Ubuntu 16.04 LTS. There is absolutely no chance we will be enabling it again. ** Changed in: openssl (Ubuntu) Status: New => Won't Fix -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1940314] Re: Aug 2021 security update

2021-08-18 Thread Marc Deslauriers
** Changed in: haproxy (Ubuntu Impish) Status: New => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1940314 Title: Aug 2021 security update To manage notifications about this

[Bug 1940314] Re: Aug 2021 security update

2021-08-17 Thread Marc Deslauriers
** Changed in: haproxy (Ubuntu Focal) Status: In Progress => Fix Released ** Changed in: haproxy (Ubuntu Hirsute) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1940314] [NEW] Aug 2021 security update

2021-08-17 Thread Marc Deslauriers
(Ubuntu Focal) Importance: Medium Assignee: Marc Deslauriers (mdeslaur) Status: In Progress ** Affects: haproxy (Ubuntu Hirsute) Importance: Medium Assignee: Marc Deslauriers (mdeslaur) Status: In Progress ** Affects: haproxy (Ubuntu Impish) Importance

[Bug 1939898] Re: Unnatended postgresql-12 upgrade caused MAAS internal error

2021-08-13 Thread Marc Deslauriers
I suspect the MAAS snap has embedded some postgresql components while relying on some other components from the system, and this mismatch is causing the issue loading the newer shared library... -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1934501] Re: CVE-2018-15473 patch introduce user enumeration vulnerability

2021-08-12 Thread Marc Deslauriers
Here's the debconf bug report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=223683 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1934501 Title: CVE-2018-15473 patch introduce user enumeration

[Bug 1934501] Re: CVE-2018-15473 patch introduce user enumeration vulnerability

2021-08-12 Thread Marc Deslauriers
This isn't specific to the openssh update. Debian packages use tools such as debconf that need to write to /tmp to function correctly. ** Bug watch added: Debian Bug tracker #223683 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=223683 -- You received this bug notification because you are

[Bug 1934501] Re: CVE-2018-15473 patch introduce user enumeration vulnerability

2021-08-12 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1934501 Title: CVE-2018-15473 patch introduce user enumeration vulnerability To

[Bug 1923527]

2021-08-10 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1935076] Re: ubuntu-bug sends huge amounts of internal data to public bugs without asking for permission

2021-08-10 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security ** Changed in: apport (Ubuntu) Status: Incomplete => Confirmed ** Changed in: apport (Ubuntu) Importance: Undecided => Wishlist -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 1933811] Re: ayatana-indicator-printers-service crashed with SIGSEGV in __GI_____strtol_l_internal()

2021-08-10 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1933764] Re: slow rendering with nvidia geforce gtx 1650

2021-08-10 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1935690] Re: Lock Screen Failure - Desktop Contents Momentarily Visible

2021-08-10 Thread Marc Deslauriers
** Package changed: unity (Ubuntu) => gnome-shell (Ubuntu) ** Changed in: gnome-shell (Ubuntu) Status: New => Triaged -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1935690 Title: Lock

[Bug 1937883] Re: ssh-agent Shielded Private Key Extraction

2021-08-10 Thread Marc Deslauriers
** Changed in: openssh (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1937883 Title: ssh-agent Shielded Private Key Extraction To manage notifications about

[Bug 1939281]

2021-08-10 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1938730] Re: GPSD time will jump back 1024 weeks at after week=2180 (23-October-2021)

2021-08-05 Thread Marc Deslauriers
I have uploaded new packages to the PPA that enables the test suite and adds updated binary tests. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1938730 Title: GPSD time will jump back

[Bug 1938730] Re: GPSD time will jump back 1024 weeks at after week=2180 (23-October-2021)

2021-08-05 Thread Marc Deslauriers
Thanks for the hints bzed. Thanks for the tests paride. I am currently working on enabling the test suite during build on focal and re-enabling the binary tests on focal and hirsute. I'll have updated packages in the PPA soon. -- You received this bug notification because you are a member of

[Bug 1938730] Re: GPSD time will jump back 1024 weeks at after week=2180 (23-October-2021)

2021-08-04 Thread Marc Deslauriers
I have uploaded packages for focal and hirsute to the security team PPA here: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages I'd appreciate it if someone could test them. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs,

[Bug 1938730] Re: GPSD time will jump back 1024 weeks at after week=2180 (23-October-2021)

2021-08-04 Thread Marc Deslauriers
Upstream patch: https://gitlab.com/gpsd/gpsd/-/commit/7f30d88d04dc62b8bd6265ad1d09d72d220f97f6 Debian patch: https://salsa.debian.org/debian-gps-team/pkg-gpsd/-/commit/2df40c7640dcbc5cbc48969bec44932623ef243b

[Bug 1938013] Re: 4.15.0-151 is freezing various CPUs

2021-07-28 Thread Marc Deslauriers
> A test kernel is available here: https://kernel.ubuntu.com/~juergh/lp1938013/ I found a laptop running bionic. Updated to the newest archive kernel and rebooted. Hit the regression immediately, dmesg would show kernel errors right after the wlan0 lines. With the test kernel, I've been running

[Bug 1937286] Re: containerd depends on unreleased docker19 package in focal

2021-07-26 Thread Marc Deslauriers
** Changed in: containerd (Ubuntu Bionic) Status: In Progress => Invalid ** Changed in: containerd (Ubuntu Focal) Status: In Progress => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1937286] Re: containerd depends on unreleased docker19 package in focal

2021-07-23 Thread Marc Deslauriers
ker.io (Ubuntu Bionic) Status: New => In Progress ** Changed in: docker.io (Ubuntu Bionic) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: docker.io (Ubuntu Focal) Status: New => In Progress ** Changed in: docker.io (Ubuntu Focal) Assign

[Bug 1937286] Re: containerd depends on unreleased docker19 package in focal

2021-07-23 Thread Marc Deslauriers
> Invalid ** Changed in: containerd (Ubuntu Impish) Status: Incomplete => Invalid ** Changed in: containerd (Ubuntu Bionic) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: containerd (Ubuntu Focal) Assignee: (unassigned) => Marc Deslauriers (mdesla

[Bug 1927161] Re: dpkg-source: error: diff 'openssl/debian/patches/pr12272.patch' patches files multiple times; split the diff in multiple files or merge the hunks into a single one

2021-07-23 Thread Marc Deslauriers
> I am quite surprised by this behaviour. I'm not, I hit it all the time with git-style multiple patches in one file. I always split them into multiple files now. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1928989] Re: expiring trust anchor compatibility issue

2021-07-09 Thread Marc Deslauriers
I think the patch in comment #1 looks reasonable. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1928989 Title: expiring trust anchor compatibility issue To manage notifications about this bug go

[Bug 1917904] Re: Arbitrary file reads

2021-06-29 Thread Marc Deslauriers
** Changed in: apport (Ubuntu Impish) Assignee: SatoshiNakamoto (evansanita713) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917904 Title: Arbitrary file reads To manage

[Bug 1925467] Re: stack-buffer-overflow of text.c in function _import_ansi

2021-06-22 Thread Marc Deslauriers
** Bug watch added: github.com/cacalabs/libcaca/issues #55 https://github.com/cacalabs/libcaca/issues/55 ** Also affects: libcaca via https://github.com/cacalabs/libcaca/issues/55 Importance: Unknown Status: Unknown ** Changed in: libcaca (Ubuntu) Status: New => Triaged

[Bug 1925468] Re: stack-buffer-overflow of import.c in function _import_bin

2021-06-22 Thread Marc Deslauriers
** Bug watch added: github.com/cacalabs/libcaca/issues #56 https://github.com/cacalabs/libcaca/issues/56 ** Also affects: libcaca via https://github.com/cacalabs/libcaca/issues/56 Importance: Unknown Status: Unknown ** Changed in: libcaca (Ubuntu) Status: New => Triaged

[Bug 1931486] Re: Please update to irssi 1.2.3 for security fixes

2021-06-22 Thread Marc Deslauriers
I don't see any CVEs assigned to the new version. Do you have details on what the exact security issues are? ** Information type changed from Private Security to Public Security ** Changed in: irssi (Ubuntu) Status: New => Incomplete ** Changed in: irssi (Ubuntu) Importance: Undecided

[Bug 1931909] Re: firefox v89 causes Lubuntu 20.10 to hang on dell d630

2021-06-22 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1932973] Re: package libuno-purpenvhelpergcc3-3 1:6.4.7-0ubuntu0.20.04.1 failed to install/upgrade: package is in a very bad inconsistent state; you should reinstall it before attempting configu

2021-06-22 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1933029] Re: Touchpad not working

2021-06-22 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1933054] Re: package tipa 2:1.3-20 failed to install/upgrade: installed tipa package post-installation script subprocess returned error exit status 2

2021-06-22 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1933126] Re: Error on 'apt update' on Ubuntu 20.10 (Groovy)

2021-06-22 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1932297] Re: 8:6.9.7.4+dfsg-16ubuntu6.11 break pcx 1bit creation

2021-06-21 Thread Marc Deslauriers
I can reproduce it on 20.04, but it's not a regression caused by a security update. This is the original package 20.04 shipped with: $ dpkg -l | grep imagemagick ii imagemagick-6-common 8:6.9.10.23+dfsg-2.1ubuntu11 all image manipulation programs --

[Bug 1932297] Re: 8:6.9.7.4+dfsg-16ubuntu6.11 break pcx 1bit creation

2021-06-21 Thread Marc Deslauriers
Unfortunately, I still can't reproduce the issue with the test file you've sent me: $ dpkg -l | grep imagemagick ii imagemagick8:6.9.7.4+dfsg-16ubuntu6.11 amd64image manipulation programs -- binaries ii imagemagick-6-common

[Bug 1917904] Re: Arbitrary file reads

2021-06-19 Thread Marc Deslauriers
** Changed in: apport (Ubuntu Bionic) Assignee: SatoshiNakamoto (evansanita713) => (unassigned) ** Changed in: apport (Ubuntu Focal) Assignee: SatoshiNakamoto (evansanita713) => (unassigned) ** Changed in: apport (Ubuntu Groovy) Assignee: SatoshiNakamoto (evansanita713) =>

[Bug 1917904] Re: Arbitrary file reads

2021-06-19 Thread Marc Deslauriers
** Changed in: apport (Ubuntu Bionic) Assignee: SatoshiNakamoto (evansanita713) => (unassigned) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917904 Title: Arbitrary file reads To manage

[Bug 1932297] Re: 8:6.9.7.4+dfsg-16ubuntu6.11 break pcx 1bit creation

2021-06-18 Thread Marc Deslauriers
Thanks for reporting this issue. I am going to need a test image to reproduce this. I tried reproducing it with some gif test images, but didn't not manage to find one that displays the broken behaviour. ** Changed in: imagemagick (Ubuntu) Status: New => Incomplete ** Information type

[Bug 1890858] Re: AppArmor profile causes QEMU/KVM - Not Connected

2021-06-14 Thread Marc Deslauriers
While I'm not really up-to-speed on how libvirt is confined, I can't really think of any alternative to handling this properly than adding the new rule. +1 from me. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
Great, thanks for giving it a try. I will release it now. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931507 Title: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2 To manage notifications about

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
OK, I believe I've found the cause of the second regression. I have uploaded an update to the security team PPA for building here: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages The actual binary package is located here:

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
I'm investigating the second crash. What services are being run on the servers that are still crashing after the update? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931507 Title: rpcbind failing

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
It's still in the process of being copied over from launchpad to the web servers. It should be done soon. In the meantime, here's a direct link to the binary package:

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
The fix has been released, it will take a few minutes to replicate to the web servers and mirrors. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931507 Title: rpcbind failing on

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
The previous version is available here: https://launchpad.net/ubuntu/+source/rpcbind/0.2.3-0.6ubuntu0.18.04.1/+build/19780512/+files/rpcbind_0.2.3-0.6ubuntu0.18.04.1_amd64.deb -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
I will publish the fix within the hour -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1931507 Title: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2 To manage notifications about this bug go to:

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
I believe the following commit is missing: https://git.linux- nfs.org/?p=steved/rpcbind.git;a=commit;h=c49a7ea639eb700823e174fd605bbbe183e229aa I am building packages now. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
I can confirm the update caused a regression. I will investigate and will publish a fix shortly. ** Information type changed from Public to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1931572] Re: rpcbind restarts every 10 seconds since this morning

2021-06-10 Thread Marc Deslauriers
*** This bug is a duplicate of bug 1931507 *** https://bugs.launchpad.net/bugs/1931507 ** This bug has been marked a duplicate of bug 1931507 rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1931616] Re: June 10, 2021 rpcbind security update continually crashes

2021-06-10 Thread Marc Deslauriers
*** This bug is a duplicate of bug 1931507 *** https://bugs.launchpad.net/bugs/1931507 ** This bug has been marked a duplicate of bug 1931507 rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to

[Bug 1931507] Re: rpcbind failing on 0.2.3-0.6ubuntu0.18.04.2

2021-06-10 Thread Marc Deslauriers
** Changed in: rpcbind (Ubuntu) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: rpcbind (Ubuntu) Importance: Undecided => Critical -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1925280] Re: rpcbind still vulnerable with CVE-2017-8779

2021-06-09 Thread Marc Deslauriers
Thanks for reporting the issue! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1925280 Title: rpcbind still vulnerable with CVE-2017-8779 To manage notifications about this bug go to:

[Bug 1925280] Re: rpcbind still vulnerable with CVE-2017-8779

2021-06-09 Thread Marc Deslauriers
An update has now been published to fix this issue: https://ubuntu.com/security/notices/USN-4986-1 Thanks! ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1919977] Re: heap-buffer-overflow in old libwebp

2021-06-08 Thread Marc Deslauriers
There was an update to libwebp that fixed a bunch of security issues: https://ubuntu.com/security/notices/USN-4971-1 Could you test again to see if the issue is resolved? Thanks! ** Changed in: libwebp (Ubuntu) Status: New => Incomplete -- You received this bug notification because you

[Bug 1930917] Re: Latest isc-dhcp-server rejects proper dhcpd.conf

2021-06-07 Thread Marc Deslauriers
Thanks for reporting the issue! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1930917 Title: Latest isc-dhcp-server rejects proper dhcpd.conf To manage notifications about this bug go to:

[Bug 1930917] Re: Latest isc-dhcp-server rejects proper dhcpd.conf

2021-06-07 Thread Marc Deslauriers
med ** Changed in: isc-dhcp (Ubuntu Hirsute) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: isc-dhcp (Ubuntu Impish) Assignee: (unassigned) => Marc Deslauriers (mdeslaur) ** Changed in: isc-dhcp (Ubuntu Hirsute) Importance: Undecided => Critical ** Cha

[Bug 1929304] Re: file-roller / gnome archive manager fails to extract

2021-06-04 Thread Marc Deslauriers
Status: New ** Also affects: gnome-autoar (Ubuntu Hirsute) Importance: Undecided Status: New ** Also affects: gnome-autoar (Ubuntu Groovy) Importance: Undecided Status: New ** Changed in: gnome-autoar (Ubuntu Bionic) Assignee: (unassigned) => Marc Deslauri

[Bug 1917904] Re: Arbitrary file reads

2021-05-25 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1917904 Title: Arbitrary file reads To manage notifications about this bug go to:

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-24 Thread Marc Deslauriers
Oh, I seem to have overlooked that one. We are hitting the exact same issue with the new postgresql releases, so it's unrelated to the pam SRU: https://bugs.launchpad.net/ubuntu/+source/postgresql-12/+bug/1928773/comments/2 -- You received this bug notification because you are a member of

[Bug 1927796] Re: [SRU]pam_tally2 can cause accounts to be locked by correct password. pam_faillock use is the recommended fix

2021-05-19 Thread Marc Deslauriers
Autopkgtests in comments #14 to #17 passed on retries except for openssh which appears to be failing because of a date issue, which is unrelated to the pam SRU. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1927755] Re: Fix for CVE-2020-28007 causes build failure when DMARC is enabled

2021-05-18 Thread Marc Deslauriers
Making this bug public in case others have a similar issue. ** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1927755 Title: Fix

[Bug 1926300] Re: clamdscan - MULTISCAN parameter causes Segmentation fault error

2021-05-17 Thread Marc Deslauriers
Please stop changing the status on this bug. Since Xenial is now in Extended Security Maintenance, the fix was pushed to the ESM repository for Xenial. The "Fix Released" status on this bug is accurate. See the following for more information on Extended Security Maintenance:

[Bug 1928381] Re: Fixes for CVE-2021-31153, CVE-2021-31154 and CVE-2021-31155

2021-05-14 Thread Marc Deslauriers
I have uploaded a new version of the package to the PPA that fixed the missing setuid bits. Please test and comment in this bug. Thanks! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1928381 Title:

[Bug 1928381] Re: Fixes for CVE-2021-31153, CVE-2021-31154 and CVE-2021-31155

2021-05-14 Thread Marc Deslauriers
Per discussion on irc, the updated package doesn't setuid on the /usr/bin/please and /usr/bin/pleaseedit binaries. Looking into the issue revealed that the package shipped in hirsute has the same issue. The debian/rules file overrides dh_fixperms to set the setuid bit on the binaries, but on

[Bug 1926957] Re: security fix in pip 21.1: Don't split git references on unicode separators #9827

2021-05-14 Thread Marc Deslauriers
ACK on the debdiff in comment #3. I have uploaded the package for building in the security team PPA here: https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages Once it is built, could you please test it, and describe the testing you've performed, and I'll release it as a

[Bug 1928381] Re: Fixes for CVE-2021-31153, CVE-2021-31154 and CVE-2021-31155

2021-05-14 Thread Marc Deslauriers
Thanks for reporting this issue. I have uploaded a package, along with an appropriate changelog entry, into the security team PPA here: https://launchpad.net/~ubuntu-security- proposed/+archive/ubuntu/ppa/+packages Please test the package once built, and if it tests successfully, comment in this

<    1   2   3   4   5   6   7   8   9   10   >