Since they are new upstream versions, and are already going through the
SRU process, I'll wait until they are verified-done, and I will do a no-
change rebuild of them into the -security pocket.
Does that sound reasonable? Thanks!
--
You received this bug notification because you are a member
Thanks for the debdiffs, I will prepare packages in the security PPA and
will comment back
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728
Title:
CVE-2024-3044
To manage notifications about
ACK on the debdiffs. Uploaded for processing by the SRU team. Thanks!
** Changed in: openscap (Ubuntu Focal)
Status: New => In Progress
** Changed in: openscap (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The regression fix has now been published:
https://ubuntu.com/security/notices/USN-6728-3
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to
That is pretty odd, I can't reproduce this issue on jammy.
what's the output of "ldd /lib/x86_64-linux-
gnu/libwebkit2gtk-4.0.so.37"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062916
Title:
Thanks for testing it, it's much appreciated!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go
I have located the issue and have prepared an updated package that will
reintroduce the fixes for CVE-2023-5824. I have uploaded the updated
package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it has finished building, could
That's good to see!
Since this is a deliberate side-effect of the security change, I am
marking this bug as "invalid". Thanks
** Changed in: apache2 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I think this is actually the correct new behaviour for the security
update...could you please try using ap_trust_cgilike_cl as instructed
here:
https://bz.apache.org/bugzilla/show_bug.cgi?id=68872
** Bug watch added: bz.apache.org/bugzilla/ #68872
Thanks for testing, I'll keep digging...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
this is undesired
To
I have uploaded a package with a possible fix to the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it's finished building, could you please give it a try and see if
it solves the issue for you? If so, I will publish it as a security
I believe I've spotted the regression and will have a package to test
soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to
Thanks for filing this bug, I'll investigate the changes and will report
back.
Have you seen this behaviour on anything other than focal?
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Information type changed from Public to Public Secur
There are packages for focal, jammy, and mantic available for testing in
the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If they work in your environment, please mention it in this bug. Thanks!
--
You received this bug notification
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051543
Title:
When I use a keyboard shortcut to lower a window, the window retains
its
** Changed in: amavisd-new (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058023
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.
--
You received this bug notification because you are a member
https://ubuntu.com/security/notices/USN-6727-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications about this
** Changed in: nss (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a
(Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Focal)
Status: New => In Progress
** Changed in: nss (Ubuntu Jammy)
St
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906
This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!
** This bug has been marked a duplicate of bug 2060906
attempt to add opensc using
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060968
Title:
SafeNet Authentication Client eToken driver error
To manage notifications
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications
https://ubuntu.com/security/notices/USN-6728-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go
Thanks for testing everyone, and thanks for the configuration details. I
will attempt to reproduce this issue so that I can figure out what
exactly caused the regression so that we can get CVE-2023-5824 fixed
again soon.
--
You received this bug notification because you are a member of Ubuntu
** Information type changed from Public to Public Security
** Changed in: squid (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: squid (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubunt
I have prepared an update with the patches for CVE-2023-5824 backed out
as they were extensive and are the most likely cause of this regression.
I have uploaded it to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has
Thanks for reporting this issue. What configuration is this squid server
used in? I would like to reproduce the issue, but I need more details to
set up a similar environment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
More CVE fixes have gone in here:
https://ubuntu.com/security/notices/USN-6728-1
I believe there are no more open CVEs for Squid, so I am closing this
bug. Thanks!
** Changed in: squid (Ubuntu Focal)
Status: Confirmed => Fix Released
** Changed in: squid (Ubuntu Jammy)
Status:
@pitti: mantic will be EoL in a couple of months, I think if you want
the fix in quickly, having the minimal fix would be the fastest way to
do it, though you may decide it's not worth it seeing as the release
will be ending soon.
--
You received this bug notification because you are a member of
FYI This is now in the jammy and focal upload queues to go to -proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017
Title:
mount rules grant excessive permissions
To manage
There's a relevant thread here:
https://lore.kernel.org/all/27131a7fae2794a63f4f285a20e41116ba4198f3.ca...@gmail.com/T/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976556
Title:
[Lenovo 300e
It appears most of the systemd autopkgtest failures are because of this
flaky test:
https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64
The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless
The same issue was present with the old dnsmasq package...for example:
https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
t; Confirmed
** Changed in: sudo (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options
I'll fix this issue in noble.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options from --with-all-insults to --with-pc-
insults
To manage notifications about
Could you please file a bug upstream about the missing change, and let
us know the bug number?
https://bugzilla.sudo.ws/index.cgi
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:
-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS
--
You received this
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.
The noble package doesn't use --enable-offensive-insults.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
FFe: version 0.58 introduces a new field
To manage notifications about this bug go to:
** Attachment added: "Build log"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754633/+files/pasaffe_0.58-0ubuntu1_amd64.build
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
NEWS file:
0.58 (2024-03-09)
* Enhancements:
- Add email field
- Updated translations
* Bug fixes:
- Fix some deprecation warnings in the test suite
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "ChangeLog"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754632/+files/ChangeLog
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
Public bug reported:
I would like to request a FFe for version 0.58 of Pasaffe.
The new version updates translations, and adds a single feature:
displaying the email field from the password database which has been
requested for a long time, but I had not had time to implement it until
now.
It's
I am marking this bug as "invalid" per your last comment. Thanks!
** Changed in: dnsmasq (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.
I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.
I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:
udp0 0 192.168.122.1:530.0.0.0:*
1521/named
The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address is
assigned
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
I will prepare updates for testing with the problematic commit reverted.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
Thanks for filing this bug, and the excellent analysis.
So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088
That was in response to this mailing list discussion:
Hi,
What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
dnsmasq-base
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052739
Title:
bind9 9.16.48 is now in focal with the latest security update.
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Triaged => Fix Released
** Changed in: bind9 (Ubuntu Focal)
Status: Triaged => Fix Committed
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Fix
** Changed in: netatalk (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2046609
Title:
sync request: netatalk 3.1.18~ds-1 Debian sid main
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Making this bug public to the Ubuntu community can see it and perhaps
propose a fix for the issue. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2009082
Title:
SDK version in LTS
We are currently working on updates, and they should be released within
the next few days.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007456
Title:
CVE-2023-20032: Fixed a possible
** Information type changed from Private Security to Public Security
** Also affects: clamav (Ubuntu Kinetic)
Importance: Undecided
Status: New
** Also affects: clamav (Ubuntu Bionic)
Importance: Undecided
Status: New
** Also affects: clamav (Ubuntu Lunar)
Importance:
** Changed in: samba (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1997220
Title:
CVE-2022-42898
To manage notifications about this bug go to:
I personally don't think the reasons you've listed above are good enough
to change the default setting, but please file a bug with the upstream
project and you can convince them to change them:
https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues
Once you've filed a bug with the GNOME
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I can't get cog to work on 20.04:
$ cog -P x11 https://ubuntu.com
** (cog:4346): WARNING **: 14:11:55.892: Could not load:
libcogplatform-x11.so (possible cause: Resource temporarily
unavailable).
wpe: could not load the impl library. Is there any backend installed?:
libWPEBackend-default.so:
Please give details on how you are testing these updates. We will not be
sponsoring packages that haven't been tested, and that we are unable to
test ourselves.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
** Changed in: binutils (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1974265
Title:
`demangle_const` causes infinite recursion and stack overflow
Ah yes, that CVE was fixed in all our releases, so I am marking this bug
as invalid. Thanks!
** Changed in: brotli (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
I'm making this bug public, since the issue is listed on a public page.
Curiously, I could not find a CVE for this issue.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1978821
Title:
** Information type changed from Private Security to Public Security
** Changed in: brotli (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1978821
wpewebkit is basically the same source code as the webkit2gtk package.
Since we do allow full version upgrades to webkit2gtk as security
updates, it makes sense to allow them for wpewebkit also.
That being said, what's the plan to test these updates? Nothing much in
the archive seems to depend on
Changed in: ca-certificates (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Impish)
Assignee: (unassigned) => Ma
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Focal)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Impish)
Importance
These changes were included as part of the latest security update.
** Changed in: dpkg (Ubuntu Focal)
Status: Fix Committed => Fix Released
** Changed in: dpkg (Ubuntu Impish)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of
** Changed in: webkit2gtk (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975602
Title:
2.36.2 security update tracking bug
To manage notifications about
*** This bug is a security vulnerability ***
Public security bug reported:
Bug to track the 2.36.2 security update.
** Affects: webkit2gtk (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Information type changed from Private Security to Public Security
** Also affects: accountsservice (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: accountsservice (Ubuntu Kinetic)
Importance: High
Status: Fix Released
** Changed in: accountsservice
1 - 100 of 12524 matches
Mail list logo