Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051543
Title:
When I use a keyboard shortcut to lower a window, the window retains
its
** Changed in: amavisd-new (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058023
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.
--
You received this bug notification because you are a member
https://ubuntu.com/security/notices/USN-6727-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications about this
==
Ubuntu Security Notice USN-6727-2
April 11, 2024
nss regression
==
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu
** Changed in: nss (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage
==
Ubuntu Security Notice USN-6729-1
April 11, 2024
apache2 vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a
(Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Focal)
Status: New => In Progress
** Changed in: nss (Ubuntu Jammy)
St
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906
This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!
** This bug has been marked a duplicate of bug 2060906
attempt to add opensc using
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060968
Title:
SafeNet Authentication Client eToken driver error
To manage notifications
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications
https://ubuntu.com/security/notices/USN-6728-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go
==
Ubuntu Security Notice USN-6728-2
April 11, 2024
squid regression
==
A security issue affects these releases of Ubuntu and its derivatives:
-
Thanks for testing everyone, and thanks for the configuration details. I
will attempt to reproduce this issue so that I can figure out what
exactly caused the regression so that we can get CVE-2023-5824 fixed
again soon.
--
You received this bug notification because you are a member of Ubuntu
** Information type changed from Public to Public Security
** Changed in: squid (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: squid (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubunt
I have prepared an update with the patches for CVE-2023-5824 backed out
as they were extensive and are the most likely cause of this regression.
I have uploaded it to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has
Thanks for reporting this issue. What configuration is this squid server
used in? I would like to reproduce the issue, but I need more details to
set up a similar environment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
More CVE fixes have gone in here:
https://ubuntu.com/security/notices/USN-6728-1
I believe there are no more open CVEs for Squid, so I am closing this
bug. Thanks!
** Changed in: squid (Ubuntu Focal)
Status: Confirmed => Fix Released
** Changed in: squid (Ubuntu Jammy)
Status:
==
Ubuntu Security Notice USN-6728-1
April 10, 2024
squid vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6727-1
April 10, 2024
nss vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6719-2
April 10, 2024
util-linux vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
@pitti: mantic will be EoL in a couple of months, I think if you want
the fix in quickly, having the minimal fix would be the fastest way to
do it, though you may decide it's not worth it seeing as the release
will be ending soon.
--
You received this bug notification because you are a member of
FYI This is now in the jammy and focal upload queues to go to -proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017
Title:
mount rules grant excessive permissions
To manage
==
Ubuntu Security Notice USN-6719-1
March 27, 2024
util-linux vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
There's a relevant thread here:
https://lore.kernel.org/all/27131a7fae2794a63f4f285a20e41116ba4198f3.ca...@gmail.com/T/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976556
Title:
[Lenovo 300e
==
Ubuntu Security Notice USN-6718-1
March 27, 2024
curl vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6712-1
March 25, 2024
libnet-cidr-lite-perl vulnerability
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6713-1
March 25, 2024
qpdf vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
It appears most of the systemd autopkgtest failures are because of this
flaky test:
https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64
The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless
The same issue was present with the old dnsmasq package...for example:
https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
==
Ubuntu Security Notice USN-6697-1
March 18, 2024
bash vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
t; Confirmed
** Changed in: sudo (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options
I'll fix this issue in noble.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options from --with-all-insults to --with-pc-
insults
To manage notifications about
Could you please file a bug upstream about the missing change, and let
us know the bug number?
https://bugzilla.sudo.ws/index.cgi
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:
-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS
--
You received this
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.
The noble package doesn't use --enable-offensive-insults.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
==
Ubuntu Security Notice USN-6695-1
March 14, 2024
texlive-bin vulnerabilities
==
A security issue affects these releases of Ubuntu and its
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
FFe: version 0.58 introduces a new field
To manage notifications about this bug go to:
==
Ubuntu Security Notice USN-6691-1
March 12, 2024
ovn vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6690-1
March 12, 2024
openvswitch vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6687-1
March 11, 2024
accountsservice vulnerability
==
A security issue affects these releases of Ubuntu and its
** Attachment added: "Build log"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754633/+files/pasaffe_0.58-0ubuntu1_amd64.build
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
NEWS file:
0.58 (2024-03-09)
* Enhancements:
- Add email field
- Updated translations
* Bug fixes:
- Fix some deprecation warnings in the test suite
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "ChangeLog"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754632/+files/ChangeLog
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
Public bug reported:
I would like to request a FFe for version 0.58 of Pasaffe.
The new version updates translations, and adds a single feature:
displaying the email field from the password database which has been
requested for a long time, but I had not had time to implement it until
now.
It's
==
Ubuntu Security Notice USN-6679-1
March 06, 2024
frr vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
I am marking this bug as "invalid" per your last comment. Thanks!
** Changed in: dnsmasq (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After
==
Ubuntu Security Notice USN-6674-1
March 04, 2024
python-django vulnerability
==
A security issue affects these releases of Ubuntu and its
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.
I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.
I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:
udp0 0 192.168.122.1:530.0.0.0:*
1521/named
The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address is
assigned
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
I will prepare updates for testing with the problematic commit reverted.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
Thanks for filing this bug, and the excellent analysis.
So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088
That was in response to this mailing list discussion:
Hi,
What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
dnsmasq-base
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052739
Title:
==
Ubuntu Security Notice USN-6667-1
February 28, 2024
libcpanel-json-xs-perl vulnerability
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN-6665-1
February 28, 2024
unbound vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6668-1
February 28, 2024
python-openstackclient vulnerability
==
A security issue affects these releases of Ubuntu and
==
Ubuntu Security Notice USN--1
February 28, 2024
libuv1 vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
bind9 9.16.48 is now in focal with the latest security update.
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Triaged => Fix Released
** Changed in: bind9 (Ubuntu Focal)
Status: Triaged => Fix Committed
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Fix
==
Ubuntu Security Notice USN-6658-1
February 26, 2024
libxml2 vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6656-1
February 26, 2024
postgresql-12, postgresql-14, postgresql-15 vulnerability
==
A security issue affects these
==
Ubuntu Security Notice USN-6657-1
February 26, 2024
dnsmasq vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6642-1
February 19, 2024
bind9 vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6636-1
February 14, 2024
clamav vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6633-1
February 13, 2024
bind9 vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6631-1
February 12, 2024
webkit2gtk vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6630-1
February 12, 2024
python-glance-store vulnerability
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6622-1
February 05, 2024
openssl vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6620-1
February 01, 2024
glibc vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6618-1
January 30, 2024
pillow vulnerabilities
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6587-3
January 30, 2024
xorg-server, xwayland regression
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6616-1
January 30, 2024
openldap vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
==
Ubuntu Security Notice USN-6615-1
January 30, 2024
mysql-8.0 vulnerabilities
==
A security issue affects these releases of Ubuntu and its
==
Ubuntu Security Notice USN-6597-1
January 25, 2024
puma vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
-
==
Ubuntu Security Notice USN-6598-1
January 25, 2024
paramiko vulnerability
==
A security issue affects these releases of Ubuntu and its derivatives:
101 - 200 of 13836 matches
Mail list logo