tatus: Fix Released => In Progress
** Changed in: unzip (Ubuntu Noble)
Status: New => In Progress
** Changed in: unzip (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: unzip (Ubuntu Oracular)
Assignee: (unassigned) => Marc Desl
grub-install worked, and the laptop reboot successfully. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi/install_devices becoming stale due to by-id/nvme-eui.*
symlin
So now that we've identified the root cause, I have checked the box
beside the disk that is displayed, clicked the Next button and am
presented with a dialog with an unchecked box that says "Continue
without installing grub". If I don't check that, I get a warning and I
go back to the disk selectio
We have a winner!
01:00.0 Non-Volatile memory controller [0108]: SK hynix Gold P31 SSD
[1c5c:174a]
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi/install_devices becoming sta
/sys/class/block/nvme0n1/wwid is:
nvme.1c5c-465342334e3636383131343130334f3259-534b48796e69785f48464d35313247443348583031354e-0001
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
g
I didn't migrate the installation. It looks like I installed it with
jammy. Here are the /var/log/installer contents if that helps any.
** Attachment added: "Contents of /var/log/installer"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823468/+files/installer.tgz
-
** Attachment added: "Contents of /dev/disk/by-id"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823467/+files/by-id.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/20
Here's the output of debconf-show grub-pc.
debconf-show grub-efi-amd64 didn't return anything.
** Attachment added: "grub-pc debconf"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823439/+files/output.txt
--
You received this bug notification because you are a mem
The laptop is still waiting at this dialog in case there's some relevant
information that would be useful for this bug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi install d
> Is it possible that something was changed about this installation /
computer since it was originally installed that could have caused the
install device to become invalid?
There nothing special about this device. It's just an HP laptop with a
single disk that was installed by me in a default way
Public bug reported:
A family member just sent me this dialog that popped up when they
installed their updates today. I'm not sure how a regular user is
supposed to be able to handle what is presented here. Do they check the
box? What happens if they don't?
Heck, even I don't know what the proper
** Changed in: cups (Ubuntu Oracular)
Status: New => Fix Committed
** Changed in: cups (Ubuntu Focal)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Jammy)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Noble)
Assi
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2082335
Title:
Sept 2024 security issue tracking bug
To manage notifications about
** Information type changed from Private Security to Public Security
** Changed in: gnupg2 (Ubuntu)
Status: New => Confirmed
** Changed in: gnupg2 (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Jammy)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Noble)
Importance: Undecided
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Public Security to Public
** Tags added: noble
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073033
Title:
request to /storage/v2/edit_partition crashed with Excep
** Changed in: apache2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications a
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2076471
Title:
Screen locking issue
To manage notifications about this bug go to:
ht
** Also affects: pkgbinarymangler (Ubuntu)
Importance: Undecided
Status: New
** Changed in: pkgbinarymangler (Ubuntu)
Status: New => Confirmed
** Changed in: sunpy (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
** Changed in: opensbi (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076397
Title:
Ghostwrite mitigation
To manage notifications about this bug go to:
http
** Changed in: linux-aws-5.15 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2080555
Title:
ubunutu 20 has many vulnerability for the package linux-aws-5.15
** Changed in: libssh2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2079834
Title:
libssh2-1 lacks support for rsa-sha2-{512,256}
To manage notifications a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2081605
Title:
3.32.2 Deprecated
To manage notifications about this bug go to:
https://bugs
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: github.com/python/cpython/issues #124170
https://github.com/python/cpython/issues/124170
** Also affects: python via
https://github.com/python/cpython/issues/124170
Importance: Unknown
Status: Unknown
** Bug watch added: Debian Bug tracker #1079780
https://b
Update has been published now, thanks for testing!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075145
Title:
exfatprogs CVE-2023-45897 backport to jammy
To manage notifications about this bug go
Thanks for the debdiff for this issue. I've validated that that is the
only commit that affects jammy.
I have uploaded this package for building in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has finished building, c
I'll let someone else decide if this bug is still worth fixing even
though we aren't using the helper anymore.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell-portal-helper
Ah yes, this should be fixed now because of the security update. I meant
to update this bug, but forgot. Thanks for noticing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell
Thanks!
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077001
Title:
Clipboard contents available at locked screen
To manage no
Thanks Rico!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2076
Hi Rico, the debdiff in comment #1 contains a patch that doesn't
actually apply to jammy. Could you please fix it? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
Thanks for preparing these Rico, I'll prepare the security updates!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://
** Changed in: nautilus-share (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nautilus-share (Ubuntu Focal)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Unfortunately, we did not have access to the simplified patches for 9.16
when the security issues were published, and since 9.16 is no longer
supported by ISC since April 2024, we weren't expecting them to become
available.
The patches for 9.18 were much more sophisticated rendering backporting
to
I don't believe Ubuntu 20.04 shipped with a dnssec-enable directive.
Could you perhaps have upgraded from a previous release, or kept an old
configuration file? Did you get warnings in your log file about the
deprecated directive?
--
You received this bug notification because you are a member of
** Package changed: apache2 (Ubuntu) => firefox (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073942
Title:
Fox News Site Not Working
To manage notifications about this bug go to:
https:/
Unfortunately the nova package in jammy-proposed got superseded by a
security update and will have to be re-uploaded.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999814
Title:
[SRU] Allow for spe
Thanks, that is very helpful, so we're getting an extra slash here:
rewrite '/asd.example.com/' -> 'http:///asd:8000/'
instead of:
rewrite '/asd.example.com/' -> 'http://asd:8000/'
and I can confirm this issue exists with upstream's 2.4.62 release too,
so I will keep an eye out for new fixes th
I'm having difficulty reproducing your exact issue. Could you please run
apache with "rewrite:trace3" and show working and non-working requests
from error.log? Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications about
: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications about this bug go to:
ht
Regression fix USN has now been published:
https://ubuntu.com/security/notices/USN-6885-2
Thanks!
** Changed in: apache2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
s: apache2 (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: apache2 (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: apache2 (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: apache2 (Ubuntu Jammy)
I have uploaded a test package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If you could give it a spin and see if it fixes the issue, that would be
great. If it does, I'll release it as a regression update.
Thanks!
--
You receiv
This is a stab in the dark but perhaps this is part of the problem:
https://github.com/apache/httpd/commit/4d3a308014be26e5407113b4c827a1ea2882bf38
Would you be willing to try a test package if I build one?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072648
Title:
Regression in Apache 2.4.52-1ubuntu4
Is this all your are getting? "Reason: URI has no hostname: /…"
Or did you edit that to remove sensitive info?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072648
Title:
Regression in Apache 2.4.5
** Changed in: crowdsec-firewall-bouncer (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069596
Title:
blocks wrong IPv4 and IPv6 addresses on LE systems (rev
We have no way of knowing why virustotal is flagging this as being
malicious, so there is no actionable item we can take with this bug
report.
Could you get more details on the issue?
** Changed in: golang-1.22 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification beca
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: pam (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069490
Title:
Possible fingerjacking vulnerability: CVE-2024-37408
To manage notifications a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for reporting this issue. It's a pretty odd issue, because all
the OpenSSH update did was disable a line that logged something, so I'm
not sure how it could be related to connecting from a different subnet.
Can you confirm that downgrading to the previous release fixes the
issue?
--
You r
** Summary changed:
- Investigate ASLR being disabled for children
+ Investigate ASLR re-randomization being disabled for children
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071815
Title:
Inves
Subscribing Nick, who appears to be the original delta author.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071815
Title:
Investigate ASLR being disabled for children
To manage notifications abou
*** This bug is a security vulnerability ***
Public security bug reported:
The systemd-socket-activation.patch patch has an Ubuntu delta to fix bug
2011458, but this results in ASLR not being re-randomized for children
because the patch delta does "rexec_flag = 0;".
This was discovered as part o
** Information type changed from Private Security to Public Security
** Changed in: openssh (Ubuntu Oracular)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2
It looks like upstream released a follow-up commit to fix this issue, or
one similar to it:
https://github.com/OpenPrinting/cups/commit/145b946a86062aafab76c656ee9c1112bfd4f804
We will build test packages to see if this solves the regression, and if
so, we will publish updates.
** Also affects:
I have built packages in the security team proposed PPA for testing.
Additional packages required no-change rebuilds in the -security pocket
also. For Jammy, the additional packages are breeze, libksysguard,
layer-shell-qt, kwin, kwayland-server. For Focal, the additional
packages are kwin and bree
ACK on the debdiffs, packages are building now!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067742
Title:
[SRU] CVE-2024-36041 Fix ksmserver: Unauthorized users can access
session manager
To m
In response to comment #7, I have no issue releasing a security update
regression fix for focal and jammy that relaxes the CVE fix for sockets
since that is a change in behaviour. Let me know once the proposed patch
has been successfully tested to resolve the issue.
--
You received this bug notif
This is the upstream commit which introduced the change in behaviour:
https://gitlab.com/qemu-
project/qemu/-/commit/f6b0de53fb87ddefed348a39284c8e2f28dc4eda
There is no subsequent fix to the new restrictions, and the only more
recent commit is one to deprecate the whole proxy backend:
https://g
These were all released:
https://ubuntu.com/security/notices/USN-6789-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Mantic)
Sta
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059852
Title:
Invalid free called during libfreetype FT_Done_Glyph
To manage noti
Adding gnome-session as this is where the logic exists.
I don't see any changes in the latest gnome-session script. Could you
please file a bug with the upstream gnome-session developers here?:
https://gitlab.gnome.org/GNOME/gnome-session/-/issues
Thanks!
** Also affects: gnome-session (Ubuntu)
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: network-manager-pptp (Ubuntu)
Status: New => Won't Fix
** Changed in: ubuntu-release-notes
Status: New => Fix Released
** Changed in: pptp-linux (Ubuntu)
Status: New => Confirmed
--
You received thi
** Changed in: openjdk-22 (Ubuntu)
Status: Triaged => Fix Committed
** Changed in: openjdk-22 (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: openjdk-23 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubun
** Changed in: mate-desktop (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058434
Title:
leakage of private information through window list preview
To manag
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Tags added: community-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063055
Title:
Boot failure 24.04
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065678
Title:
nvidia-graphics-drivers-545 package fails to launch graphical
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Since they are new upstream versions, and are already going through the
SRU process, I'll wait until they are verified-done, and I will do a no-
change rebuild of them into the -security pocket.
Does that sound reasonable? Thanks!
--
You received this bug notification because you are a member of
Thanks for the debdiffs, I will prepare packages in the security PPA and
will comment back
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728
Title:
CVE-2024-3044
To manage notifications about t
ACK on the debdiffs. Uploaded for processing by the SRU team. Thanks!
** Changed in: openscap (Ubuntu Focal)
Status: New => In Progress
** Changed in: openscap (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The regression fix has now been published:
https://ubuntu.com/security/notices/USN-6728-3
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
That is pretty odd, I can't reproduce this issue on jammy.
what's the output of "ldd /lib/x86_64-linux-
gnu/libwebkit2gtk-4.0.so.37"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062916
Title:
ev
Thanks for testing it, it's much appreciated!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go t
I have located the issue and have prepared an updated package that will
reintroduce the fixes for CVE-2023-5824. I have uploaded the updated
package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it has finished building, could y
That's good to see!
Since this is a deliberate side-effect of the security change, I am
marking this bug as "invalid". Thanks
** Changed in: apache2 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
I think this is actually the correct new behaviour for the security
update...could you please try using ap_trust_cgilike_cl as instructed
here:
https://bz.apache.org/bugzilla/show_bug.cgi?id=68872
** Bug watch added: bz.apache.org/bugzilla/ #68872
https://bz.apache.org/bugzilla/show_bug.cgi?id
Thanks for testing, I'll keep digging...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
this is undesired
To m
I have uploaded a package with a possible fix to the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it's finished building, could you please give it a try and see if
it solves the issue for you? If so, I will publish it as a security
re
I believe I've spotted the regression and will have a package to test
soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chun
Thanks for filing this bug, I'll investigate the changes and will report
back.
Have you seen this behaviour on anything other than focal?
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Information type changed from Public to Public
There are packages for focal, jammy, and mantic available for testing in
the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If they work in your environment, please mention it in this bug. Thanks!
--
You received this bug notification beca
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
1 - 100 of 11708 matches
Mail list logo