[Bug 2083977] Re: package mariadb-server 1:10.11.8-0ubuntu0.24.04.1 failed to install/upgrade: new mariadb-server package pre-installation script subprocess returned error exit status 1

2024-10-09 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083977

Title:
  package mariadb-server 1:10.11.8-0ubuntu0.24.04.1 failed to
  install/upgrade: new mariadb-server package pre-installation script
  subprocess returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb/+bug/2083977/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083978] Re: package parted 3.4-2build1 failed to install/upgrade: el subproceso nuevo paquete parted script pre-installation devolvió el código de salida de error 1

2024-10-09 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083978

Title:
  package parted 3.4-2build1 failed to install/upgrade: el subproceso
  nuevo paquete parted script pre-installation devolvió el código de
  salida de error 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/parted/+bug/2083978/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2082533] Re: blueman-applet crashed with AssertionError in _on_object_removed()

2024-10-08 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2082533

Title:
  blueman-applet crashed with AssertionError in _on_object_removed()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/2082533/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083047] Re: Failure to maintain locked screen after monitor is turned off for inactivity

2024-10-08 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083047

Title:
  Failure to maintain locked screen after monitor is turned off for
  inactivity

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2083047/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2082768] Re: While upgrading Ubuntu got the message: could not install 'linux-firmware"

2024-10-08 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2082768

Title:
  While upgrading Ubuntu got the message: could not install 'linux-
  firmware"

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2082768/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083495] Re: blueman-applet crashed with blueman.bluez.errors.DBusServiceUnknownError in get(): The name :1.508 was not provided by any .service files

2024-10-08 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083495

Title:
  blueman-applet crashed with
  blueman.bluez.errors.DBusServiceUnknownError in get():  The name
  :1.508 was not provided by any .service files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/blueman/+bug/2083495/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2083731] Re: package libdart-external-odelcpsolver6.13 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libdart-external-odelcpsolver.so.6.13.2', which is

2024-10-08 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083731

Title:
  package libdart-external-odelcpsolver6.13 (not installed) failed to
  install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-
  gnu/libdart-external-odelcpsolver.so.6.13.2', which is also in package
  libdart-core+collisions+odelcpsolver6.13:amd64
  6.13.2+ds1-1~osrf2~noble

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dart/+bug/2083731/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078711] Re: Outstanding CVEs in ruby-rack

2024-09-26 Thread Eduardo Barretto
Hi Miles,

Thanks for testing and sharing the results.
The package is now published to the archive and we also published a USN for it:
https://ubuntu.com/security/notices/USN-7036-1

Thanks and let us know in case of any issues.

And thanks Bruce for sponsoring it!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078711

Title:
  Outstanding CVEs in ruby-rack

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-rack/+bug/2078711/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078711] Re: Outstanding CVEs in ruby-rack

2024-09-25 Thread Eduardo Barretto
** Changed in: ruby-rack (Ubuntu)
   Status: Confirmed => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078711

Title:
  Outstanding CVEs in ruby-rack

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-rack/+bug/2078711/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078711] Re: Outstanding CVEs in ruby-rack

2024-09-24 Thread Eduardo Barretto
Hi Miles,

The packages is now available on our security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=ruby-rack&field.status_filter=published&field.series_filter=

Could you please test it and share the results with us?

After we get confirmation we will move to publishing to the archive.

** Changed in: ruby-rack (Ubuntu)
 Assignee: (unassigned) => Bruce Cable (bruce-cable)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078711

Title:
  Outstanding CVEs in ruby-rack

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ruby-rack/+bug/2078711/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2079970] Re: Debug symbols are unavailable for 3.0.2-0ubuntu1.18 (security update)

2024-09-10 Thread Eduardo Barretto
Hi Tobias,

Thanks for reporting it! Indeed there seems some service was stuck and
not syncing some dbgsym. Some hours ago the service was restarted and it
started syncing the missing files. Could you confirm that you can now
get the debug symbols you need?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2079970

Title:
  Debug symbols are unavailable for 3.0.2-0ubuntu1.18 (security update)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/2079970/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078290] Re: package lvm2 2.03.07-1ubuntu1 failed to install/upgrade: installed lvm2 package post-installation script subprocess returned error exit status 1

2024-08-29 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078290

Title:
  package lvm2 2.03.07-1ubuntu1 failed to install/upgrade: installed
  lvm2 package post-installation script subprocess returned error exit
  status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lvm2/+bug/2078290/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078356] Re: python3 upgrade has unmet dependencies

2024-08-29 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078356

Title:
  python3 upgrade has unmet dependencies

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python3-defaults/+bug/2078356/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078263] Re: Issuse with installing ubuntu.Installation crashed.

2024-08-29 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078263

Title:
  Issuse with installing ubuntu.Installation crashed.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/2078263/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2078319] Re: package mysql-server-8.0 8.0.39-0ubuntu0.24.04.2 failed to install/upgrade: installed mysql-server-8.0 package post-installation script subprocess returned error exit status 1

2024-08-29 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078319

Title:
  package mysql-server-8.0 8.0.39-0ubuntu0.24.04.2 failed to
  install/upgrade: installed mysql-server-8.0 package post-installation
  script subprocess returned error exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-8.0/+bug/2078319/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077992] Re: Support report format for DISA STIG Viewer

2024-08-28 Thread Eduardo Barretto
** Changed in: usg
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077992

Title:
  Support report format for DISA STIG Viewer

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2077992/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2076471] Re: Screen locking issue

2024-08-28 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076471

Title:
  Screen locking issue

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kwin/+bug/2076471/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077992] Re: Support report format for DISA STIG Viewer

2024-08-28 Thread Eduardo Barretto
This is not an issue with USG, but rather with OpenSCAP. I would
recommend trying to build and install a newer version of it and try to
use the --stig-viewer option. Unfortunately, the openscap version
shipped in both focal and jammy are old and might not support the latest
features on --stig-viewer. Backporting this feature to openscap to both
focal and jammy are very unlikely to happen as it will probably cause
regressions.

** Also affects: openscap (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: openscap (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077992

Title:
  Support report format for DISA STIG Viewer

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2077992/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2073000] Re: many vulnerabilities on ubuntu20 package linux-image-aws - 5.15.0.1063.69

2024-08-27 Thread Eduardo Barretto
It seems that they were all patched and released as per: 
https://ubuntu.com/security/notices/USN-6923-2
Therefore setting this to Fix Released.

** Changed in: linux-aws-5.15 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2073000

Title:
  many vulnerabilities on ubuntu20 package linux-image-aws -
  5.15.0.1063.69

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws-5.15/+bug/2073000/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2074351]

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

** Changed in: tinyproxy (Ubuntu)
   Status: New => Confirmed

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074351

Title:
  CVE-2023-49606

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tinyproxy/+bug/2074351/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2076129] Re: apt-get crashed with SIGBUS in XXH3_64bits_update()

2024-08-27 Thread Eduardo Barretto
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076129

Title:
  apt-get crashed with SIGBUS in XXH3_64bits_update()

To manage notifications about this bug go to:
https://bugs.launchpad.net/subiquity/+bug/2076129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2076364] Re: package linux-headers-6.8.0-40-generic 6.8.0-40.40 failed to install/upgrade: linux-headers-6.8.0-40-generic paketi post-installation betiği kuruldu alt süreci 11 hatalı çıkış kodu i

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076364

Title:
  package linux-headers-6.8.0-40-generic 6.8.0-40.40 failed to
  install/upgrade: linux-headers-6.8.0-40-generic paketi post-
  installation betiği kuruldu alt süreci 11 hatalı çıkış kodu ile sona
  erdi

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2076364/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2076583] Re: cloud-init crashed with PermissionError in copyfile(): [Errno 13] Permission denied: '/var/log/installer/subiquity-server-debug.log'

2024-08-27 Thread Eduardo Barretto
** Description changed:

- Marco Antonio De La Torre Santamaria
- MarkoDeLaTorre
- markoenix
- +528715809127
- 
  ProblemType: Crash
  DistroRelease: Ubuntu 24.10
  Package: cloud-init 24.4~1gedd92b71-0ubuntu1
  ProcVersionSignature: Ubuntu 6.8.0-31.31.1-lowlatency 6.8.1
  Uname: Linux 6.8.0-31-lowlatency x86_64
  NonfreeKernelModules: zfs
  ApportVersion: 2.30.0-0ubuntu1
  Architecture: amd64
  AutoInstallUserData: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/autoinstall-user-data'
  CasperMD5CheckResult: pass
  CloudName: None
  CurtinConfigCurtHooks: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/curtin-install/subiquity-curthooks.conf'
  CurtinConfigExtract: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/curtin-install/subiquity-extract.conf'
  CurtinConfigInitial: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/curtin-install/subiquity-initial.conf'
  CurtinConfigPartitioning: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/curtin-install/subiquity-partitioning.conf'
  Date: Sun Aug 11 17:51:52 2024
  ExecutablePath: /usr/bin/cloud-init
  InstallationDate: Installed on 2024-07-26 (17 days ago)
  InstallationMedia: Ubuntu-Studio 24.10 "Oracular Oriole" - Daily amd64 
(20240523)
  InstallerCloudCfg: Error: [Errno 13] Permiso denegado: 
'/etc/cloud/cloud.cfg.d/99-installer.cfg'
  InterpreterPath: /usr/bin/python3.12
  JournalErrors:
-  ago 11 17:51:45 hostname kernel: [UFW AUDIT] IN= OUT=lo SRC=127.0.1.1 
DST=127.0.0.1 LEN=136 TOS=0x10 PREC=0x00 TTL=64 ID=7245 DF PROTO=TCP SPT=22 
DPT=56578 WINDOW=260 RES=0x00 ACK PSH URGP=0 
-  ago 11 17:51:45 hostname kernel: [UFW AUDIT] IN=lo OUT= 
MAC=00:00:00:00:00:00:00:00:00:00:00:00:08:00 SRC=127.0.1.1 DST=127.0.0.1 
LEN=136 TOS=0x10 PREC=0x00 TTL=64 ID=7245 DF PROTO=TCP SPT=22 DPT=56578 
WINDOW=260 RES=0x00 ACK PSH URGP=0
+  ago 11 17:51:45 hostname kernel: [UFW AUDIT] IN= OUT=lo SRC=127.0.1.1 
DST=127.0.0.1 LEN=136 TOS=0x10 PREC=0x00 TTL=64 ID=7245 DF PROTO=TCP SPT=22 
DPT=56578 WINDOW=260 RES=0x00 ACK PSH URGP=0
+  ago 11 17:51:45 hostname kernel: [UFW AUDIT] IN=lo OUT= 
MAC=00:00:00:00:00:00:00:00:00:00:00:00:08:00 SRC=127.0.1.1 DST=127.0.0.1 
LEN=136 TOS=0x10 PREC=0x00 TTL=64 ID=7245 DF PROTO=TCP SPT=22 DPT=56578 
WINDOW=260 RES=0x00 ACK PSH URGP=0
  PackageArchitecture: all
  ProcCmdline: /usr/bin/python3 /usr/bin/cloud-init --debug collect-logs
  ProcEnviron:
-  LANG=es_ES.UTF-8
-  PATH=(custom, no user)
-  SHELL=/bin/bash
-  TERM=xterm-256color
-  XDG_RUNTIME_DIR=
+  LANG=es_ES.UTF-8
+  PATH=(custom, no user)
+  SHELL=/bin/bash
+  TERM=xterm-256color
+  XDG_RUNTIME_DIR=
  Python3Details: /usr/bin/python3.12, Python 3.12.4, python3-minimal, 3.12.4-1
  PythonArgs: ['--debug', 'collect-logs']
  PythonDetails: N/A
  SourcePackage: cloud-init
  SubiquityServerDebug: Error: [Errno 13] Permiso denegado: 
'/var/log/installer/subiquity-server-debug.log.5551'
  Title: cloud-init crashed with PermissionError in copyfile(): [Errno 13] 
Permission denied: '/var/log/installer/subiquity-server-debug.log'
  UpgradeStatus: No upgrade log present (probably fresh install)
  UserGroups: adm audio cdrom dip lpadmin plugdev sudo users
  cloud-init-log-warnings:
-  2024-07-26 12:12:19,381 - activators.py[WARNING]: Received stderr output: 
-  ** (generate:3077): WARNING **: 12:12:15.958: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
-  ** (process:3076): WARNING **: 12:12:18.778: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
-  ** (process:3076): WARNING **: 12:12:19.254: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
-  2024-07-26 12:14:09,920 - cc_final_message.py[WARNING]: Used fallback 
datasource
+  2024-07-26 12:12:19,381 - activators.py[WARNING]: Received stderr output:
+  ** (generate:3077): WARNING **: 12:12:15.958: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
+  ** (process:3076): WARNING **: 12:12:18.778: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
+  ** (process:3076): WARNING **: 12:12:19.254: Permissions for 
/etc/netplan/01-network-manager-all.yaml are too open. Netplan configuration 
should NOT be accessible by others.
+  2024-07-26 12:14:09,920 - cc_final_message.py[WARNING]: Used fallback 
datasource
  user_data.txt: Error: [Errno 13] Permiso denegado: 
'/var/lib/cloud/instances/iid-datasource-none/user-data.txt'

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076583

Title:
  cloud-init crashed with PermissionError in copyfile(): [Errno 

[Bug 2076937] Re: after intalling updates, I have a blinking disk at the bottom of the screen. It is like a no entry road sign that continuosly blink

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076937

Title:
  after intalling updates, I have a blinking disk at the bottom of the
  screen. It is like a no entry road sign that continuosly blink

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubiquity/+bug/2076937/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2076543] Re: do solve this

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076543

Title:
  do solve this

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg/+bug/2076543/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077104] Re: package postgresql-client-14 14.12-0ubuntu0.22.04.1 failed to install/upgrade: подпроцесс из пакета postgresql-client-14 установлен сценарий post-installation возвратил код ошибки 2

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077104

Title:
  package postgresql-client-14 14.12-0ubuntu0.22.04.1 failed to
  install/upgrade: подпроцесс из пакета postgresql-client-14 установлен
  сценарий post-installation возвратил код ошибки 2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/postgresql-14/+bug/2077104/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077052] Re: Macbook keyboard and trackpad not working

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077052

Title:
  Macbook keyboard and trackpad not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077052/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077136] Re: package linux-nvidia-tools-common 5.15.0-1062.63 [modified: usr/share/bash-completion/completions/bpftool usr/share/man/man1/cpupower-frequency-info.1.gz usr/share/man/man1/cpupower-

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077136

Title:
  package linux-nvidia-tools-common 5.15.0-1062.63 [modified:
  usr/share/bash-completion/completions/bpftool
  usr/share/man/man1/cpupower-frequency-info.1.gz
  usr/share/man/man1/cpupower-idle-set.1.gz usr/share/man/man1/perf-
  annotate.1.gz usr/share/man/man1/perf-archive.1.gz
  usr/share/man/man1/perf-bench.1.gz usr/share/man/man1/perf-buildid-
  cache.1.gz usr/share/man/man1/perf-buildid-list.1.gz
  usr/share/man/man1/perf-c2c.1.gz usr/share/man/man1/perf-config.1.gz
  usr/share/man/man1/perf-daemon.1.gz usr/share/man/man1/perf-data.1.gz
  usr/share/man/man1/perf-diff.1.gz usr/share/man/man1/perf-
  dlfilter.1.gz usr/share/man/man1/perf-evlist.1.gz
  usr/share/man/man1/perf-ftrace.1.gz usr/share/man/man1/perf-help.1.gz
  usr/share/man/man1/perf-inject.1.gz usr/share/man/man1/perf-intel-
  pt.1.gz usr/share/man/man1/perf-iostat.1.gz usr/share/man/man1/perf-
  kallsyms.1.gz usr/share/man/man1/perf-kmem.1.gz
  usr/share/man/man1/perf-kvm.1.gz usr/share/man/man1/perf-list.1.gz
  usr/share/man/man1/perf-lock.1.gz usr/share/man/man1/perf-mem.1.gz
  usr/share/man/man1/perf-probe.1.gz usr/share/man/man1/perf-record.1.gz
  usr/share/man/man1/perf-report.1.gz usr/share/man/man1/perf-sched.1.gz
  usr/share/man/man1/perf-script-perl.1.gz usr/share/man/man1/perf-
  script-python.1.gz usr/share/man/man1/perf-script.1.gz
  usr/share/man/man1/perf-stat.1.gz usr/share/man/man1/perf-test.1.gz
  usr/share/man/man1/perf-timechart.1.gz usr/share/man/man1/perf-
  top.1.gz usr/share/man/man1/perf-trace.1.gz usr/share/man/man1/perf-
  version.1.gz usr/share/man/man1/perf.1.gz usr/share/man/man8/bpftool-
  btf.8.gz usr/share/man/man8/bpftool-cgroup.8.gz
  usr/share/man/man8/bpftool-feature.8.gz usr/share/man/man8/bpftool-
  gen.8.gz usr/share/man/man8/bpftool-iter.8.gz
  usr/share/man/man8/bpftool-link.8.gz usr/share/man/man8/bpftool-
  map.8.gz usr/share/man/man8/bpftool-net.8.gz
  usr/share/man/man8/bpftool-perf.8.gz usr/share/man/man8/bpftool-
  prog.8.gz usr/share/man/man8/bpftool-struct_ops.8.gz
  usr/share/man/man8/bpftool.8.gz usr/share/man/man8/turbostat.8.gz]
  failed to install/upgrade: trying to overwrite '/usr/bin/acpidbg',
  which is also in package linux-tools-common 6.5.0-9.9

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-nvidia/+bug/2077136/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077140] Re: Intel Arrow Lake Graphics feature backport request for ubuntu 22.04.5 and 24.04 server

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077140

Title:
  Intel Arrow Lake Graphics feature backport request for ubuntu 22.04.5
  and 24.04 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kernel-package/+bug/2077140/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077389] Re: package libc6 2.38-1ubuntu6.3 failed to install/upgrade: new libc6:amd64 package pre-installation script subprocess returned error exit status 1

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077389

Title:
  package libc6 2.38-1ubuntu6.3 failed to install/upgrade: new
  libc6:amd64 package pre-installation script subprocess returned error
  exit status 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2077389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077736] Re: cn't boot on ubuntu 18.4 or 20.4 - looped reset

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077736

Title:
  cn't boot on ubuntu 18.4 or 20.4 - looped reset

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/2077736/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077861] Bug is not a security issue

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077861

Title:
  Intel Arrow Lake IBECC feature backport request for ubuntu 22.04.5 and
  24.04.1 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kernel-package/+bug/2077861/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077445]

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

** Changed in: assimp (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077445

Title:
  CVE-2024-40724

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/assimp/+bug/2077445/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077626] Re: le navigateur brave ne peut pas télécharger de programme et le navigateur firefox refuse de s'ouvrir

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Your bug report is more likely to get attention if it is made in
English, since this is the language understood by the majority of Ubuntu
developers.  Additionally, please only mark a bug as "security" if it
shows evidence of allowing attackers to cross privilege boundaries or to
directly cause loss of data/privacy. Please feel free to report any
other bugs you may find.

** Information type changed from Private Security to Public

** Changed in: ubuntu
   Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077626

Title:
  le navigateur brave ne peut pas télécharger de programme et le
  navigateur firefox refuse de s'ouvrir

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2077626/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077658] Re: Does not detect hotplugged storage device

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077658

Title:
  Does not detect hotplugged storage device

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gvfs/+bug/2077658/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077861] Re: Intel Arrow Lake IBECC feature backport request for ubuntu 22.04.5 and 24.04.1 server

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077861

Title:
  Intel Arrow Lake IBECC feature backport request for ubuntu 22.04.5 and
  24.04.1 server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kernel-package/+bug/2077861/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077793] Re: package nvidia-driver-390 390.157-0ubuntu0.22.04.2 failed to install/upgrade: проблемы зависимостей — оставляем не настроенным

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077793

Title:
  package nvidia-driver-390 390.157-0ubuntu0.22.04.2 failed to
  install/upgrade: проблемы зависимостей — оставляем не настроенным

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-drivers-390/+bug/2077793/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077880] Re: The programm "Aktualisierugsverwaltung" does not start in Ubuntu 24.02

2024-08-27 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077880

Title:
  The programm "Aktualisierugsverwaltung" does not start in Ubuntu 24.02

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/2077880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2077958] Re: Not able to enlist the 17G AMD Platforms via MAAS server

2024-08-27 Thread Eduardo Barretto
** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077958

Title:
  Not able to enlist the 17G AMD Platforms via MAAS server

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2077958/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2071633] Re: [81DE, Realtek ALC236, Mic, Internal] No sound at all

2024-07-08 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071633

Title:
  [81DE, Realtek ALC236, Mic, Internal] No sound at all

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pulseaudio/+bug/2071633/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-19 Thread Eduardo Barretto
Thanks again Otto for preparing this package update!
As mentioned above this is now published :)

** Changed in: mariadb (Ubuntu)
   Status: New => Fix Released

** Changed in: mariadb-10.6 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-18 Thread Eduardo Barretto
I'm publishing the update first thing tomorrow morning, so far
everything looks good.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-18 Thread Eduardo Barretto
Hi Otto,

I've uploaded yesterday the 3 updates to our security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=mariadb&field.status_filter=published&field.series_filter=

I will take a look at the autopkgtests we have in that ppa and, if
everything is looking good, I will publish it either later today or
earlier tomorrow.

One note though, on your comment you said the branches ubuntu-2* (e.g.
ubuntu-22.04) but the correct branches are the ones you sent before,
ubuntu/2* (e.g. ubuntu/22.04-jammy). Perhaps to avoid confusion in the
future, would it be better to consolidate the branches?

Thanks again for preparing those and I will let you know when it is
released or in case of issues.

** Changed in: mariadb (Ubuntu Mantic)
   Status: New => Fix Committed

** Changed in: mariadb (Ubuntu Noble)
   Status: New => Fix Committed

** Changed in: mariadb-10.6 (Ubuntu Jammy)
   Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-18 Thread Eduardo Barretto
** Changed in: mariadb (Ubuntu Mantic)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: mariadb (Ubuntu Noble)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: mariadb-10.6 (Ubuntu Jammy)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-12 Thread Eduardo Barretto
Hi Otto, all look good, if you are ok I will proceed with the sponsoring

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb-10.3/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-11 Thread Eduardo Barretto
Hey Otto,

sorry, I was off for a few days. So should I go ahead with the sponsor
or do you want to merge things first? Either work well for me and I can
continue with the sponsoring this week still.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb-10.3/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2068625] Re: flickering screen

2024-06-10 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068625

Title:
  flickering screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2068625/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-06-05 Thread Eduardo Barretto
This is now released as mentioned in:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/14
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/15

** Changed in: openscap (Ubuntu Focal)
   Status: In Progress => Fix Released

** Changed in: openscap (Ubuntu Jammy)
   Status: In Progress => Fix Released

** Changed in: openscap (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-06-03 Thread Eduardo Barretto
** Tags removed: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-05-30 Thread Eduardo Barretto
Hey Otto,

sorry for the delay, the branches look good, and I could successfully build the 
package and check the diff with the PR, but I again had to bypass that issue 
with gbp not generating the orig tarball correctly.
I'm investigating this issue a bit more to see what is going on.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb-10.3/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-05-27 Thread Eduardo Barretto
Hi Otto,

Thanks for preparing the updates!
I will be taking a look at the PRs between today and tomorrow

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067125

Title:
  CVE-2024-21096 et al affects MariaDB in Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mariadb-10.3/+bug/2067125/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-05-08 Thread Eduardo Barretto
On Ubuntu 20.04, following the tests outlined in the description, below
is the result:

$ uname -a
Linux sec-focal-amd64 5.4.0-181-generic #201-Ubuntu SMP Thu Mar 28 15:39:01 UTC 
2024 x86_64 x86_64 x86_64 GNU/Linux

$ dpkg -l | grep libopenscap
ii  libopenscap8   1.2.16-2ubuntu3.3
   amd64Set of libraries enabling integration of the SCAP line of 
standards

$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.

$ sudo apt install ceph-mds

$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
W: oscap: Can't receive message: 103, Software caused connection abort.
W: oscap: Can't receive message: 103, Software caused connection abort.
OpenSCAP Error: Probe with PID=8143 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=8143 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:913]
Probe with PID=8154 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=8154 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:913]

# INSTALL -proposed VERSION
$ sudo apt install libopenscap8=1.2.16-2ubuntu3.4

# SUCCESSFUL PASS
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-05-08 Thread Eduardo Barretto
On Ubuntu 22.04, following the tests outlined in the description, below
is the result:

$ uname -a
Linux sec-jammy-amd64 6.5.0-28-generic #29~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC 
Thu Apr  4 14:39:20 UTC 2 x86_64 x86_64 x86_64 GNU/Linux

# Check that current version of openscap is installed
$ dpkg -l | grep libopenscap
ii  libopenscap8   1.2.17-0.1ubuntu7.22.04.1
   amd64Set of libraries enabling integration of the SCAP line of 
standards

$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.

$ sudo apt install ceph-mds

$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
W: oscap: Can't receive message: 103, Software caused connection abort.
W: oscap: Can't receive message: 103, Software caused connection abort.
OpenSCAP Error: Probe with PID=8585 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=8585 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:982]
Probe with PID=8599 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=8599 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:982]


# INSTALL -proposed VERSION
$ sudo apt install libopenscap8=1.2.17-0.1ubuntu7.22.04.2 

# SUCCESSFUL PASS 
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.


Still for Ubuntu 22.04 we also got confirmation on LP: #2060345 that now usg 
passed successfully. See https://bugs.launchpad.net/usg/+bug/2060345/comments/15

** Tags removed: verification-needed-jammy
** Tags added: verification-done-jammy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-05-07 Thread Eduardo Barretto
Hey @phausman,

could you please try to reproduce by using the openscap -proposed?
For more information: 
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/10

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-26 Thread Eduardo Barretto
** Also affects: openscap (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: openscap (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Changed in: openscap (Ubuntu Mantic)
   Status: New => Fix Released

** Changed in: openscap (Ubuntu Noble)
   Status: New => Fix Released

** Description changed:

  [ Impact ]
  
   * This issue causes a crash in openscap when there's a circular
  dependency in systemd services, and currently affects both Ubuntu 20.04
- and 22.04.
+ and 22.04. openscap on Ubuntu 23.10 and 24.04 already contain this fix.
  
   * This indirectly is affecting the usage of USG (Ubuntu Security Guide)
  for CIS auditing in systems with ceph-mds. See LP: #2060345.
  
   * This issue was reported to upstream here:
  https://bugzilla.redhat.com/show_bug.cgi?id=1478285 and later fixed in
  openscap upstream git repo
  https://github.com/OpenSCAP/openscap/pull/1474. This SRU is a backport
  of the mentioned pull request.
  
  [ Test Plan ]
  
   * There are a few ways to reproduce this issue, as you can see some notes on 
LP: #2060345.
     But for simplicity, the easiest way to reproduce this issue is to run the 
following commands.
     On Ubuntu 20.04:
  ```
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
  Definition oval:ssg-service_rsyslog_enabled:def:1: true
  Evaluation done.
  
  $ sudo apt install ceph-mds
  
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
  W: oscap: Can't receive message: 103, Software caused connection abort.
  W: oscap: Can't receive message: 103, Software caused connection abort.
  OpenSCAP Error: Probe with PID=1522 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1522 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:913]
  Probe with PID=1531 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1531 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:913]
  
  $ sudo apt install libopenscap8=1.2.16-2ubuntu3.4
  
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
  Definition oval:ssg-service_rsyslog_enabled:def:1: true
  Evaluation done.
  ```
  
     On Ubuntu 22.04:
  ```
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
  Definition oval:ssg-service_rsyslog_enabled:def:1: true
  Evaluation done.
  
  $ sudo apt install ceph-mds
  
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
  W: oscap: Can't receive message: 103, Software caused connection abort.
  W: oscap: Can't receive message: 103, Software caused connection abort.
  OpenSCAP Error: Probe with PID=1421 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1421 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:982]
  Probe with PID=1431 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1431 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:982]
  
  $ sudo apt install libopenscap8=1.2.17-0.1ubuntu7.22.04.2
  
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
  Definition oval:ssg-service_rsyslog_enabled:def:1: true
  Evaluation done.
  ```
  
   * The other tests we will do is to run full usg fix and audit and
  report if the output is as expected.
  
  [ Where problems could occur ]
  
   * This fix was never backported to version 1.2 in upstream git repo, but was 
applied to openscap 1.2 in
     RHEL-based distros, it is unclear if the backport ever created another 
issue with the
     systemdunitdependency probe. If that is the case we expect to see some 
other tests 

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767572/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.16-2ubuntu3.4.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767571/+files/openscap_1.2.16-2ubuntu3.4.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-18 Thread Eduardo Barretto
I've create the SRU ticket here:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767559/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff

** Description changed:

  [ Impact ]
  
-  * This issue causes a crash in openscap when there's a circular
+  * This issue causes a crash in openscap when there's a circular
  dependency in systemd services, and currently affects both Ubuntu 20.04
  and 22.04.
  
-  * This indirectly is affecting the usage of USG (Ubuntu Security Guide)
+  * This indirectly is affecting the usage of USG (Ubuntu Security Guide)
  for CIS auditing in systems with ceph-mds. See LP: #2060345.
  
-  * This issue was reported to upstream here:
+  * This issue was reported to upstream here:
  https://bugzilla.redhat.com/show_bug.cgi?id=1478285 and later fixed in
  openscap upstream git repo
  https://github.com/OpenSCAP/openscap/pull/1474. This SRU is a backport
  of the mentioned pull request.
  
  [ Test Plan ]
  
-  * There are a few ways to reproduce this issue, as you can see some notes on 
LP: #2060345.
-But for simplicity, the easiest way to reproduce this issue is to run the 
following commands.
-Without the patch on Ubuntu 20.04:
+  * There are a few ways to reproduce this issue, as you can see some notes on 
LP: #2060345.
+    But for simplicity, the easiest way to reproduce this issue is to run the 
following commands.
+    Without the patch on Ubuntu 20.04:
  ```
- $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
+ $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
+ Definition oval:ssg-service_rsyslog_enabled:def:1: true
+ Evaluation done.
+ $ sudo apt install ceph-mds
+ $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
  W: oscap: Can't receive message: 103, Software caused connection abort.
  W: oscap: Can't receive message: 103, Software caused connection abort.
  OpenSCAP Error: Probe with PID=1522 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1522 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:913]
  Probe with PID=1531 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1531 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:913]
  ```
  
-   With the patch on Ubuntu 20.04:
+   With the patch on Ubuntu 20.04:
  ```
  $ sudo apt install libopenscap8=1.2.16-2ubuntu3.4
- $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
+ $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml
  Definition oval:ssg-service_rsyslog_enabled:def:1: true
  Evaluation done.
  ```
  
-Without the patch on Ubuntu 22.04:
+    Without the patch on Ubuntu 22.04:
  ```
+ $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
+ Definition oval:ssg-service_rsyslog_enabled:def:1: true
+ Evaluation done.
+ $ sudo apt install ceph-mds
  $ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
  W: oscap: Can't receive message: 103, Software caused connection abort.
  W: oscap: Can't receive message: 103, Software caused connection abort.
  OpenSCAP Error: Probe with PID=1421 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1421 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:982]
  Probe with PID=1431 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
  Probe with PID=1431 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
  Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:982]
  ```
  
-   With the patch on Ubuntu 22.04:
+   With the patch on Ubuntu 22.04:
  ```
  $ sudo apt install libopenscap8=1.2

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767558/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.16-2ubuntu3.4.debdiff"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767557/+files/openscap_1.2.16-2ubuntu3.4.debdiff

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Attachment added: "oval file for ubuntu 20.04"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767555/+files/ssg-ubuntu2004-oval.xml

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Attachment added: "oval file for ubuntu 22.04"
   
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767556/+files/ssg-ubuntu2204-oval.xml

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] [NEW] [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
Public bug reported:

[ Impact ]

 * This issue causes a crash in openscap when there's a circular
dependency in systemd services, and currently affects both Ubuntu 20.04
and 22.04.

 * This indirectly is affecting the usage of USG (Ubuntu Security Guide)
for CIS auditing in systems with ceph-mds. See LP: #2060345.

 * This issue was reported to upstream here:
https://bugzilla.redhat.com/show_bug.cgi?id=1478285 and later fixed in
openscap upstream git repo
https://github.com/OpenSCAP/openscap/pull/1474. This SRU is a backport
of the mentioned pull request.

[ Test Plan ]

 * There are a few ways to reproduce this issue, as you can see some notes on 
LP: #2060345.
   But for simplicity, the easiest way to reproduce this issue is to run the 
following commands.
   Without the patch on Ubuntu 20.04:
```
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
W: oscap: Can't receive message: 103, Software caused connection abort.
W: oscap: Can't receive message: 103, Software caused connection abort.
OpenSCAP Error: Probe with PID=1522 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=1522 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:913]
Probe with PID=1531 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=1531 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:913]
```

  With the patch on Ubuntu 20.04:
```
$ sudo apt install libopenscap8=1.2.16-2ubuntu3.4
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2004-oval.xml 
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.
```

   Without the patch on Ubuntu 22.04:
```
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
W: oscap: Can't receive message: 103, Software caused connection abort.
W: oscap: Can't receive message: 103, Software caused connection abort.
OpenSCAP Error: Probe with PID=1421 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=1421 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog:tst:1' has an unknown flag. This may 
indicate a bug in OpenSCAP. [../../../../src/OVAL/results/oval_resultTest.c:982]
Probe with PID=1431 has been killed with signal 11 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:178]
Probe with PID=1431 has core dumped. 
[../../../../../src/OVAL/probes/SEAP/sch_pipe.c:182]
Item corresponding to object 
'oval:ssg-object_multi_user_target_for_rsyslog_socket_enabled:obj:1' from test 
'oval:ssg-test_multi_user_wants_rsyslog_socket:tst:1' has an unknown flag. This 
may indicate a bug in OpenSCAP. 
[../../../../src/OVAL/results/oval_resultTest.c:982]
```

  With the patch on Ubuntu 22.04:
```
$ sudo apt install libopenscap8=1.2.17-0.1ubuntu7.22.04.2
$ oscap oval eval --id "oval:ssg-service_rsyslog_enabled:def:1" 
ssg-ubuntu2204-oval.xml
Definition oval:ssg-service_rsyslog_enabled:def:1: true
Evaluation done.
```

 * The other tests we will do is to run full usg fix and audit and
report if the output is as expected.

[ Where problems could occur ]

 * This fix was never backported to version 1.2 in upstream git repo, but was 
applied to openscap 1.2 in
   RHEL-based distros, it is unclear if the backport ever created another issue 
with the 
   systemdunitdependency probe. If that is the case we expect to see some other 
tests in usg failing,
   for example.

[ Other Info ]
 
 * This issue affects both Ubuntu 20.04 and 22.04.

** Affects: openscap (Ubuntu)
 Importance: Undecided
 Status: New

** Affects: openscap (Ubuntu Focal)
 Importance: Undecided
 Status: New

** Affects: openscap (Ubuntu Jammy)
 Importance: Undecided
 Status: New

** Also affects: openscap (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: openscap (Ubuntu Jammy)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+so

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-18 Thread Eduardo Barretto
** No longer affects: openscap (Ubuntu)

** Also affects: openscap (Ubuntu)
   Importance: Undecided
   Status: New

** Also affects: openscap (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: openscap (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: openscap (Ubuntu)
   Status: New => Confirmed

** Changed in: openscap (Ubuntu Focal)
   Status: New => In Progress

** Changed in: openscap (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: openscap (Ubuntu Focal)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: openscap (Ubuntu Jammy)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: openscap (Ubuntu)
   Status: Confirmed => In Progress

** Changed in: openscap (Ubuntu)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-17 Thread Eduardo Barretto
@phausman I won't be doing the SRU. Since Peter is investigating it, it
is best if it comes from him.

If you are building from source and it does not produce a crash, then the bug 
mentioned by Peter is not really necessary and something else might be the 
issue.
As the circular dependency does not happen on a normal Ubuntu image, my belief 
is that this is still an issue with systemd in this ceph-mds image.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-16 Thread Eduardo Barretto
Peter, do note that this fix never landed on 1.2 openscap, it will require some 
backporting.
To land this fix it should be done through an SRU process.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-16 Thread Eduardo Barretto
** Also affects: openscap
   Importance: Undecided
   Status: New

** No longer affects: openscap

** Also affects: openscap (Ubuntu)
   Importance: Undecided
   Status: New

** Changed in: usg
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060345

Title:
  oscap crashes during audit on the system with ceph-mds package
  installed

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2060345/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2057814] Re: upgrade

2024-03-13 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2057814

Title:
  upgrade

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/2057814/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2057775] Re: package libignition-fuel-tools4-4 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libignition-fuel_tools4.so.4', which is also in package li

2024-03-13 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2057775

Title:
  package libignition-fuel-tools4-4 (not installed) failed to
  install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-
  gnu/libignition-fuel_tools4.so.4', which is also in package
  libignition-fuel-tools4:amd64 4.6.0-1~focal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ignition-fuel-tools4/+bug/2057775/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056775] Re: openscap fails in multiple tests when auditing on fresh Jammy

2024-03-11 Thread Eduardo Barretto
Could you please run with --debug and upload the logs?

** Changed in: openscap (Ubuntu)
   Status: New => Incomplete

** Package changed: openscap (Ubuntu) => usg

** Summary changed:

- openscap fails in multiple tests when auditing on fresh Jammy
+ usg fails in multiple tests when auditing on fresh Jammy

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056775

Title:
  usg fails in multiple tests when auditing on fresh Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/usg/+bug/2056775/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056091] Re: package linux-headers-generic-hwe-22.04 6.5.0.21.20 failed to install/upgrade: bağımlılık sorunları - yapılandırılmadan bırakılıyor

2024-03-11 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056091

Title:
  package linux-headers-generic-hwe-22.04 6.5.0.21.20 failed to
  install/upgrade: bağımlılık sorunları - yapılandırılmadan bırakılıyor

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2056091/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056596] Re: L'installation de grub a echoué

2024-03-11 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056596

Title:
  L'installation de grub a echoué

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub-installer/+bug/2056596/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2036595] Re: vulnerability in libcue affects tracker-extract (GHSL-2023-197)

2024-03-11 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2036595

Title:
  vulnerability in libcue affects tracker-extract (GHSL-2023-197)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libcue/+bug/2036595/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055270] Re: Buy Tramadol Online At Lowest Prices

2024-02-28 Thread Eduardo Barretto
** Changed in: systemd (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055270

Title:
  Buy Tramadol Online At Lowest Prices

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2055270/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054916]

2024-02-26 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054916

Title:
  CVE-2022-44640 affects the version of heimdal on ubuntu 22.04 - could
  it be updated?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/heimdal/+bug/2054916/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055013]

2024-02-26 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055013

Title:
  CVE-2020-13576 affects the version in ubuntu 22.04 - could it be
  updated?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gsoap/+bug/2055013/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-18 Thread Eduardo Barretto
This patch is not acceptable as you are trying to fix a security issue (already 
fixed) and a bug issue. Please only upload a debdiff for the bug issue.
Also create a new ticket for that, as this one if for the security issue and 
that was already fixed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1922654

Title:
  Apache Maven Multiple Security Bypass Vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/httpcomponents-client/+bug/1922654/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-04 Thread Eduardo Barretto
That is already fixed under Ubuntu Pro:
https://ubuntu.com/security/notices/USN-5245-1
https://ubuntu.com/security/notices/USN-5239-1

** Changed in: maven (Ubuntu)
   Status: Confirmed => Fix Released

** Changed in: httpcomponents-client (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1922654

Title:
  Apache Maven Multiple Security Bypass Vulnerabilities

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/httpcomponents-client/+bug/1922654/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007456] Re: CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser.

2023-02-24 Thread Eduardo Barretto
Hi Keath,

It takes time because it is a newer version update. As you can see in comment 
#4 it is currently available for testing on security-proposed ppa. If you could 
test it and give us a feedback that it is working properly that would be much 
appreciated. Also we are currently having issues with clamav and lunar but we 
hope to have it done by next week and everything publish.
Please bear with us in the meantime.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007456

Title:
  CVE-2023-20032: Fixed a possible remote code execution vulnerability
  in the HFS+ file parser.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/2007456/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007273] Re: I have ubuntu 22.04 on my system and have the following vulnerability : CVE-2022-4743. On which release/path of Ubuntu can I expect them to be fixed ?

2023-02-14 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better.

This is low priority CVE for us, it will only get patched if a higher
priority CVE for libsdl2 in 22.04 shows up. Right now there are none,
therefore no ETA.


** Information type changed from Private Security to Public Security

** Changed in: libsdl2 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007273

Title:
  I have ubuntu 22.04 on my system and have the following vulnerability
  : CVE-2022-4743.  On which release/path of Ubuntu can I expect them to
  be fixed ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libsdl2/+bug/2007273/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007274] Re: I have ubuntu 22.04 on my system and have the following vulnerability : CVE-2022-46908. On which release/path of Ubuntu can I expect them to be fixed ?

2023-02-14 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu
better.

This is low priority CVE for us, it will only get patched if a higher
priority CVE for sqlite3 in 22.04 shows up. Right now there are none,
therefore no ETA.

** Description changed:

  I have ubuntu 22.04 on my system and it has the following vulnerability
  : CVE-2022-46908. Here is the link to the Ubuntu CVE link :
- 
https://ubuntu.com/security/CVE-2022-46908#:~:text=SQLite%20through%203.40.,UDF%20functions%20such%20as%20WRITEFILE.
- On which version/patch of Ubuntu can I expect this to get fixed ?
+ https://ubuntu.com/security/CVE-2022-46908. On which version/patch of
+ Ubuntu can I expect this to get fixed ?

** Information type changed from Private Security to Public Security

** Changed in: sqlite3 (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007274

Title:
  I have ubuntu 22.04 on my system and have the following vulnerability
  : CVE-2022-46908.  On which release/path of Ubuntu can I expect them
  to be fixed ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/2007274/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2000848] Re: CVE-2022-41138: Unreleased in zutty

2023-01-03 Thread Eduardo Barretto
** Changed in: zutty (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2000848

Title:
  CVE-2022-41138: Unreleased in zutty

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/zutty/+bug/2000848/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1995402] Re: cups keeps spool files forever and thus reveals confidential data

2022-11-09 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security

** Changed in: cups (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1995402

Title:
  cups keeps spool files forever and thus reveals confidential data

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1995402/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1990886] Re: Security updates missing after 91.11.0

2022-09-27 Thread Eduardo Barretto
Hi Olivier,

Do you have any updates on line for thunderbird?
We got a similar question last week on IRC.

** Information type changed from Private Security to Public Security

** Changed in: thunderbird (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1990886

Title:
  Security updates missing after 91.11.0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/1990886/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-08-29 Thread Eduardo Barretto
Luis, you keep updating the description but you haven't replied to comment 36.
Please provide the information requested.

** Changed in: wpewebkit (Ubuntu)
   Status: In Progress => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.7 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-19 Thread Eduardo Barretto
my colleague Spyros will be taking a look if he can bring kinetic's
version to Jammy and Focal.

** Changed in: wpewebkit (Ubuntu Focal)
 Assignee: (unassigned) => Spyros Seimenis (sespiros)

** Changed in: wpewebkit (Ubuntu Jammy)
 Assignee: (unassigned) => Spyros Seimenis (sespiros)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.4 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
** Description changed:

- I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to
- fix security issues and other bugs, as well as adding features that
- increase compatibility with current websites.
+ I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix
+ security issues and other bugs, as well as adding features that increase
+ compatibility with current websites.
  
  The version in Focal is affected by all vulnerabilities listed below.
  
  The version in Jammy is vulnerable to
  CVE-2022-22677, CVE-2022-26700, CVE-2022-26709, CVE-2022-26710, 
CVE-2022-26716, CVE-2022-26717, CVE-2022-26719, CVE-2022-30293 and 
CVE-2022-30294.
  
  Debian released an advisory on April 8.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.4 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
** Description changed:

- I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix
- security issues and other bugs, as well as adding features that increase
- compatibility with current websites.
+ I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to
+ fix security issues and other bugs, as well as adding features that
+ increase compatibility with current websites.
  
  The version in Focal is affected by all vulnerabilities listed below.
  
  The version in Jammy is vulnerable to
  CVE-2022-22677, CVE-2022-26700, CVE-2022-26709, CVE-2022-26710, 
CVE-2022-26716, CVE-2022-26717, CVE-2022-26719, CVE-2022-30293 and 
CVE-2022-30294.
  
  Debian released an advisory on April 8.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.4 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
Just adding some notes about this request:

1. 200MB debdiff, really hard to verify/validate/test. We need to think
on a good way to guarantee that we are not introducing issues.

2. On Luis' PPA the package fails to build in some architectures. Luis
is going to trigger another build and see if it passes. If it fails and
continues to not include logs on why it fails, I will ask Launchpad team
to investigate what's happening.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.4 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Eduardo Barretto
** Also affects: wpewebkit (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: wpewebkit (Ubuntu Focal)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.4 for Focal, Impish and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Multiple vulnerabilities in Focal, Impish and Jammy

2022-06-13 Thread Eduardo Barretto
Hi Luís,

As my colleague mentioned to you previously, except for a few
exceptions, such as ffmpeg, we generally don't accept new upstream
maintenance releases into the security sponsoring process.

As you can see on bug #1973814, the diff between the versions you want
to upgrade are too big and introduce too many new changes that could
cause regressions and other issues.

If you really want to introduce new upstream microreleases, you can perhaps try 
getting them sponsored as Stable Release Updates:
 
https://wiki.ubuntu.com/StableReleaseUpdates


Otherwise, please send debdiffs only containing the security fixes.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Multiple vulnerabilities in Focal, Impish and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Eduardo Barretto
Hi Luis,

Thanks for testing!

Regarding 18.04 test failure, I tried to reproduce here and it is passing fine:
`...
GEN tests/data/vsynth_lena.yuv
TESTvsynth_lena-amv
TESTvsynth_lena-asv1
TESTvsynth_lena-asv2
TESTvsynth_lena-cinepak
TESTvsynth_lena-cljr
TESTvsynth_lena-dnxhd-720p
TESTvsynth_lena-dnxhd-720p-rd
...`

Could you gather more information on the failure?

Regarding the litian issues I will be adding the missing signatures,
thanks for providing them.

We got your email on the version, I shall be fixing it, probably after
we have an ok from you that the test are passing fine and no other
changes are needed.

Did you get a chance to test impish and jammy?

Thanks again

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674

Title:
  New bug fix releases 3.4.11, 4.2.7 and 4.4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-02 Thread Eduardo Barretto
Hi Luis,
I've uploaded the binaries to -proposed, could you please test them?
Thanks

** Changed in: ffmpeg (Ubuntu Bionic)
   Status: In Progress => Fix Committed

** Changed in: ffmpeg (Ubuntu Focal)
   Status: In Progress => Fix Committed

** Changed in: ffmpeg (Ubuntu Impish)
   Status: In Progress => Fix Committed

** Changed in: ffmpeg (Ubuntu Jammy)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674

Title:
  New bug fix releases 3.4.11, 4.2.7 and 4.4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-05-30 Thread Eduardo Barretto
Hi Luis,

Thanks for contacting us and helping make Ubuntu better.
I will be going through your debdiffs, but bear with me as those are minor 
version updates.
I will let you know when the binaries get to -proposed and I would appreciate 
if you could test them.

** Also affects: ffmpeg (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: ffmpeg (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: ffmpeg (Ubuntu Impish)
   Importance: Undecided
   Status: New

** Also affects: ffmpeg (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Changed in: ffmpeg (Ubuntu Bionic)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: ffmpeg (Ubuntu Focal)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: ffmpeg (Ubuntu Impish)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: ffmpeg (Ubuntu Jammy)
 Assignee: (unassigned) => Eduardo Barretto (ebarretto)

** Changed in: ffmpeg (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: ffmpeg (Ubuntu Focal)
   Status: New => In Progress

** Changed in: ffmpeg (Ubuntu Impish)
   Status: New => In Progress

** Changed in: ffmpeg (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970674

Title:
  New bug fix releases 3.4.11, 4.2.7 and 4.4.2

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ffmpeg/+bug/1970674/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-05-26 Thread Eduardo Barretto
We asked around the server team, and no one over there has any experience with 
etcd either.
What should we do next?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959757

Title:
  [SRU] etcd FTBFS on Focal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1888890] Re: openscap: xenial version is lower than version published in trusty/esm

2022-05-17 Thread Eduardo Barretto
We just published today a no-change version of openscap to Xenial ESM
ppas to solve this issue.

** Changed in: openscap (Ubuntu Xenial)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/190

Title:
  openscap: xenial version is lower than version published in trusty/esm

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/190/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1966338] Re: openjdk11 update breaks customers

2022-03-29 Thread Eduardo Barretto
** Changed in: openjdk-lts (Ubuntu)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1966338

Title:
  openjdk11 update breaks customers

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openjdk-lts/+bug/1966338/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-29 Thread Eduardo Barretto
** Changed in: etcd (Ubuntu Focal)
   Status: Incomplete => New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959757

Title:
  [SRU] etcd FTBFS on Focal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-23 Thread Eduardo Barretto
The test suite is passing fine. 
If I compare binaries of current version and with debdiff applied I get the 
following attached files.

** Attachment added: "etcd_amd64.txt"
   
https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5572181/+files/etcd_amd64.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959757

Title:
  [SRU] etcd FTBFS on Focal

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   >