Marking this incomplete so that it'll show up in next week's MIR team
meeting. In the meantime, let's try to find out who would know more
about the OEM archive and OEM process to see if this an appropriate
outcome for this package.
Thanks
** Changed in: lenovo-wwan-unlock (Ubuntu)
Status:
This change makes me uneasy:
- I see no terminal-aware filtering applied in the notify_start() ->
xvasprintf() -> writemsg() -> write() path. The remote server may not be
entirely untrusted but it's also not exactly trusted, either, especially
on the first use. There's a long and glorious history
** Tags added: sec-4902
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072621
Title:
[MIR] rpds-py
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rpds-py/+b
** Tags added: sec-4903
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073783
Title:
[MIR] exfatprogs
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/exfatpr
There's embedded copies of sha1, sha256, sha512 in the upstream package:
https://github.com/libimobiledevice/libimobiledevice-
glue/tree/master/src
I haven't yet looked at our version of the package.
The libimobiledevice library is licensed LGPL; the libtomcrypt code has
been placed in the public
Filesystems, especially new ones, are a frequent source of problems due
to poor parsing. Do you know if exfatprogs already has some fuzzing
integration with eg ossfuzz or run during the build or by the authors?
If not, could you suggest it to the authors?
Thanks
--
You received this bug notifica
** Tags added: sec-4836
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2074086
Title:
MIR libimobiledevice-glue
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+sourc
** Tags added: sec-4835
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070882
Title:
[MIR] jpeg-xl
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/jpeg-xl/+b
Manus, I believe you've got a different issue: libuv1 version 1.44.2
does not exist in a currently supported release of Ubuntu. Ubuntu 20.04
LTS is still on 1.34.2-ish versions:
$ rmadison libuv1 | grep 1.44.2
$ rmadison libuv1 | grep focal
libuv1 | 1.34.2-1ubuntu1 | focal | source,
Stephen, thanks for the excellent bug report.
I don't know Debian packaging well enough to point to the exact error in
the build rules, but this is the order of operations described in the
build log:
https://launchpadlibrarian.net/593502889/buildlog_ubuntu-jammy-
amd64.sunpy_3.1.5-1_BUILDING.txt.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075118
Title:
PNG images in .deb don't match md5sums file or local build
To manag
There's a typo in the package description:
> x86-64 architecture, corresponding to x86-65 psABI v1.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073895
Title:
[MIR] isa-support
To mana
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073974
Title:
package proftpd-mod-crypto 1.3.7c+dfsg-1build1 failed to
install/upgrade: p
Hello Uwe, thanks for the bug report. On a first look this doesn't feel
like a security issue, it can probably be addressed by (a) removing
fonts (b) adding memory (c) limiting the memory available to the process
/ user and thus preventing the user from causing problems.
Does this allow crossing s
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073033
Title:
request to /storage/v2/edit_partition crashed with Exception | I
** Tags added: sec-4768
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070807
Title:
[MIR] highway
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/highway/+b
Thanks, Mani. You're right, the photo is hard to see what's going on,
but it does show that something is visible when probably nothing should
be visible.
Thanks
** Package changed: gnome-screensaver (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public Secu
Hello, I think these lines in your logs mean that your system BIOS is
configured to prevent changing the boot environment. Look for
"antivirus" or "boot protection" in your BIOS.
Jul 15 20:59:06 ubuntu grub-installer: grub-install: aviso: No se puede
establecer la variable de EFI Boot0003.
Jul 15
Hello Carlos. thanks for the report; if you've installed any gnome
extensions yourself, I'd suggest to remove them all as a first debugging
step. They are apparently very easy to screw up. If the problem goes
away, try bisecting your extensions to find out which one or combination
leads to the prob
Thank you for taking the time to report this bug and helping to make
Ubuntu better. Reviewing your dmesg attachment to this bug report it
seems that there may be a problem with your hardware. I'd recommend
performing a back up and then investigating the situation. Measures you
might take include
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073000
Title:
many vulnerabilities on ubuntu20 package linux-image-aws -
5.15.0.
Thanks for the link to the upstream bug. I'll mirror their "wontfix"
here, as we're unlikely to invest the resources to invent new
functionality for the firewall that differs from upstream's choices.
** Changed in: linux (Ubuntu)
Status: New => Won't Fix
--
You received this bug notificat
*** This bug is a duplicate of bug 2071633 ***
https://bugs.launchpad.net/bugs/2071633
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/207
Of these three, I prefer the shell. (I know, I'm as surprised as you.)
Please use this version, unless there's a compelling reason to prefer
Python:
#!/bin/bash
data=$(dd if=/dev/urandom bs=1 count=13 2>/dev/null| base32 | tr 'A-Z' 'a-z')
echo ${data:0:4}-${data:4:4}-${data:8:4}-${data:12:4}-${da
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072406
Title:
subtile flaw in kernel packet filter nftables
To manage notificatio
These might be related and might help the underlying problem:
https://github.com/openssh/openssh-portable/commit/8785491123d4d722b310c20f383570be758f8263
https://github.com/openssh/openssh-portable/commit/c0cb3b8c837761816a60a3cdb54062668df09652
Thanks
--
You received this bug notification beca
.. It turns out that this was a bad experience all around:
https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2043101
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999345
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for the report; what's the consequences of that configuration
change? I'm guessing that it would remove the qbittorrent administrative
interface from the public IP address of the UPnP router, with no way to
re-enable it. Is that correct?
Thanks
--
You received this bug notification becaus
Hello Solaris, there's not much here to work with; please run apport-
collect 2070387 to attach some logs and package statuses to inspect.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070387
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Tags added: sec-4642
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069308
Title:
MIR xdg-terminal-exec
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xd
** Tags added: sec-4626
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070025
Title:
[MIR] wsdd
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wsdd/+bug/207
Awesome, thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1991859
Title:
pro attach does not cope well with squid-deb-proxy ACLs
To manage notifications about this bug go to:
https://bugs.laun
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069774
Title:
package linux-modules-nvidia-535-6.8.0-35-generic 6.8.0-35.35 failed
to ins
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069499
Title:
ubuntu install failed
To manage notifications about this bug go to:
https://
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069523
Title:
package click 0.5.2-2ubuntu4 failed to install/upgrade: installed
click pac
I'm curious if a config change in xdg-utils is all that's needed to get
something similar:
$ locate xdg-terminal x/xdg-utils
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/xdg-terminal.in
/newsrv/trees/ubuntu/main/x/xdg-utils/xdg-utils_1.1.1-1ubuntu1/scripts/desc/xdg-termin
SELinux and AppArmor both do pretty significant configuration during
early boot, I can't imagine that live switching between the two at
runtime is going to be well supported by anything.
If you intend to replace AppArmor with SELinux, you should do that via
the kernel command line flags so that th
I suspect that you've got a local problem with this configuration file,
try reinstalling openssh-server but with some flags to force replacing
the missing and changed configuration files:
sudo apt-get --yes reinstall -o Dpkg::Options::="--force-confnew" -o
Dpkg::Options::="--force-confmiss openssh
Andrei, try to log in via multiple methods. Every service (ssh, login,
gdm, xdm, etc) has its own PAM configuration and some of them may
reference this module and some may not.
Once you've logged in, edit the files in /etc/pam.d/ that reference this
module. Remove or comment them out. Save, then t
These nvidia drivers look really unhappy, the first trace:
[ 11.997286] [ cut here ]
[ 11.997290] UBSAN: array-index-out-of-bounds in
build/nvidia/535.171.04/build/nvidia-uvm/uvm_pmm_gpu.c:2364:28
[ 11.997293] index 0 is out of range for type 'uvm_gpu_chunk_t *[*]'
[
There's at least two errors here:
- the title describes two packages that own the same file, these should
both be fixed
- the dpkg terminal log looks a bit like a full filesystem:
Setting up apache2-bin (2.4.41-4ubuntu3.14) ...
Setting up mysql-server (8.0.33-0ubuntu0.20.04.2) ...
Setting up lib
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068822
Title:
unable to detach live patch as I try to do it because I was unable to
see l
Hello Ariel, thanks for the report; does Google say what exactly is
wrong with this file?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
Real, Lena is trying to fix the bug you reported. It would be helpful if
you could test the fix.
I suggest reading the https://wiki.ubuntu.com/StableReleaseUpdates page
to better understand our process.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068787
Title:
ubuntu-release-upgrader
To manage notifications about this bug go to:
https:
Probably this should be multiple bug reports, one per problem, but just
in case this sounds familiar to someone else...
** Information type changed from Private Security to Public
** Package changed: ubuntu-meta (Ubuntu) => ubuntu
--
You received this bug notification because you are a member o
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2068601
Title:
package amd64-microcode 3.20191218.1ubuntu2.1 failed to
install/upgrade: po
** Tags added: sec-4574
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066269
Title:
[MIR] sysprof
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sysprof/+b
** Tags added: sec-4374
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067373
Title:
[MIR] provd
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/provd/+bug/2
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, your logs are full of very unhappy messages. I'm hoping that this
is the root of all your problems:
[ 1509.531045] usb usb3-port11: Cannot enable. Maybe the USB cable is
bad?
but it's possible that your hardware is broken enough that this is just
a bad guess.
I suggest finding someone to
Hello James, thanks for the report.
If I were designing this thing myself I certainly would have had
different packages for journal sending than journal receiving, but
whoever implemented it wanted to offer to both pull and push models and
allow on-demand journal collecting from hosts.
Given that
** Information type changed from Private Security to Public Security
** Changed in: systemd (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067910
Title:
gat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Adrien, thanks so much for digging into this again.
This is so very complicated, why does openssl need special handling in
the world of needrestart? My inclination is to remove all this
complexity and address any shortcomings of needrestart in the
needrestart package. Am I off base?
Thanks
--
Y
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, I believe this means that the mirror you are using does not yet
have the Ubuntu 24.04 LTS release.
2024-05-26 23:21:19,553 DEBUG s='http' n='mirrors.piconets.webwerks.in'
p='/ubuntu-mirror/ubuntu//dists/noble/Release' q='' f=''
2024-05-26 23:21:19,619 DEBUG error from httplib: 'HTTP Error
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I can't promise that this is your problem but it looks like trouble:
May 16 05:04:15 ubuntu ubiquity: /dev/sda5: Inodes that were part of a
corrupted orphan linked list found.
May 16 05:04:15 ubuntu ubiquity:
May 16 05:04:15 ubuntu ubiquity: /dev/sda5: UNEXPECTED INCONSISTENCY; RUN fsck
MANUALL
*** This bug is a duplicate of bug 2065678 ***
https://bugs.launchpad.net/bugs/2065678
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/206
I've poked around a little bit and think this might not justify much
time to fix:
- it's suggested to be used in the initramfs, presumably before untrusted users
are executing
- it's apparently not going to work with luks2 format, only luks1, and I
believe we've switched the default to luks2
In
Nice find, Hadmut, thanks.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065510
Title:
/lib/cryptsetup/scripts/decrypt_derived
Abraham, if you've got an easy test case for this, it might be useful to
test the various versions released into 22.04 LTS:
https://launchpad.net/ubuntu/jammy/+source/netatalk
eg:
pull-lp-debs netatalk jammy 3.1.12~ds-9ubuntu0.22.04.1
for all the versions listed, then try them in turn.
Thanks
Jake, some progress is underway for Launchpad to automatically sign PPAs
with RSA4096 keys https://discourse.ubuntu.com/t/new-requirements-for-
apt-repository-signing-in-24-04/42854
It's also possible to dual-sign non-ppa repositories, eg:
curl -s http://archive.ubuntu.com/ubuntu/dists/focal-upda
I think we fixed this in December 2022:
https://bugs.launchpad.net/ubuntu/+source/nvidia-graphics-
drivers-510/+bug/1997087
https://git.launchpad.net/ubuntu-cve-
tracker/tree/active/CVE-2022-34673#n360
Thanks
** Information type changed from Private Security to Public Security
** CVE added: ht
Hello KolAflash, thanks for writing; the wiki page in question has this
suggestion:
# echo "UMASK=0077" >> /etc/initramfs-tools/initramfs.conf
Which should take care of the secrets in case the administrator chooses
to use this mechanism to automatically supply keys to LUKS, right?
Thanks
--
Yo
** Information type changed from Private to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2037897
Title:
FreeCAD unable to create new document under wayland
To manage notifications about thi
Apparently this exists now via the new -p flag, but doesn't currently
work in releases with deb822 formatted sources lists:
https://bugs.launchpad.net/ubuntu/+source/software-
properties/+bug/2061128
** Changed in: software-properties (Ubuntu)
Status: Confirmed => Fix Released
--
You rece
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064750
Title:
block probing crashed with ValueError
To manage notifications about this bug
Hello Robert, I believe this is intentional.
If you wish to restore the previous behavior, it should be sufficient to
change /usr/bin/write.ul to root:tty 02755.
Thanks
** Changed in: util-linux (Ubuntu)
Status: New => Confirmed
** Information type changed from Private Security to Public
Two different services attempting to bind on a single (IP, port) tuple
is going to lead to a failure of one of the services. Prior to this
update it was a silent failure, which serves only to make debugging
problems more difficult.
I can empathize with the feeling that things shouldn't break in an
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064479
Title:
file error keeps repeating after any Terminal installation with APT
this is
Hello Spencer, thanks for the report. This is pretty common with
programs that provide a more "interactive" experience. There's two tools
that can help recover from this, reset(1) and stty(1). When this
happens, run:
reset
or
stty sane
Both should fix this specific case. But sometimes one or the
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064306
Title:
error
To manage notifications about this bug go to:
https://bugs.launchpad.n
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064141
Title:
default config in noble prevents start of fail2ban
To manage notifications a
Hello Christopher, thanks for the bug report. Note that due to ISC
stepping back from their DHCP packages, we've switched to dhcpcd as the
"default" dhcp client. Probably a patch to fix this would be accepted,
but it might not be anybody's priority to work on it.
Thanks
--
You received this bug
** Information type changed from Private Security to Public
** Changed in: apparmor (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063932
Title:
ULTS 24 AppAr
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063927
Title:
package libc6 2.35-0ubuntu3.6 failed to install/upgrade: yeni
libc6:amd64 p
** Package changed: ubuntu => gnome-shell (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064192
Title:
Unable to resize windows
To manage notifications about this bug go to:
https://bugs.l
Was this filed against the correct package?
https://launchpad.net/ubuntu/+source/dotnet8 looks more appropriate.
It's a pity this request wasn't made two months ago, 24.04's Feature
Freeze date was February 29 https://discourse.ubuntu.com/t/noble-numbat-
release-schedule/35649 -- it might have been
I'm having trouble seeing what the consequences are:
> the result is a permanently failed service
vs
> this is was a major annoyance on my m2 air after upgrading to noble
Was it it more than a red line in systemctl status output? Does it have
annoying logging behaviour or break some other servi
@Tobias, that bug is 15 years old. Perhaps you meant another one?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054296
Title:
Don't restrict to linux-laptop
To manage notifications about this bug
The unfortunate thing with AppImage is that there's no easy default path
that can be confined as can be done for other systems. So you'll need to
construct an AppArmor profile for your applications following the
instructions at https://discourse.ubuntu.com/t/noble-numbat-release-
notes/39890#unpriv
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063830
Title:
package nginx-core (not installed) failed to install/upgrade:
installed ngi
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of U
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063536
Title:
flickering screen
To manage notifications about this bug go to:
https://bugs
Public bug reported:
Hello, ubuntu-bug can't report bugs in packages provided by Ubuntu Pro.
For example, I have lynx installed, which has an update issued through
esm-apps:
$ dpkg -l lynx | grep ^ii
ii lynx 2.9.0dev.5-1ubuntu0.1~esm1 amd64classic
non-graphical (text-mode) web
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061249
Title:
remmina crashed with SIGABRT in freerdp_settings_get_bool()
To manage notifi
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061289
Title:
drkonqi crashed with SIGABRT in QScreen::QScreen()
To manage notifications a
I gave the nbd-client.c file a very quick read and it looked moderately
well-written to me. It feels like it's got nearly three decades of
history to it -- solid, been around a while, and maybe you'd do things
different if you were doing it again, but it exists today and solves
problems, today.
So
** Package changed: openssh (Ubuntu) => openssl (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063271
Title:
Illegal opcode in libssl
To manage notifications about this bug go to:
https://
AppArmor's signal handling is a bit more involved than eg capabilities
or file accesses: both the sender profile and receiver profile need to
have signal rules to allow sending the signal or receiving the signal,
as appropriate.
23.10 and 24.04 LTS have introduced restrictions on unprivileged
name
** Changed in: linux-hwe-6.5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063009
Title:
package linux-headers-6.5.0-28-generic 6.5.0-28.29~22.04.1 failed to
*** This bug is a duplicate of bug 2061851 ***
https://bugs.launchpad.net/bugs/2061851
** This bug has been marked a duplicate of bug 2061851
linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression with new apparmor
profiles/features
--
You received this bug notification because you ar
1 - 100 of 6311 matches
Mail list logo