I have tried your workaround from #2 and hibernate works. Thanks
Dmitry-a-durnev !
However, when I reboot my pc, I'm back to square one. Hibernate stops working
till I execute the steps in #2 again.
Any idea's ?
--
You received this bug notification because you are a member of Ubuntu
Bugs,
In response to comment #7, I have no issue releasing a security update
regression fix for focal and jammy that relaxes the CVE fix for sockets
since that is a change in behaviour. Let me know once the proposed patch
has been successfully tested to resolve the issue.
--
You received this bug
This is the upstream commit which introduced the change in behaviour:
https://gitlab.com/qemu-
project/qemu/-/commit/f6b0de53fb87ddefed348a39284c8e2f28dc4eda
There is no subsequent fix to the new restrictions, and the only more
recent commit is one to deprecate the whole proxy backend:
These were all released:
https://ubuntu.com/security/notices/USN-6789-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Mantic)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059852
Title:
Invalid free called during libfreetype FT_Done_Glyph
To manage
Adding gnome-session as this is where the logic exists.
I don't see any changes in the latest gnome-session script. Could you
please file a bug with the upstream gnome-session developers here?:
https://gitlab.gnome.org/GNOME/gnome-session/-/issues
Thanks!
** Also affects: gnome-session
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: network-manager-pptp (Ubuntu)
Status: New => Won't Fix
** Changed in: ubuntu-release-notes
Status: New => Fix Released
** Changed in: pptp-linux (Ubuntu)
Status: New => Confirmed
--
You received
** Changed in: openjdk-22 (Ubuntu)
Status: Triaged => Fix Committed
** Changed in: openjdk-22 (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: openjdk-23 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of
** Changed in: mate-desktop (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058434
Title:
leakage of private information through window list preview
To
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
** Tags added: community-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063055
Title:
Boot failure 24.04
To manage notifications about this bug go to:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065678
Title:
nvidia-graphics-drivers-545 package fails to launch
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
Since they are new upstream versions, and are already going through the
SRU process, I'll wait until they are verified-done, and I will do a no-
change rebuild of them into the -security pocket.
Does that sound reasonable? Thanks!
--
You received this bug notification because you are a member
Thanks for the debdiffs, I will prepare packages in the security PPA and
will comment back
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728
Title:
CVE-2024-3044
To manage notifications about
Well, the main impact for me was that after the update, suddenly the
autostart of all Virtual Machines failed after a reboot, which to me is
a seriously POLA violation and not something I would expect to happen
within an LTS release.
Even though you are correct in the fact that it was broken
I'm sorry, but if this means that in the default configuration this is
no longer working, how is this not a regression ?
Should the default configuration not be so that both bind9 and libvirtd
can be installed and used without issue as was the case before the
dnsmasq update?
Breaking this within
ACK on the debdiffs. Uploaded for processing by the SRU team. Thanks!
** Changed in: openscap (Ubuntu Focal)
Status: New => In Progress
** Changed in: openscap (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The regression fix has now been published:
https://ubuntu.com/security/notices/USN-6728-3
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to
That is pretty odd, I can't reproduce this issue on jammy.
what's the output of "ldd /lib/x86_64-linux-
gnu/libwebkit2gtk-4.0.so.37"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062916
Title:
Thanks for testing it, it's much appreciated!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go
Public bug reported:
i tried to purge all ppa, but that did not solve the problem
ProblemType: Bug
DistroRelease: Ubuntu 23.10
Package: ubuntu-release-upgrader-core 1:23.10.14
ProcVersionSignature: Ubuntu 6.5.0-28.29-generic 6.5.13
Uname: Linux 6.5.0-28-generic x86_64
NonfreeKernelModules:
I have located the issue and have prepared an updated package that will
reintroduce the fixes for CVE-2023-5824. I have uploaded the updated
package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it has finished building, could
Public bug reported:
1. Ubuntu 24.04 Numbat (development) installation medium.
2. no specific package.
3. Installation of ubuntu should be possible on a partition of a raid array.
4. when doing the installation and selecting other (manual selection) where to
install ubuntu; the raid array
Public bug reported:
1. Ubuntu 24.04 Numbat (development) iso.
2. No specific package: Booted from installation iso usb.
3. Desktop should be displayed.
4. white screen; in the middle "oh no something has gone wrong"
after some time the welcome sound; and a small window appears in the upper left
That's good to see!
Since this is a deliberate side-effect of the security change, I am
marking this bug as "invalid". Thanks
** Changed in: apache2 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
I think this is actually the correct new behaviour for the security
update...could you please try using ap_trust_cgilike_cl as instructed
here:
https://bz.apache.org/bugzilla/show_bug.cgi?id=68872
** Bug watch added: bz.apache.org/bugzilla/ #68872
Thanks for testing, I'll keep digging...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
this is undesired
To
I have uploaded a package with a possible fix to the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it's finished building, could you please give it a try and see if
it solves the issue for you? If so, I will publish it as a security
I believe I've spotted the regression and will have a package to test
soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to
Thanks for filing this bug, I'll investigate the changes and will report
back.
Have you seen this behaviour on anything other than focal?
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Information type changed from Public to Public Secur
There are packages for focal, jammy, and mantic available for testing in
the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If they work in your environment, please mention it in this bug. Thanks!
--
You received this bug notification
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051543
Title:
When I use a keyboard shortcut to lower a window, the window retains
its
** Changed in: amavisd-new (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058023
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.
--
You received this bug notification because you are a member
https://ubuntu.com/security/notices/USN-6727-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications about this
** Changed in: nss (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a
(Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nss (Ubuntu Focal)
Status: New => In Progress
** Changed in: nss (Ubuntu Jammy)
St
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906
This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!
** This bug has been marked a duplicate of bug 2060906
attempt to add opensc using
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060968
Title:
SafeNet Authentication Client eToken driver error
To manage notifications
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906
Title:
attempt to add opensc using modutil suddenly fails
To manage notifications
https://ubuntu.com/security/notices/USN-6728-2
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go
Thanks for testing everyone, and thanks for the configuration details. I
will attempt to reproduce this issue so that I can figure out what
exactly caused the regression so that we can get CVE-2023-5824 fixed
again soon.
--
You received this bug notification because you are a member of Ubuntu
** Information type changed from Public to Public Security
** Changed in: squid (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: squid (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubunt
I have prepared an update with the patches for CVE-2023-5824 backed out
as they were extensive and are the most likely cause of this regression.
I have uploaded it to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has
Thanks for reporting this issue. What configuration is this squid server
used in? I would like to reproduce the issue, but I need more details to
set up a similar environment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
More CVE fixes have gone in here:
https://ubuntu.com/security/notices/USN-6728-1
I believe there are no more open CVEs for Squid, so I am closing this
bug. Thanks!
** Changed in: squid (Ubuntu Focal)
Status: Confirmed => Fix Released
** Changed in: squid (Ubuntu Jammy)
Status:
@pitti: mantic will be EoL in a couple of months, I think if you want
the fix in quickly, having the minimal fix would be the fastest way to
do it, though you may decide it's not worth it seeing as the release
will be ending soon.
--
You received this bug notification because you are a member of
FYI This is now in the jammy and focal upload queues to go to -proposed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017
Title:
mount rules grant excessive permissions
To manage
There's a relevant thread here:
https://lore.kernel.org/all/27131a7fae2794a63f4f285a20e41116ba4198f3.ca...@gmail.com/T/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976556
Title:
[Lenovo 300e
It appears most of the systemd autopkgtest failures are because of this
flaky test:
https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64
The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless
The same issue was present with the old dnsmasq package...for example:
https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
t; Confirmed
** Changed in: sudo (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options
I'll fix this issue in noble.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo compile options from --with-all-insults to --with-pc-
insults
To manage notifications about
Could you please file a bug upstream about the missing change, and let
us know the bug number?
https://bugzilla.sudo.ws/index.cgi
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:
-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS
--
You received this
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053
Title:
Change sudo
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.
The noble package doesn't use --enable-offensive-insults.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
FFe: version 0.58 introduces a new field
To manage notifications about this bug go to:
** Attachment added: "Build log"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754633/+files/pasaffe_0.58-0ubuntu1_amd64.build
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
NEWS file:
0.58 (2024-03-09)
* Enhancements:
- Add email field
- Updated translations
* Bug fixes:
- Fix some deprecation warnings in the test suite
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Attachment added: "ChangeLog"
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754632/+files/ChangeLog
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690
Title:
Public bug reported:
I would like to request a FFe for version 0.58 of Pasaffe.
The new version updates translations, and adds a single feature:
displaying the email field from the password database which has been
requested for a long time, but I had not had time to implement it until
now.
It's
I am marking this bug as "invalid" per your last comment. Thanks!
** Changed in: dnsmasq (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.
I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.
I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:
udp0 0 192.168.122.1:530.0.0.0:*
1521/named
The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address is
assigned
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
I will prepare updates for testing with the problematic commit reverted.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776
Title:
After updating ubuntu, the network to which the subnet address
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
Thanks for filing this bug, and the excellent analysis.
So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088
That was in response to this mailing list discussion:
Hi,
What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455
Title:
dnsmasq-base
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052739
Title:
bind9 9.16.48 is now in focal with the latest security update.
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Triaged => Fix Released
** Changed in: bind9 (Ubuntu Focal)
Status: Triaged => Fix Committed
** Changed in: bind-dyndb-ldap (Ubuntu Focal)
Status: Fix
** Changed in: netatalk (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2046609
Title:
sync request: netatalk 3.1.18~ds-1 Debian sid main
To manage
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is
1 - 100 of 18762 matches
Mail list logo