I've done a build test here:
https://launchpad.net/~ebarretto/+archive/ubuntu/devel-testing/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2115259
Title:
Please sync smartdns from Debian Un
** Changed in: quassel (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/950146
Title:
quasselclient crashed with SIGSEGV in data()
To manage notifications abou
Hi Stefan,
We recently published updates for roundcube:
https://ubuntu.com/security/notices/USN-7584-1
For Jammy those are available under Ubuntu Pro
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bu
** Merge proposal linked:
https://code.launchpad.net/~ebarretto/ubuntu/+source/libscrypt/+git/libscrypt/+merge/487477
** Description changed:
Scheduled-For: ubuntu-25.07
Ubuntu: 1.22-0.1ubuntu2
Debian Unstable: 1.22-1
A new release of libscrypt is available for syncing from Debian
portance: Undecided
Assignee: Eduardo Barretto (ebarretto)
Status: In Progress
** Changed in: libscrypt (Ubuntu)
Status: New => In Progress
** Changed in: libscrypt (Ubuntu)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
** Changed in: libscrypt (Ubuntu)
M
** Changed in: azure-proxy-agent (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => Hlib Korzhynskyy
(hlibk)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2112359
Title:
[MIR] azure-
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2106301
Title:
package is lacking security update for CVE-2025-1244
To manage notifications
For now to allow this package to be built for questing I've disabled the
tests and provided the attached debdiff for sponsoring, which you can
see above it was already sponsored.
I will keep an eye on the upstream bug, but it might take a while to get
a new version for it.
** Patch added: "opensc
I've reported this issue to upstream, as this seems to be a failure in the
datastream signature test with the changes done to xmlsec1 over the years.
We could find out what is the change in xmlsec1 that trigger this issue. Now
waiting to see if upstream will have a patch for it.
For more informat
** Changed in: amd64-microcode (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2109595
Title:
Please merge amd64-microcode=3.20250311.1 from Debian un
Apologies — I initially attached the screen recording with a filename
containing accentuated characters, which may cause issues on Launchpad.
I'm now re-uploading the same file with a simplified name (no accents).
Thank you for your understanding.
** Attachment added: "2025-06-05 23-22-12.mp4"
** Attachment added: "2025-06-05 22-56-13.mp4"
https://bugs.launchpad.net/ubuntu/+source/software-properties/+bug/2112607/+attachment/5882414/+files/2025-06-05%2022-56-13.mp4
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://
Same issue with me.
On Ubuntu 25.04 using GNOME 48, I noticed that clicking "Suspend" from
the system menu (top-right corner) using a mouse or trackpad has no
effect — the action is ignored. However, tapping the same "Suspend"
button using the touchscreen works correctly and suspends the system as
Public bug reported:
When switching to the "Additional Drivers" tab in `software-properties-
gtk`, the list of available drivers is duplicated every time the tab is
changed. This results in multiple copies of the same driver options
appearing in the interface.
---
**Steps to Reproduce:**
1. Ope
Thank you very much for your kind reply — and I really appreciate you
taking the time to read my report carefully.
Also, I must apologize: I misunderstood your initial message and
translated it incorrectly on my end. English is not my native language,
and I'm still learning how to navigate the Lau
This is now sponsored by mdeslaur
** Changed in: lrzip (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2112368
Title:
Sync lrzip from Debian Unstable for q
** Summary changed:
- Merge lrzip from Debian Unstable for questing
+ Sync lrzip from Debian Unstable for questing
** Description changed:
Scheduled-For: ubuntu-25.07
Ubuntu: 0.651-2ubuntu1
Debian Unstable: 0.651-3
- A new release of lrzip is available for merging from Debian Unstable.
Thank you for the feedback — and apologies if the original report came
across as a personal preference rather than a serious technical issue.
This is my first bug report, and I may not have made the core problem
clear enough.
Let me clarify:
The issue is not that the system shuts down too early —
Hlib will be taking a look on this on the Security Engineering side
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2112359
Title:
[MIR] azure-proxy-agent
To manage notifications about this bug go to
I've also spin up a build for this and all architectures passed (just missing
riscv64 right now):
https://launchpad.net/~ebarretto/+archive/ubuntu/devel-testing/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.la
** Summary changed:
- Merge pcl from Debian Unstable for questing
+ Sync pcl from Debian Unstable for questing
** Description changed:
Scheduled-For: ubuntu-25.07
Ubuntu: 1.14.0+dfsg-5ubuntu1
Debian Unstable: 1.15.0+dfsg-2
- A new release of pcl is available for merging from Debian Unst
** Tags removed: dcr-merge
** Description changed:
Scheduled-For: ubuntu-25.07
Ubuntu: 1.14.0+dfsg-5ubuntu1
Debian Unstable: 1.15.0+dfsg-2
A new release of pcl is available for merging from Debian Unstable.
- If it turns out this needs a sync rather than a merge, please change the
-
** Tags removed: dcr-merge
** Description changed:
Scheduled-For: ubuntu-25.07
Ubuntu: 0.651-2ubuntu1
Debian Unstable: 0.651-3
A new release of lrzip is available for merging from Debian Unstable.
- If it turns out this needs a sync rather than a merge, please change the
- tag 'dcr-
** Changed in: pcl (Ubuntu)
Milestone: None => ubuntu-25.07
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2112366
Title:
Merge pcl from Debian Unstable for questing
To manage notifications abou
discovered in initialize_control function.
- CVE-2022-28044
-- Amir Naseredini Wed, 01 Feb 2023
15:22:42 +
** Affects: lrzip (Ubuntu)
Importance: Undecided
Assignee: Eduardo Barretto (ebarretto)
Status: New
** Tags: dcr-merge
--
You received this bug notificati
test-timestamp.patch: Rewrite test
assertions to avoid using the getTimeOffset() function, which only
works for systems in UTC.
-- Nicolas Campuzano Jimenez Fri, 24
Jan 2025 16:07:44 -0500
** Affects: pcl (Ubuntu)
Importance: Undecided
Assignee: Eduardo Barretto (ebarretto)
Public bug reported:
Affected system:
Laptop: Lenovo ThinkPad T490
Ubuntu versions tested: Ubuntu 24.04 LTS and Ubuntu 25.04
Battery condition: Moderate degradation (~36% capacity loss)
upower:
Installed: 1.90.7-1build1
energy-full: 32.35 Wh
energy-full-design: 50.5 Wh
capacity:
** Changed in: mariadb (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110070
Title:
CVE-2025-30722 et al affects MariaDB in Ubuntu
To manage notifi
This is already done for questing, for noble, oracular and plucky it is now
uploaded to our security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=amd64-microcode&field.status_filter=published&field.series_filter=
--
You received th
Thanks Otto for preparing those updates! The packages are now published
and I've marked oracular accordingly.
** Changed in: mariadb (Ubuntu Oracular)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
@doko, let me know if you are already fixing it or you were planning to
and I can assign it back to you.
** Changed in: openscap (Ubuntu)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
> I just noticed that the commit that introduced the CVE hasn't even landed in
> the mentioned kernel.
>
> We introduced it to the tree 5 days ago
I see backports of commit 80cd22c35c9001fe72bf614d29439de41933deca in
all tags between Ubuntu-bluefield-5.15.0-1019.21 and Ubuntu-
bluefield-5.15.0-1
I've uploaded both to our security-proposed ppa:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=mariadb&field.status_filter=published&field.series_filter=
It will take some hours to finish building. Since I'm out tomorrow I'm
planning to publish thi
** Changed in: mariadb (Ubuntu Plucky)
Status: New => In Progress
** Changed in: mariadb (Ubuntu Plucky)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
** Changed in: mariadb (Ubuntu Noble)
Status: Confirmed => In Progress
--
You received this bug not
Published in: https://ubuntu.com/security/notices/USN-7535-1
** Changed in: intel-microcode (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2110
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2111218
Title:
linux-headers-6.11.0-25-generic post-installation script failed with
exit s
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hi Alkis,
This is currently in our backlog, unfortunately we are a bit far behind on it.
I will be personally taking a look at it next week, so I would ask to bare with
me in the meantime.
Thanks
** Changed in: amd64-microcode (Ubuntu)
Status: New => Confirmed
--
You received this bug
** Changed in: mariadb (Ubuntu Noble)
Status: New => Confirmed
** Changed in: mariadb-10.6 (Ubuntu)
Status: New => Fix Released
** Changed in: mariadb (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
** Changed in: mariadb-10.6 (Ubuntu Jammy)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110070
Title:
CVE-2025-30722 et al affects MariaDB in Ubuntu
To
** Changed in: mariadb-10.6 (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2110070
Title:
CVE-2025-30722 et al affects MariaDB in Ubuntu
To manage no
You can check the updates also through here:
https://ubuntu.com/security/CVE-2024-45332
It is on our backlog to provide the corresponding updates in the next weeks.
** Changed in: intel-microcode (Ubuntu)
Status: New => Confirmed
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?nam
Status: New
** No longer affects: mariadb (Ubuntu Jammy)
** No longer affects: mariadb-10.6 (Ubuntu Noble)
** No longer affects: mariadb-10.6 (Ubuntu Oracular)
** No longer affects: mariadb-10.6 (Ubuntu Plucky)
** Changed in: mariadb (Ubuntu Noble)
Assignee: (unassigned) => Edua
Hey Otto,
Thanks for preparing those!
I already assigned myself to review the merge request and I will try to do it
still today. Let me know whenever you have more PRs.
Thanks :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
** Package changed: ubuntu-advantage-tools (Ubuntu) => usg
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2109405
Title:
Incorrect AppArmor profile application instructions in USG
documentation/aud
Thanks again Peter for providing the debdiff.
We published a security notice for it:
https://ubuntu.com/security/notices/USN-7446-1
Also thanks for confirming that focal is affected, I will continue working on
it and whenever it is ready we will do a -2 USN for it.
--
You received this bug noti
Hi Peter,
I've uploaded from Jammy to Plucky into our security-proposed ppa:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages?field.name_filter=libapache&field.status_filter=published&field.series_filter=
If you could run some tests that everything looks good, I wou
** Changed in: libapache2-mod-auth-openidc (Ubuntu Plucky)
Status: New => In Progress
** Changed in: libapache2-mod-auth-openidc (Ubuntu Noble)
Status: New => In Progress
** Changed in: libapache2-mod-auth-openidc (Ubuntu Plucky)
Assignee: (unassigned) => Eduardo
** Changed in: libapache2-mod-auth-openidc (Ubuntu Jammy)
Status: New => In Progress
** Changed in: libapache2-mod-auth-openidc (Ubuntu Oracular)
Status: New => In Progress
** Changed in: libapache2-mod-auth-openidc (Ubuntu Oracular)
Assignee: (unassigned) => Eduardo
)
Importance: Undecided
Status: New
** Changed in: libapache2-mod-auth-openidc (Ubuntu Jammy)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
ht
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks Peter, I will take a look at your debdiff and also checking the other
releases if they are affect by it too.
I'm hoping we will have this released by next week.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://b
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: policykit-1 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2095001
Title:
Very weird and dangerous bug in systemd's sudoing (polkit?) p
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
** Also affects: gnutls28 (Ubuntu Plucky)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: gnutls28 (Ubuntu Oracular)
Importance: Undeci
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: acct (Ubuntu Plucky)
Importance: Undecided
Status: Fix Released
** Also affects: acct (Ubuntu Focal)
Importance: Undecided
Status: New
** Also affects: acct (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: acct (Ubuntu Bionic)
I
*** This bug is a duplicate of bug 2095035 ***
https://bugs.launchpad.net/bugs/2095035
** This bug has been marked a duplicate of bug 2095035
lastcomm buffer overflow detected terminated
** Information type changed from Public Security to Public
--
You received this bug notification beca
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
Thanks again Otto for preparing the updates!
** Changed in: mariadb-10.6 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2099785
Title:
CVE-2025-21490 et a
** Changed in: mariadb (Ubuntu Oracular)
Status: New => In Progress
** Changed in: mariadb (Ubuntu Noble)
Status: Fix Committed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bu
I believe you mean "why jammy has not?"
lua5.4 in jammy is in universe, and therefore it is community maintained. In
oracular and noble lua5.4 is in main, and therefore officially supported.
Therefore in jammy if the Ubuntu Security Team proactively fixes it, we then
publish this update into Ubu
Both CVEs are already patched and released through Ubuntu Pro, for more
information see:
https://ubuntu.com/security/notices/USN-6916-1
You can have free access to Ubuntu Pro up to 5 machines, see
https://ubuntu.com/pro
** Information type changed from Private Security to Public Security
--
Yo
Skia, Thanks for your support.
I've issued that command you recommended, got some more errors googled a bit
and got the solution (chatgpt). You were right. I've tried to upgrade my hole
system some days before.
You support was fundamental to get me to the solution. Thanks a lot.
--
You received
This was what I'd got from GPT
GPT's Message
The message indicates that your system needs to be fully updated before
you can upgrade to a new Ubuntu release. Follow these steps to resolve
the issue:
### Step 1: Update Your Current System
Run the following commands:
```bash
sudo apt update
If you don't mind, I think it would be better to go to the
`1:10.11.11-0ubuntu0.24.04.2` version instead since the .1 version is
updated to the security-proposed and perhaps some brave people use that
ppa in their machines. Therefore superseding it is a better solution as
we cannot publish same ver
** Also affects: opensaml (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: opensaml2 (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: opensaml (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: opensaml2 (Ubuntu Trus
John Breton will take a look into it for both xenial and bionic esm.
This not being a security issue per se, will instead fall into
esm-infra-updates, just like focal+ will also go to updates pocket.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
** Package changed: ubuntu => opensaml (Ubuntu)
** Changed in: opensaml (Ubuntu)
Status: Confirmed => New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2103420
Title:
Security issue
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
*** This bug is a duplicate of bug 2103420 ***
https://bugs.launchpad.net/bugs/2103420
** This bug has been marked a duplicate of bug 2103420
Security issue with libsaml12
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:/
Hey Otto, sorry for the delay too, I was out last Friday.
I will take a look at the PR and will try to trigger a test build on the ppa to
see if it passes fine now.
Thanks again for investigating and preparing those.
--
You received this bug notification because you are a member of Ubuntu
Bugs,
*** This bug is a duplicate of bug 2098930 ***
https://bugs.launchpad.net/bugs/2098930
** This bug has been marked a duplicate of bug 2098930
openvpn profile doesn't allow access to files on home dir
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is s
hey @otto, it seems both builds are currently broken for riscv64:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=mariadb&field.status_filter=published&field.series_filter=
Could you please take a look on it?
--
You received this bug notification b
** Changed in: mariadb-10.6 (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2099785
Title:
CVE-2025-21490 et al affects MariaDB in Ubuntu
To manage no
** Changed in: javascript-common (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2100586
Title:
package javascript-common 11+nmu1 failed to install/upgrade: in
Public bug reported:
package linux-headers-6.11.0-17-generic 6.11.0-17.17~24.04.2 failed to
install/upgrade: o subprocesso instalado, do pacote linux-
headers-6.11.0-17-generic, o script post-installation retornou erro do
status de saída 11
doesn't install
ProblemType: Package
DistroRelease: Ubu
I've uploaded mariadb for noble into our security-proposed PPA. I will check on
Tuesday (out on Monday) if we got any autopkgtest results for it.
For oracular are you working on it?
And for jammy, as I mentioned in the PR, it is missing in the pristine-
tar.
Thanks!
** Changed in: mariadb (Ubun
** Changed in: mariadb (Ubuntu Noble)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2099785
Title:
CVE-2025-21490 et al affects MariaDB in Ubuntu
To manage notific
Public bug reported:
Almost every installation I try using apt-get I get an error like this:
dpkg: error processing package javascript-common (--configure):
installed javascript-common package post-installation script subprocess
returned error exit status 1
(...) # this changes the depending on
** Changed in: mariadb (Ubuntu Noble)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
** Changed in: mariadb (Ubuntu Oracular)
Assignee: (unassigned) => Eduardo Barretto (ebarretto)
** Changed in: mariadb (Ubuntu Plucky)
Assignee: (unassigned) => Otto Kekäläi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
1 - 100 of 2307 matches
Mail list logo