[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-06-11 Thread Eduardo Barretto
Hey Otto, sorry, I was off for a few days. So should I go ahead with the sponsor or do you want to merge things first? Either work well for me and I can continue with the sponsoring this week still. -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 2068625] Re: flickering screen

2024-06-10 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-06-05 Thread Eduardo Barretto
This is now released as mentioned in: https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/14 https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/15 ** Changed in: openscap (Ubuntu Focal) Status: In Progress => Fix Released ** Changed in: openscap

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-06-03 Thread Eduardo Barretto
** Tags removed: verification-needed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2062389 Title: [SRU] Fix segfault in systemdunitdependency probe To manage notifications about this bug go to:

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-05-30 Thread Eduardo Barretto
Hey Otto, sorry for the delay, the branches look good, and I could successfully build the package and check the diff with the PR, but I again had to bypass that issue with gbp not generating the orig tarball correctly. I'm investigating this issue a bit more to see what is going on. -- You

[Bug 2067125] Re: CVE-2024-21096 et al affects MariaDB in Ubuntu

2024-05-27 Thread Eduardo Barretto
Hi Otto, Thanks for preparing the updates! I will be taking a look at the PRs between today and tomorrow -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2067125 Title: CVE-2024-21096 et al affects

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-05-08 Thread Eduardo Barretto
On Ubuntu 20.04, following the tests outlined in the description, below is the result: $ uname -a Linux sec-focal-amd64 5.4.0-181-generic #201-Ubuntu SMP Thu Mar 28 15:39:01 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ dpkg -l | grep libopenscap ii libopenscap8

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-05-08 Thread Eduardo Barretto
On Ubuntu 22.04, following the tests outlined in the description, below is the result: $ uname -a Linux sec-jammy-amd64 6.5.0-28-generic #29~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Thu Apr 4 14:39:20 UTC 2 x86_64 x86_64 x86_64 GNU/Linux # Check that current version of openscap is installed $ dpkg

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-05-07 Thread Eduardo Barretto
Hey @phausman, could you please try to reproduce by using the openscap -proposed? For more information: https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/comments/10 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-26 Thread Eduardo Barretto
** Also affects: openscap (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: openscap (Ubuntu Mantic) Importance: Undecided Status: New ** Changed in: openscap (Ubuntu Mantic) Status: New => Fix Released ** Changed in: openscap (Ubuntu Noble)

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767572/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.16-2ubuntu3.4.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767571/+files/openscap_1.2.16-2ubuntu3.4.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-18 Thread Eduardo Barretto
I've create the SRU ticket here: https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2060345 Title: oscap crashes during audit on the

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767559/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff ** Description changed: [ Impact ] - * This issue causes a crash in openscap when there's a

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767558/+files/openscap_1.2.17-0.1ubuntu7.22.04.2.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Patch added: "openscap_1.2.16-2ubuntu3.4.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767557/+files/openscap_1.2.16-2ubuntu3.4.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Attachment added: "oval file for ubuntu 20.04" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767555/+files/ssg-ubuntu2004-oval.xml -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
** Attachment added: "oval file for ubuntu 22.04" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+attachment/5767556/+files/ssg-ubuntu2204-oval.xml -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2062389] [NEW] [SRU] Fix segfault in systemdunitdependency probe

2024-04-18 Thread Eduardo Barretto
Public bug reported: [ Impact ] * This issue causes a crash in openscap when there's a circular dependency in systemd services, and currently affects both Ubuntu 20.04 and 22.04. * This indirectly is affecting the usage of USG (Ubuntu Security Guide) for CIS auditing in systems with ceph-mds.

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-18 Thread Eduardo Barretto
** Changed in: openscap (Ubuntu) Status: New => Confirmed ** Changed in: openscap (Ubuntu Focal) Status: New => In Progress ** Changed in: openscap (Ubuntu Jammy) Status: New => In Progress ** Changed in: openscap (Ubuntu Focal) Assignee: (unassigned) => Edua

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-17 Thread Eduardo Barretto
@phausman I won't be doing the SRU. Since Peter is investigating it, it is best if it comes from him. If you are building from source and it does not produce a crash, then the bug mentioned by Peter is not really necessary and something else might be the issue. As the circular dependency does

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-16 Thread Eduardo Barretto
Peter, do note that this fix never landed on 1.2 openscap, it will require some backporting. To land this fix it should be done through an SRU process. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 2060345] Re: oscap crashes during audit on the system with ceph-mds package installed

2024-04-16 Thread Eduardo Barretto
** Also affects: openscap Importance: Undecided Status: New ** No longer affects: openscap ** Also affects: openscap (Ubuntu) Importance: Undecided Status: New ** Changed in: usg Status: New => Invalid -- You received this bug notification because you are a member

[Bug 2057814] Re: upgrade

2024-03-13 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 2057775] Re: package libignition-fuel-tools4-4 (not installed) failed to install/upgrade: trying to overwrite '/usr/lib/x86_64-linux-gnu/libignition-fuel_tools4.so.4', which is also in package li

2024-03-13 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 2056775] Re: openscap fails in multiple tests when auditing on fresh Jammy

2024-03-11 Thread Eduardo Barretto
Could you please run with --debug and upload the logs? ** Changed in: openscap (Ubuntu) Status: New => Incomplete ** Package changed: openscap (Ubuntu) => usg ** Summary changed: - openscap fails in multiple tests when auditing on fresh Jammy + usg fails in multiple tests when auditing

[Bug 2056091] Re: package linux-headers-generic-hwe-22.04 6.5.0.21.20 failed to install/upgrade: bağımlılık sorunları - yapılandırılmadan bırakılıyor

2024-03-11 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 2056596] Re: L'installation de grub a echoué

2024-03-11 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 2036595] Re: vulnerability in libcue affects tracker-extract (GHSL-2023-197)

2024-03-11 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2036595 Title: vulnerability in libcue affects tracker-extract (GHSL-2023-197) To

[Bug 2055270] Re: Buy Tramadol Online At Lowest Prices

2024-02-28 Thread Eduardo Barretto
** Changed in: systemd (Ubuntu) Status: New => Invalid -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2055270 Title: Buy Tramadol Online At Lowest Prices To manage notifications about this

[Bug 2054916]

2024-02-26 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 2055013]

2024-02-26 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-18 Thread Eduardo Barretto
This patch is not acceptable as you are trying to fix a security issue (already fixed) and a bug issue. Please only upload a debdiff for the bug issue. Also create a new ticket for that, as this one if for the security issue and that was already fixed. -- You received this bug notification

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2023-09-04 Thread Eduardo Barretto
That is already fixed under Ubuntu Pro: https://ubuntu.com/security/notices/USN-5245-1 https://ubuntu.com/security/notices/USN-5239-1 ** Changed in: maven (Ubuntu) Status: Confirmed => Fix Released ** Changed in: httpcomponents-client (Ubuntu) Status: Confirmed => Fix Released --

[Bug 2007456] Re: CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser.

2023-02-24 Thread Eduardo Barretto
Hi Keath, It takes time because it is a newer version update. As you can see in comment #4 it is currently available for testing on security-proposed ppa. If you could test it and give us a feedback that it is working properly that would be much appreciated. Also we are currently having issues

[Bug 2007273] Re: I have ubuntu 22.04 on my system and have the following vulnerability : CVE-2022-4743. On which release/path of Ubuntu can I expect them to be fixed ?

2023-02-14 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. This is low priority CVE for us, it will only get patched if a higher priority CVE for libsdl2 in 22.04 shows up. Right now there are none, therefore no ETA. ** Information type changed from Private Security to

[Bug 2007274] Re: I have ubuntu 22.04 on my system and have the following vulnerability : CVE-2022-46908. On which release/path of Ubuntu can I expect them to be fixed ?

2023-02-14 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. This is low priority CVE for us, it will only get patched if a higher priority CVE for sqlite3 in 22.04 shows up. Right now there are none, therefore no ETA. ** Description changed: I have ubuntu 22.04 on my

[Bug 2000848] Re: CVE-2022-41138: Unreleased in zutty

2023-01-03 Thread Eduardo Barretto
** Changed in: zutty (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/2000848 Title: CVE-2022-41138: Unreleased in zutty To manage notifications about

[Bug 1995402] Re: cups keeps spool files forever and thus reveals confidential data

2022-11-09 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security ** Changed in: cups (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report. https://bugs.launchpad.net/bugs/1995402 Title:

[Bug 1990886] Re: Security updates missing after 91.11.0

2022-09-27 Thread Eduardo Barretto
Hi Olivier, Do you have any updates on line for thunderbird? We got a similar question last week on IRC. ** Information type changed from Private Security to Public Security ** Changed in: thunderbird (Ubuntu) Status: New => Confirmed -- You received this bug notification because you

[Bug 1970779] Re: Upgrade to 2.36.7 for Focal and Jammy

2022-08-29 Thread Eduardo Barretto
Luis, you keep updating the description but you haven't replied to comment 36. Please provide the information requested. ** Changed in: wpewebkit (Ubuntu) Status: In Progress => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-19 Thread Eduardo Barretto
my colleague Spyros will be taking a look if he can bring kinetic's version to Jammy and Focal. ** Changed in: wpewebkit (Ubuntu Focal) Assignee: (unassigned) => Spyros Seimenis (sespiros) ** Changed in: wpewebkit (Ubuntu Jammy) Assignee: (unassigned) => Spyros Seimenis (sespiros) --

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
** Description changed: - I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to - fix security issues and other bugs, as well as adding features that - increase compatibility with current websites. + I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix + security

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
** Description changed: - I want to upgrade the versions in Focal and Jammy to 2.36.4 to fix - security issues and other bugs, as well as adding features that increase - compatibility with current websites. + I want to upgrade the versions in Focal, Impish and Jammy to 2.36.4 to + fix security

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal and Jammy

2022-07-13 Thread Eduardo Barretto
Just adding some notes about this request: 1. 200MB debdiff, really hard to verify/validate/test. We need to think on a good way to guarantee that we are not introducing issues. 2. On Luis' PPA the package fails to build in some architectures. Luis is going to trigger another build and see if it

[Bug 1970779] Re: Upgrade to 2.36.4 for Focal, Impish and Jammy

2022-07-13 Thread Eduardo Barretto
** Also affects: wpewebkit (Ubuntu Jammy) Importance: Undecided Status: New ** Also affects: wpewebkit (Ubuntu Focal) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to the bug report.

[Bug 1970779] Re: Multiple vulnerabilities in Focal, Impish and Jammy

2022-06-13 Thread Eduardo Barretto
Hi Luís, As my colleague mentioned to you previously, except for a few exceptions, such as ffmpeg, we generally don't accept new upstream maintenance releases into the security sponsoring process. As you can see on bug #1973814, the diff between the versions you want to upgrade are too big and

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-03 Thread Eduardo Barretto
Hi Luis, Thanks for testing! Regarding 18.04 test failure, I tried to reproduce here and it is passing fine: `... GEN tests/data/vsynth_lena.yuv TESTvsynth_lena-amv TESTvsynth_lena-asv1 TESTvsynth_lena-asv2 TESTvsynth_lena-cinepak TESTvsynth_lena-cljr TEST

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-06-02 Thread Eduardo Barretto
Hi Luis, I've uploaded the binaries to -proposed, could you please test them? Thanks ** Changed in: ffmpeg (Ubuntu Bionic) Status: In Progress => Fix Committed ** Changed in: ffmpeg (Ubuntu Focal) Status: In Progress => Fix Committed ** Changed in: ffmpeg (Ubuntu Impish)

[Bug 1970674] Re: New bug fix releases 3.4.11, 4.2.7 and 4.4.2

2022-05-30 Thread Eduardo Barretto
: New ** Changed in: ffmpeg (Ubuntu Bionic) Assignee: (unassigned) => Eduardo Barretto (ebarretto) ** Changed in: ffmpeg (Ubuntu Focal) Assignee: (unassigned) => Eduardo Barretto (ebarretto) ** Changed in: ffmpeg (Ubuntu Impish) Assignee: (unassigned) => Eduardo Barretto (

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-05-26 Thread Eduardo Barretto
We asked around the server team, and no one over there has any experience with etcd either. What should we do next? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959757 Title: [SRU] etcd FTBFS on

[Bug 1888890] Re: openscap: xenial version is lower than version published in trusty/esm

2022-05-17 Thread Eduardo Barretto
We just published today a no-change version of openscap to Xenial ESM ppas to solve this issue. ** Changed in: openscap (Ubuntu Xenial) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1966338] Re: openjdk11 update breaks customers

2022-03-29 Thread Eduardo Barretto
** Changed in: openjdk-lts (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1966338 Title: openjdk11 update breaks customers To manage notifications

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-29 Thread Eduardo Barretto
** Changed in: etcd (Ubuntu Focal) Status: Incomplete => New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959757 Title: [SRU] etcd FTBFS on Focal To manage notifications about this bug go

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-23 Thread Eduardo Barretto
** Attachment added: "golang-etcd-server-dev_amd64.txt" https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5572184/+files/golang-etcd-server-dev_amd64.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-23 Thread Eduardo Barretto
** Attachment added: "etcd-server_amd64.txt" https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5572183/+files/etcd-server_amd64.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-23 Thread Eduardo Barretto
The test suite is passing fine. If I compare binaries of current version and with debdiff applied I get the following attached files. ** Attachment added: "etcd_amd64.txt" https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5572181/+files/etcd_amd64.txt -- You received

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-03-23 Thread Eduardo Barretto
** Attachment added: "etcd-client_amd64.txt" https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5572182/+files/etcd-client_amd64.txt -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-02-07 Thread Eduardo Barretto
** Tags added: patch -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959757 Title: [SRU] etcd FTBFS on Focal To manage notifications about this bug go to:

[Bug 1959757] Re: [SRU] etcd FTBFS on Focal

2022-02-02 Thread Eduardo Barretto
** Patch added: "focal debdiff" https://bugs.launchpad.net/ubuntu/+source/etcd/+bug/1959757/+attachment/5558744/+files/etcd_3.2.26+dfsg-6ubuntu0.1.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu.

[Bug 1959757] [NEW] [SRU] etcd FTBFS on Focal

2022-02-02 Thread Eduardo Barretto
Public bug reported: [Impact] etcd version 3.2.26+dfsg-5 had its dependency on golang-github- prometheus-client-golang-dev updated to (>= 1.0.0~) but during Focal development cycle golang-github-prometheus-client-golang-dev >= 1.0.0 never got out of -proposed, staying on version 0.9.2-0ubuntu3.

[Bug 1891953] Re: CVE-2019-8936

2021-04-28 Thread Eduardo Barretto
** Changed in: ntp (Ubuntu) Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1891953 Title: CVE-2019-8936 To manage notifications about this bug go to:

[Bug 1915698] Re: Apache Subversion "mod_authz_svn" Denial of Service Vulnerability

2021-04-23 Thread Eduardo Barretto
If you're trying to bring latest release of subversion to Ubuntu, then you need to check the SRU page mentioned by Seth. The SRU has its own whole process and there will be a need for a good reason to have the SRU approved, it is not that simple. Ubuntu is based on delivering a stable system to

[Bug 1925705] Re: 100% cpu

2021-04-23 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1925409] Re: the screen just blink. somewhat look crash

2021-04-22 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1925269] Re: Freezing of applications etc

2021-04-21 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1925007] Re: Microsoft Domain Bootloader Failed Grub install

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1923544] Re: GNU Crashed

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1925101] Re: GIMP segfault

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1922654] Re: Apache Maven Multiple Security Bypass Vulnerabilities

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the packages referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1915698] Re: Apache Subversion "mod_authz_svn" Denial of Service Vulnerability

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1925188] Re: Mozilla Firefox Multiple Vulnerabilities

2021-04-20 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security ** Changed in: firefox (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1925188 Title:

[Bug 1923639] Re: Remarkable2 file transfer crash

2021-04-20 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1923675] Re: package chromium-browser 1:85.0.4183.83-0ubuntu2 failed to install/upgrade: el subproceso nuevo paquete chromium-browser script pre-installation devolvió el código de salida de error

2021-04-19 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Your bug report is more likely to get attention if it is made in English, since this is the language understood by the majority of Ubuntu developers. Additionally, please only mark a bug as "security" if it shows

[Bug 1923732] Re: ksystemstats crashed with SIGSEGV in AggregateSensor::value()

2021-04-19 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Your bug report is more likely to get attention if it is made in English, since this is the language understood by the majority of Ubuntu developers. Additionally, please only mark a bug as "security" if it shows

[Bug 1924184] Re: drive not showing

2021-04-19 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1924834] Re: esca656585

2021-04-19 Thread Eduardo Barretto
Thank you for using Ubuntu and taking the time to report a bug. Your report should contain, at a minimum, the following information so we can better find the source of the bug and work to resolve it. Submitting the bug about the proper source package is essential. For help see

[Bug 1924887] Re: system program problem detected

2021-04-19 Thread Eduardo Barretto
Thank you for using Ubuntu and taking the time to report a bug. Your report should contain, at a minimum, the following information so we can better find the source of the bug and work to resolve it. Submitting the bug about the proper source package is essential. For help see

[Bug 1924935] Re: installation err

2021-04-19 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1924936] Re: package udev 247.3-3ubuntu3 failed to install/upgrade: o subprocesso instalado, do pacote udev, o script post-installation retornou erro do status de saída 1

2021-04-19 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1911791] Re: Openscap can report false positives

2021-01-21 Thread Eduardo Barretto
** Tags removed: verification-needed verification-needed-bionic verification-needed-focal verification-needed-groovy verification-needed-xenial ** Tags added: verification-done verification-done-bionic verification-done-focal verification-done-groovy verification-done-xenial -- You received

[Bug 1911791] Re: Openscap can report false positives

2021-01-20 Thread Eduardo Barretto
Hey Brian, I ran the following test on Xenial, Bionic, Focal and Groovy with archive openscap and openscap from -proposed and compared the results: $ wget https://people.canonical.com/~ubuntu-security/oval/com.ubuntu.$(lsb_release -cs).cve.oval.xml.bz2 $ bunzip2 com.ubuntu.$(lsb_release

[Bug 1911791] Re: Openscap can report false positives

2021-01-15 Thread Eduardo Barretto
** Patch added: "hirsute.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453540/+files/hirsute.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-15 Thread Eduardo Barretto
** Patch added: "groovy.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453539/+files/groovy.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-15 Thread Eduardo Barretto
** Patch added: "focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453538/+files/focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-15 Thread Eduardo Barretto
** Patch added: "bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453537/+files/bionic.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-15 Thread Eduardo Barretto
The following debdiffs added the requests from Marc. ** Description changed: [Impact] Openscap didn't implement Debian package version comparison algorithm. This can cause a user/client to get false positive results when running oscap. For example, we have a system running

[Bug 1911791] Re: Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
** Patch added: "hirsute.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453050/+files/hirsute.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
** Patch added: "groovy.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453049/+files/groovy.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
** Patch added: "focal.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453048/+files/focal.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
** Patch added: "bionic.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453047/+files/bionic.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] Re: Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
** Patch added: "xenial.debdiff" https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/1911791/+attachment/5453046/+files/xenial.debdiff -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1911791

[Bug 1911791] [NEW] Openscap can report false positives

2021-01-14 Thread Eduardo Barretto
Public bug reported: [Impact] Openscap didn't implement Debian package version comparison algorithm. This can cause a user/client to get false positive results when running oscap. For example, we have a system running Bionic, with package "foo" version 1.2.3-4ubuntu1~18.04.1 installed. Ubuntu

[Bug 1901119] Re: nvidia-340

2020-10-23 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1901125] Re: package bcmwl-kernel-source 6.30.223.271+bdcom-0ubuntu7 failed to install/upgrade: installed bcmwl-kernel-source package post-installation script subprocess returned error exit statu

2020-10-23 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1900983]

2020-10-22 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is

[Bug 1899768] Re: earlier, disk unmount option may have choosen, rewrote grub loader by e

2020-10-22 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1899765] Re: sshguard no longer adds rule to INPUT chain (regression on upgrade)

2020-10-22 Thread Eduardo Barretto
** Information type changed from Private Security to Public Security ** Changed in: sshguard (Ubuntu) Status: New => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1899765 Title:

[Bug 1899305] Re: gnome-calls crashed with signal 5 in g_main_context_dispatch()

2020-10-22 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

[Bug 1901013] Re: failed installation on installing

2020-10-22 Thread Eduardo Barretto
Thanks for taking the time to report this bug and helping to make Ubuntu better. We appreciate the difficulties you are facing, but this appears to be a "regular" (non-security) bug. I have unmarked it as a security issue since this bug does not show evidence of allowing attackers to cross

  1   2   >