** Changed in: cups (Ubuntu Oracular)
Status: New => Fix Committed
** Changed in: cups (Ubuntu Focal)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Jammy)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Noble)
Assi
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/2082335
Title:
Sept 2024 security issue tracking bug
Stat
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Jammy)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Noble)
Importance: Undecided
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: github.com/python/cpython/issues #124170
https://github.com/python/cpython/issues/124170
** Also affects: python via
https://github.com/python/cpython/issues/124170
Importance: Unknown
Status: Unknown
** Bug watch added: Debian Bug tracker #1079780
https://b
I'll let someone else decide if this bug is still worth fixing even
though we aren't using the helper anymore.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
Ah yes, this should be fixed now because of the security update. I meant
to update this bug, but forgot. Thanks for noticing.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.
--
You received this bug notification because you are a member o
https://ubuntu.com/security/notices/USN-6727-2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
Status in nss
** Changed in: nss (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fail
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add o
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a s
(Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Focal)
Status: New => In Progress
** Changed in: nss (Ubuntu Jammy)
Status:
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906
This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!
** This bug has been marked a duplicate of bug 2060906
attempt to add opensc using
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060968
Title:
SafeNet Authentication Client eToken driver error
Sta
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
St
FYI This is now in the jammy and focal upload queues to go to -proposed.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apparmor in Ubuntu.
https://bugs.launchpad.net/bugs/1597017
Title:
mount rules grant excessive permiss
It appears most of the systemd autopkgtest failures are because of this
flaky test:
https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64
The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless s
The same issue was present with the old dnsmasq package...for example:
https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed
w => Confirmed
** Changed in: sudo (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/2058053
I'll fix this issue in noble.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options from --with-all-insults to --with-pc-
insults
Statu
Could you please file a bug upstream about the missing change, and let
us know the bug number?
https://bugzilla.sudo.ws/index.cgi
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:
-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS
--
You received this bug
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to sudo in Ubuntu.
https://bugs.launchpad.net/bugs/205805
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.
The noble package doesn't use --enable-offensive-insults.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscrib
I am marking this bug as "invalid" per your last comment. Thanks!
** Changed in: dnsmasq (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bug
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.
I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.
I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.
Than
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:
udp0 0 192.168.122.1:530.0.0.0:*
1521/named
The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which m
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://b
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the su
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad
I will prepare updates for testing with the problematic commit reverted.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network t
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed t
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.n
Thanks for filing this bug, and the excellent analysis.
So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088
That was in response to this mailing list discussion:
https://lists.thekelleys.org.u
Hi,
What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to dnsmasq in Ubuntu.
https://bugs.launchpad.net/bugs/2055455
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tzdata in Ubuntu.
https://bugs.launchpad.net/b
The only curious thing with using "pkcs11.txt" is that is usually used
with the security databases. Per some of the manpages:
In 2009, NSS introduced a new set of databases that are SQLite databases
rather than BerkeleyDB. These new databases provide more accessibility and
performance:
This should get sent to debian too.
Quick question: is pkcs11.txt a default filename used anywhere else?
Where did the filename come from?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.
ACK on the policy file location change.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/2016303
Title:
Rebuild NSS with support for system-wide config file
Status in nss packa
I am closing this bug since the issue appears to be in Oracle Linux and
is being tracked here:
https://github.com/oracle/oracle-linux/issues/125
Thanks!
** Bug watch added: github.com/oracle/oracle-linux/issues #125
https://github.com/oracle/oracle-linux/issues/125
** Changed in: openssh (Ub
I believe this issue is caused by a bad backport in Oracle's
8.0p1-19.el8_9.2 package. I think their fix for CVE-2023-48795 isn't
properly adding kex-strict-s-...@openssh.com to their KEX. Downgrading
the Ubuntu package works around the problem as that prevents the client
from offering kex-strict-c
OK, I have managed to locate the Oracle binary packages for
8.0p1-19.el8_9.2 and can confirm the issue. This is curious as the same
packages from RockyLinux appear to work. I will attempt to investigate
the differences.
--
You received this bug notification because you are a member of Ubuntu
Touc
The Oracle Linux I'm running is the v8 developer preview, as that is the
only freely downloadable version.
I couldn't reproduce the issue with openssh-server-8.0p1-17.el8.x86_64.
Since I can't get newer packages from Oracle with this version, I
installed openssh, openssh-askpass, openssh-client a
Hi,
Thanks for reporting this issue. I can't seem to reproduce it though
with Oracle Linux v8 running openssh-server-8.0p1-17.el8.x86_64 and an
Ubuntu 22.04 client running 1:8.9p1-3ubuntu0.6.
Could you perhaps give me a bit more details on how I could reproduce
this?
Thanks!
--
You received th
** Changed in: pam (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to pam in Ubuntu.
https://bugs.launchpad.net/bugs/2046526
Title:
pam_access Configuration Treats TTY Names as Hostname
** Package changed: ubuntu-meta (Ubuntu) => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2047595
Title:
sound control panel security
Status in
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to network-manager in Ubuntu.
https://bugs.launchpad.net/bugs/2046633
Title:
Don't include 'nmcli -f all con' output in
What desktop environment are you using?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-meta in Ubuntu.
https://bugs.launchpad.net/bugs/2047595
Title:
sound control panel security
Status in gnome-shell package in Ub
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Note to future mdeslaur: re-mashing the retry button will eventually
result in the test passing and the build succeeding.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to gst-plugins-bad1.0 in
Ubuntu.
https://bugs.launchpad.net
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I have tested the lunar-proposed package (2.4.2-3ubuntu2.3), and after
updating the package, and recreating the printer, it now defaults to
printing in colour when using Okular.
** Tags removed: verification-needed verification-needed-lunar
** Tags added: verification-done verification-done-lunar
Upstream says the change is intentional, so I am closing this bug.
Thanks!
** Changed in: openssh (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.
*** This bug is a security vulnerability ***
Public security bug reported:
focal and earlier need this commit to prevent a DoS:
https://gitlab.freedesktop.org/freetype/freetype/-/commit/216e077600a58346bb022d8409fd82e9d914a10a
** Affects: freetype (Ubuntu)
Importance: Undecided
St
I've filed an upstream bug for this, let's see if they consider this to
be an issue or not: https://bugzilla.mindrot.org/show_bug.cgi?id=3594
Thanks!
** Bug watch added: OpenSSH Portable Bugzilla #3594
https://bugzilla.mindrot.org/show_bug.cgi?id=3594
** Also affects: openssh via
https://b
One of the commits for the security fix for CVE-2023-28408 will now
attempt to mmap the library and search for the "C_GetFunctionList"
symbol before doing the dlopen. Unfortunately, dlopen allows specifying
just the library name and the dynamic linker will search for it, but the
new code just tries
Can you try putting the full path to the library in your config file?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/2028774
Title:
ssh fails to load opensc-pkcs11.so
Sta
What's the output of "dpkg -l | grep curl"?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/2028170
Title:
curl 7.81.0-1ubuntu1.11 fails verifying proper ssl cert w/ subj-alt-
Do you have a specific site I can try that doesn't work?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/2028170
Title:
curl 7.81.0-1ubuntu1.11 fails verifying proper ssl cert
https://ubuntu.com/security/notices/USN-6237-2
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/2028170
Title:
curl 7.81.0-1ubuntu1.11 fails verifying proper ssl cert w/ subj-a
** Changed in: curl (Ubuntu Mantic)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launchpad.net/bugs/2028170
Title:
curl 7.81.0-1ubuntu1.11 fails verifying
It should appear in -security and get automatically copied to -updates
next time the publisher runs, probably within the next half-hour or so.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to curl in Ubuntu.
https://bugs.launch
The fix is currently building here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages
As soon as the riscv64 builds finish, I will be releasing it.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to c
This only affects Ubuntu 22.04 because of an issue with the backported
patch.
** Changed in: curl (Ubuntu Focal)
Status: In Progress => Invalid
** Changed in: curl (Ubuntu Kinetic)
Status: In Progress => Invalid
** Changed in: curl (Ubuntu Lunar)
Status: In Progress => Inval
)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: curl (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: curl (Ubuntu Kinetic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: curl (Ubuntu Lunar)
Are you in the admin or the sudo group? What's the output of the
"groups" command?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ubuntu-settings in Ubuntu.
https://bugs.launchpad.net/bugs/2021484
Title:
Editing a VPN ask
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to isc-dhcp in Ubuntu.
https://bugs.launchpad.net/bugs/2025695
Title:
manually dhclient ethx,dns nameserver in the /etc
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to accountsservice in Ubuntu.
https://bugs.launchpad.net/bugs/2024182
Title:
GHSL-2023-139: use-after-free in
Updates were pushed to fix this issue. Please re-open this bug if this
problem is still occurring.
** Changed in: libx11 (Ubuntu)
Status: New => Invalid
** Changed in: libx11 (Ubuntu Trusty)
Status: New => Fix Released
--
You received this bug notification because you are a member
Unfortunately the package in -proposed was superseded by a security
update, and will need to be updated again.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to cups in Ubuntu.
https://bugs.launchpad.net/bugs/1971242
Title:
p
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
OSSL_CMP_MSG_update_recipNonce was added in OpenSSL 3.0.9...did you
perhaps install from source, or a package that didn't come from Ubuntu?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launch
Thanks for reporting this issue. Did you also upgrade the libssl3
package too?
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2021889
Title:
error OSSL_CMP_MSG_update_reci
If an attacker can edit ~/.bashrc they can simply modify the path and
point to a malicious sudo binary that does whatever it wants with the
password. I don't think this is a SUDO_ASKPASS issue.
If you disagree with our reasoning, it would be best to file this bug
with the upstream sudo project her
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Focal)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Jammy)
Importance
There is possibly a fix in
https://bugs.launchpad.net/ubuntu/+source/ifupdown/+bug/1907878/comments/15
, but I haven't tested it.
** Bug watch added: Debian Bug tracker #1031236
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031236
--
You received this bug notification because you are a m
Similar issue here:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1031236
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to ifupdown in Ubuntu.
https://bugs.launchpad.net/bugs/1978351
Title:
MITM vector: ifupdown puts .d
It looks like debian/if-up.d/resolved contains a few occurrences of:
DNS=DNS
DOMAINS=DOMAINS
Perhaps it was supposed to be DNS=$DNS and DOMAINS=$DOMAINS, but someone
will have to go through the script and figure out what the script is
actually supposed to do and what the proper fix is.
T
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to openssl in Ubuntu.
https://bugs.launchpad.net/bugs/2007730
Title:
Unpatched CVE in Jammy
Status in openss
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I am closing this bug, since the new behaviour is expected with the
security fix. Thanks!
** Changed in: rsync (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bu
Hi,
The security fix for CVE-2022-29154 unfortunately changed the way
arguments are handled.
Could you try adding --old-args ? That should restore the previous
behaviour you are expecting.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-29154
--
You received this bug notifica
** Changed in: rsync (Ubuntu Jammy)
Status: New => Invalid
** Changed in: rsync (Ubuntu Kinetic)
Status: New => Invalid
** Changed in: rsync (Ubuntu Lunar)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages,
Great, I'll release the updates monday morning. Thanks for testing!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
Title:
backups fail since latest rsync security up
I have fixed the typo, and have uploaded new packages to the PPA listed
above. I've run a successful backup with them on both jammy and kinetic.
Could you please confirm they fix the issue for you? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded pack
Oh whoops, sorry about that, I'll upload a fixed version first thing
tomorrow (after at least installing it this time).
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2009756
Title:
backups fail since latest rsync security update
Sta
Looks like the rsync security update doesn't like the way unison is
handling arguments. Perhaps adding --old-args to the command lines here
would help:
copyprog = rsync -a -A -X --rsh=ssh --inplace --compress
copyprogrest = rsync -a -A -X --rsh=ssh --partial --inplace --compress
--
You received
Some users only have the -security pocket enabled, and not -updates, so
when a fix is required for a regression introduced by a security update,
it needs to go to the -security pocket. It doesn't in any way mean BIT
had a security issue.
--
You received this bug notification because you are a mem
.
Thanks!
** Changed in: backintime (Ubuntu)
Status: Invalid => In Progress
** Changed in: backintime (Ubuntu)
Assignee: buhtz (buhtz) => Marc Deslauriers (mdeslaur)
** Also affects: rsync (Ubuntu Lunar)
Importance: Undecided
Status: New
** Also affects: backintime (
As this is working as expected, I am marking this bug as "invalid".
Thanks!
** Changed in: rsync (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launc
I can confirm the scenario described in comment #5 is what is causing
the issue. There are two ways to correctly fix it: 1- ask for the right
directory that matches the forced command, or 2- use the new --old-args
option that was backported to the security update, that should bypass
the new securit
Please file a new bug for that issue, this bug is unrelated to the issue
you are having, and is closed. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to rsync in Ubuntu.
https://bugs.launchpad.net/bugs/2002918
Title:
So after looking further into the way the systems affected by this issue
are configured, this is what is happening:
1- rsync client is requesting a directory: rsync -v -rp
sshuser@server:/var/cache/foo /tmp/foo
2- the server has an ssh forced command configured that is returning the
contents of
1 - 100 of 1005 matches
Mail list logo