Thank you for reporting this bug and helping to make Ubuntu better. The
package referred to in this bug is in universe or multiverse and
reported against a release of Ubuntu (hardy) which no longer receives
updates outside of the explicitly supported LTS packages. While the bug
against hardy is bei
*** This bug is a duplicate of bug 598597 ***
https://bugs.launchpad.net/bugs/598597
** This bug is no longer flagged as a security vulnerability
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to lucid-backports.
https://bugs.launchp
Thank you for reporting this bug to Ubuntu. dapper has reached EOL
(End of Life) and is no longer supported. As a result, this bug
against dapper is being marked "Won't Fix". Please see
https://wiki.ubuntu.com/Releases for currently supported Ubuntu
releases.
Please feel free to report any other b
Neal, could you respond on Scott's question in comment #5?
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/803720
Title:
nginx packages in hardy/hardy-backports allow null-byte vulnerab
I: Extracting virtualbox-guest-additions-iso_4.0.10-1.dsc ... done.
I: Building backport of virtualbox-guest-additions-iso as 4.0.10-1~natty1 ...
done.
** Changed in: natty-backports
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of
I: Extracting virtualbox_4.0.10-dfsg-1ubuntu1.dsc ... done.
I: Building backport of virtualbox as 4.0.10-dfsg-1ubuntu1~natty1 ... done.
** Changed in: natty-backports
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporter
Uploaded lucid and maverick to the security ppa. Thanks for the
debdiffs!
** Changed in: unbound (Ubuntu Lucid)
Status: Confirmed => Fix Committed
** Changed in: unbound (Ubuntu Maverick)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a me
http://www.ubuntu.com/usn/usn-924-1
http://www.ubuntu.com/usn/usn-940-1
** Changed in: krb5 (Ubuntu)
Status: Triaged => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is a bug assignee.
https://bugs.launchpad.net/bugs/210172
Tit
I just came across this bug and can say that alsa compiles fine on lucid
after only changing the debian/changelog.
--
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to lucid-backports.
https://bugs.launchpad.net/bugs/589249
Title:
Please
I: Extracting ibm-3270_3.3.10ga4-2.dsc ... done.
I: Building backport of ibm-3270 as 3.3.10ga4-2~lucid1 ... done.
** Changed in: lucid-backports
Status: In Progress => Fix Released
--
Please backport ibm-3270 from maverick/natty to 10.04 LTS
https://bugs.launchpad.net/bugs/667285
You r
** Changed in: flashplugin-nonfree (Ubuntu Dapper)
Status: Invalid => Won't Fix
--
Adobe releases flash-plugin security update 7.0.68
https://bugs.launchpad.net/bugs/60256
You received this bug notification because you are a member of Ubuntu
Backporters, which is subscribed to Breezy Backp
http://www.ubuntu.com/usn/USN-942-1
** Changed in: postgresql-8.1 (Ubuntu Dapper)
Status: Fix Committed => Fix Released
** Changed in: postgresql-8.3 (Ubuntu Hardy)
Status: Fix Committed => Fix Released
** Changed in: postgresql-8.3 (Ubuntu Jaunty)
Status: Fix Committed => F
Per Martin, no upstream regressions reported and the packages in
-proposed pass his testing. Pocket copied to -security (will do -updates
later).
** Changed in: postgresql-8.1 (Ubuntu Dapper)
Status: Triaged => Fix Committed
** Changed in: postgresql-8.3 (Ubuntu Hardy)
Status: Triag
All tests passed qa-regression-tests for dapper-lucid (among other
things, this runs the postgresql-common testsuite).
--
New upstream microreleases: 8.4.4, 8.3.11, 8.1.21
https://bugs.launchpad.net/bugs/582299
You received this bug notification because you are a member of Ubuntu
Backports Testin
All have (finally) built and have been copied to -proposed.
--
New upstream microreleases: 8.4.4, 8.3.11, 8.1.21
https://bugs.launchpad.net/bugs/582299
You received this bug notification because you are a member of Ubuntu
Backports Testing Team, which is subscribed to Hardy Backports.
--
ubuntu
This are building now in ubuntu-security-proposed. Still waiting on
ia64, sparc and powerpc. I'll pocket copy them to -proposed when I come
online tomorrow.
--
New upstream microreleases: 8.4.4, 8.3.11, 8.1.21
https://bugs.launchpad.net/bugs/582299
You received this bug notification because you a
Marking Won't Fix. Intrepid is about to be End-of-Lifed. Please upgrade
to Ubuntu 9.04 or the upcoming 10.04 release.
** Changed in: intrepid-backports
Status: New => Invalid
** Changed in: libvirt (Ubuntu)
Status: Triaged => Won't Fix
--
Please backport 6.01, and/or 6.1 to intrep
I: Extracting simutrans_102.2.2~ds1-1.dsc ... done.
I: Building backport of simutrans as 102.2.2~ds1-1~karmic1 ... done.
** Changed in: karmic-backports
Status: In Progress => Fix Released
--
Backport simutrans from Lucid
https://bugs.launchpad.net/bugs/538897
You received this bug not
Uploaded and building:
subversion (1.5.1dfsg1-1ubuntu2~hardy3) hardy-backports; urgency=low
* Backported security fix from intrepid (LP: #411849)
** Changed in: hardy-backports
Status: In Progress => Fix Released
--
Please backport security fix for USN-812-1 in subversion 1.5
https:/
Actually, it is my mistake. I was thinking that you were taking the
package from intrepid and therefore lost the hardy changes, when in fact
you were taking the hardy-backports version and applying the patch. I
think since you did it this way you should use
'1.5.1dfsg1-1ubuntu2~hardy3' instead. I'l
NAK. The debdiff drops the changes introduced in hardy1 and hardy2.
Please update the debdiff and I'll review it.
--
Please backport security fix for USN-812-1 in subversion 1.5
https://bugs.launchpad.net/bugs/411849
You received this bug notification because you are a member of Ubuntu
Backports
I meant to also say that a debdiff should not be required-- it should be
a matter of someone from the backports team processing the request (I've
not reviewed this particular case though).
--
Please backport security fix for USN-812-1 in subversion 1.5
https://bugs.launchpad.net/bugs/411849
You r
While the ubuntu-security team is (now) subscribed and aware of the
issue, this is something the ubuntu-backports team must process.
--
Please backport security fix for USN-812-1 in subversion 1.5
https://bugs.launchpad.net/bugs/411849
You received this bug notification because you are a member o
I: Extracting python-oauth_1.0~svn1092-0ubuntu2.dsc ... done.
I: Building backport of python-oauth as 1.0~svn1092-0ubuntu2~jaunty1 ... done.
** Changed in: jaunty-backports
Status: In Progress => Fix Released
--
Please backport python-oauth 1.0~svn1053-0ubuntu1 from Karmic to Hardy
htt
I: Extracting python-oauth_1.0~svn1092-0ubuntu2.dsc ... done.
I: Building backport of python-oauth as 1.0~svn1092-0ubuntu2~intrepid1 ...
done.
** Changed in: intrepid-backports
Status: In Progress => Fix Released
--
Please backport python-oauth 1.0~svn1053-0ubuntu1 from Karmic to Hard
** Changed in: sun-java6 (Ubuntu Hardy)
Status: Confirmed => Fix Committed
** Changed in: sun-java6 (Ubuntu Jaunty)
Status: Confirmed => Fix Committed
--
version 1.6.0_15 is available
https://bugs.launchpad.net/bugs/409559
You received this bug notification because you are a membe
The sun-java policy is being clarified and updated in
https://wiki.ubuntu.com/StableReleaseUpdates#sun-java*. Updated sun-
java5 packages are available in dapper-proposed and hardy-proposed.
Updated sun-java6 package are available in hardy-proposed and jaunty-
proposed.
Please comment in https://b
Pjotr,
This leaves you with:
a) using the workaround provided and installing sun-java6 packages from karmic.
You can also install the software directly from Sun. Although a poor choice for
Ubuntu in general, it gets you as a 'simple user' with the update.
b) figuring out how to build a package y
This is a community matter. I asked that this be brought up in #ubuntu-
motu because there seems to be a lack of interest from the community to
maintain this package and I hoped that more people than those in this
bug could respond and help. No one did. People complain, but no one
wants to put in t
Please pick up the discussion in the ubuntu-motu mailing list. Pjotr
sent a message with the subject of 'Structural problem with Sun Java
JRE'. It hasn't gotten any feedback yet (possibly because the title
didn't convey the urgency).
--
version 1.6.0_15 is available
https://bugs.launchpad.net/bu
Please note that while I am not the package maintainer, sun-java6 is in
multiverse and is community supported. It and sun-java5 were originally
provided in Ubuntu multiverse to help developers have access to java
when there was no free alternative. As of Ubuntu 8.10, openjdk-6 is in
'main', officia
This was fixed in Karmic:
sun-java6 (6-15-1) unstable; urgency=medium
* New upstream version.
Release notes at http://java.sun.com/javase/6/webnotes/6u15.html
Addresses CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,
CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-
clamav (0.94.dfsg.2-1ubuntu0.3~dapper2) dapper-security; urgency=low
* No change rebuild from backports
** Changed in: clamav (Ubuntu Dapper)
Status: Fix Committed => Fix Released
--
Security fixes from clamav 0.95 need backport
https://bugs.launchpad.net/bugs/354190
You received this
clamav (0.94.dfsg.2-1ubuntu0.3~dapper2) dapper-security; urgency=low
* No change rebuild from backports
** Changed in: clamav (Ubuntu Dapper)
Status: Fix Committed => Fix Released
--
Fix relevant security bugs from 0.95.1 in earlier releases
https://bugs.launchpad.net/bugs/360502
You
** Changed in: clamav (Ubuntu Dapper)
Status: Triaged => Fix Committed
** Changed in: clamav (Ubuntu Hardy)
Status: In Progress => Fix Committed
--
Security fixes from clamav 0.95 need backport
https://bugs.launchpad.net/bugs/354190
You received this bug notification because you ar
** Changed in: clamav (Ubuntu Dapper)
Status: In Progress => Fix Committed
** Changed in: clamav (Ubuntu Hardy)
Status: In Progress => Fix Committed
--
Fix relevant security bugs from 0.95.1 in earlier releases
https://bugs.launchpad.net/bugs/360502
You received this bug notificati
Marking the ufw portion of the bug as Fix Released, and assigning to me,
as the changes required for later versions of ufw to run on Hardy have
been incorporated in Jaunty. Leaving the Hardy Backports task to
Didier.
** Changed in: ufw (Ubuntu)
Assignee: Didier Roche (didrocks) => Ja
Marking the iptables task as "Won't Fix" as it is too intrusive and ufw
in Jaunty can run without the newer iptables.
** Changed in: iptables (Ubuntu)
Status: Confirmed => Won't Fix
** Summary changed:
- Please backport ufw 0.22 from intrepid
+ Please backport ufw from Jaunty
** Descript
Didier, can you test the ufw/trunk (need at least rev 331)? I just
committed a patch to support running ufw on systems with iptables < 1.4.
This feature will be in ufw 0.26 which I will eventually upload to
Jaunty.
--
Please backport ufw 0.22 from intrepid
https://bugs.launchpad.net/bugs/268931
Y
** Changed in: ufw (Ubuntu)
Importance: Undecided => Wishlist
Status: New => Confirmed
--
Please backport ufw 0.22 from intrepid
https://bugs.launchpad.net/bugs/268931
You received this bug notification because you are a member of Ubuntu
Backports Testing Team, which is subscribed to Ha
Another option that occurred to me is to patch ufw to not use
application profiles for ipv6 (the requirement on iptables 1.4 is due to
how ufw uses a new ip6tables feature, present in iptables in hardy).
Application profiles could be removed altogether for hardy. Since none
are shipped in hardy, th
http://www.ubuntu.com/usn/usn-628-1
** Changed in: php5 (Ubuntu Dapper)
Status: Fix Committed => Fix Released
--
Please roll out security fixes from PHP 5.2.6
https://bugs.launchpad.net/bugs/227464
You received this bug notification because you are a member of Ubuntu
Backports Testing Tea
** Changed in: php5 (Ubuntu Dapper)
Status: In Progress => Fix Committed
** Changed in: php5 (Ubuntu Feisty)
Status: In Progress => Fix Committed
** Changed in: php5 (Ubuntu Gutsy)
Status: In Progress => Fix Committed
** Changed in: php5 (Ubuntu Hardy)
Status: In Prog
** Changed in: php5 (Ubuntu Dapper)
Assignee: (unassigned) => Jamie Strandboge (jdstrand)
Status: New => In Progress
** Changed in: php5 (Ubuntu Feisty)
Assignee: (unassigned) => Jamie Strandboge (jdstrand)
Status: New => In Progress
** Changed in: php5 (
While the debdiff is much appreciated, there are several issues involved
beyond pushing out this debdiff:
1) updates need to be backported and tested for all for released versions (not
just hardy)
2) the patches in the debdiff are not in line with Debian or other
distributions, so they need to b
CVE-2007-4174
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-4174
** Changed in: tor (Ubuntu)
Status: New => Confirmed
--
Tor is vulnerable to a rewrite vuln on the controlport
https://bugs.launchpad.net/bugs/152232
You received this bug notification because you ar
46 matches
Mail list logo