[Bug 2041751] Re: RM: Remove dangerously insecure MPPE PPTP from Ubuntu

2024-05-24 Thread Marc Deslauriers
** Changed in: linux (Ubuntu)
   Status: New => Invalid

** Changed in: network-manager-pptp (Ubuntu)
   Status: New => Won't Fix

** Changed in: ubuntu-release-notes
   Status: New => Fix Released

** Changed in: pptp-linux (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2041751

Title:
  RM: Remove dangerously insecure MPPE PPTP from Ubuntu

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-release-notes/+bug/2041751/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2045330] Re: Please remove these packages before 24.04 LTS release

2024-05-24 Thread Marc Deslauriers
** Changed in: openjdk-22 (Ubuntu)
   Status: Triaged => Fix Committed

** Changed in: openjdk-22 (Ubuntu)
   Status: Fix Committed => Fix Released

** Changed in: openjdk-23 (Ubuntu)
   Status: New => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2045330

Title:
  Please remove these packages before 24.04 LTS release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openjdk-11-jre-dcevm/+bug/2045330/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058434] Re: leakage of private information through window list preview

2024-05-24 Thread Marc Deslauriers
** Changed in: mate-desktop (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058434

Title:
  leakage of private information through window list preview

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mate-desktop/+bug/2058434/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063034]

2024-05-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

** Changed in: flatpak (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063034

Title:
  CVE-2023-28101: Metadata with ANSI control codes can cause misleading
  terminal output

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/2063034/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063035] Re: CVE-2023-28100: TIOCLINUX can send commands outside sandbox if running on a virtual console

2024-05-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Changed in: flatpak (Ubuntu)
   Status: New => Confirmed

** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063035

Title:
  CVE-2023-28100: TIOCLINUX can send commands outside sandbox if running
  on a virtual console

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/flatpak/+bug/2063035/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2063055]

2024-05-24 Thread Marc Deslauriers
** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063055

Title:
  Boot failure 24.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bug/2063055/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2067044] Re: package man-db 2.12.0-4build2 failed to install/upgrade: error writing to '': Input/output error

2024-05-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067044

Title:
  package man-db 2.12.0-4build2 failed to install/upgrade: error writing
  to '': Input/output error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/man-db/+bug/2067044/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066368] Re: package linux-image-5.4.0-150-generic 5.4.0-150.167 failed to install/upgrade: installed linux-image-5.4.0-150-generic package post-installation script subprocess returned error exit

2024-05-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066368

Title:
  package linux-image-5.4.0-150-generic 5.4.0-150.167 failed to
  install/upgrade: installed linux-image-5.4.0-150-generic package post-
  installation script subprocess returned error exit status 135

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2066368/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065678] Re: nvidia-graphics-drivers-545 package fails to launch graphical session with latest linux 5.15.0-107 update

2024-05-24 Thread Marc Deslauriers
** Also affects: linux (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065678

Title:
  nvidia-graphics-drivers-545 package fails to launch graphical session
  with latest linux 5.15.0-107 update

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2065678/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2066372]

2024-05-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

** Changed in: swaylock (Ubuntu)
   Status: New => Confirmed

** Changed in: swayidle (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2066372

Title:
  Ubuntu 22.04 LTS - swaylock -v 1.5 - lock screen bypasses

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/swayidle/+bug/2066372/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065728] Re: CVE-2024-3044

2024-05-15 Thread Marc Deslauriers
Since they are new upstream versions, and are already going through the
SRU process, I'll wait until they are verified-done, and I will do a no-
change rebuild of them into the -security pocket.

Does that sound reasonable? Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728

Title:
  CVE-2024-3044

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2065728/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2065728] Re: CVE-2024-3044

2024-05-15 Thread Marc Deslauriers
Thanks for the debdiffs, I will prepare packages in the security PPA and
will comment back

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728

Title:
  CVE-2024-3044

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2065728/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062389] Re: [SRU] Fix segfault in systemdunitdependency probe

2024-04-26 Thread Marc Deslauriers
ACK on the debdiffs. Uploaded for processing by the SRU team. Thanks!

** Changed in: openscap (Ubuntu Focal)
   Status: New => In Progress

** Changed in: openscap (Ubuntu Jammy)
   Status: New => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062389

Title:
  [SRU] Fix segfault in systemdunitdependency probe

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openscap/+bug/2062389/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-23 Thread Marc Deslauriers
The regression fix has now been published:

https://ubuntu.com/security/notices/USN-6728-3

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2062916] Re: evolution has undefined symbol in newest libwebkit2gtk

2024-04-22 Thread Marc Deslauriers
That is pretty odd, I can't reproduce this issue on jammy.

what's the output of "ldd /lib/x86_64-linux-
gnu/libwebkit2gtk-4.0.so.37"?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062916

Title:
  evolution  has undefined symbol in newest libwebkit2gtk

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/evolution/+bug/2062916/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-22 Thread Marc Deslauriers
Thanks for testing it, it's much appreciated!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-19 Thread Marc Deslauriers
I have located the issue and have prepared an updated package that will
reintroduce the fixes for CVE-2023-5824. I have uploaded the updated
package to the security team PPA here:

https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages

Once it has finished building, could you please test it in your
environment and comment in this bug?

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
That's good to see!

Since this is a deliberate side-effect of the security change, I am
marking this bug as "invalid". Thanks

** Changed in: apache2 (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
I think this is actually the correct new behaviour for the security
update...could you please try using ap_trust_cgilike_cl as instructed
here:

https://bz.apache.org/bugzilla/show_bug.cgi?id=68872

** Bug watch added: bz.apache.org/bugzilla/ #68872
   https://bz.apache.org/bugzilla/show_bug.cgi?id=68872

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
Thanks for testing, I'll keep digging...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
I have uploaded a package with a possible fix to the security team PPA
here:

https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages

Once it's finished building, could you please give it a try and see if
it solves the issue for you? If so, I will publish it as a security
regression fix. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
I believe I've spotted the regression and will have a package to test
soon.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2061816] Re: apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where this is undesired

2024-04-16 Thread Marc Deslauriers
Thanks for filing this bug, I'll investigate the changes and will report
back.

Have you seen this behaviour on anything other than focal?

** Changed in: apache2 (Ubuntu)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816

Title:
  apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
  this is undesired

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/2061816/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058023] Re: New versions of amavis with security fixes

2024-04-15 Thread Marc Deslauriers
There are packages for focal, jammy, and mantic available for testing in
the security team PPA here:

https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages

If they work in your environment, please mention it in this bug. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2058023

Title:
  New versions of amavis with security fixes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amavisd-new/+bug/2058023/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2053215] Re: postinst didn't ask for configuration → SECURITY ISSUE

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2053215

Title:
   postinst didn't ask for configuration → SECURITY ISSUE

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nodm/+bug/2053215/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2054197] Re: update-manager crashed with TypeError in _look_busy(): constructor returned NULL

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054197

Title:
  update-manager crashed with TypeError in _look_busy(): constructor
  returned NULL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/update-manager/+bug/2054197/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2051543] Re: When I use a keyboard shortcut to lower a window, the window retains its keyboard focus.

2024-04-12 Thread Marc Deslauriers
** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051543

Title:
  When I use a keyboard shortcut to lower a window, the window retains
  its keyboard focus.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-shell/+bug/2051543/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058023] Re: New versions of amavis with security fixes

2024-04-12 Thread Marc Deslauriers
** Changed in: amavisd-new (Ubuntu)
   Status: New => Confirmed

** Information type changed from Private Security to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058023

Title:
  New versions of amavis with security fixes

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/amavisd-new/+bug/2058023/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059265] Re: Kubuntu bluetooth wireles keyboard not see.

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059265

Title:
  Kubuntu bluetooth wireles keyboard not see.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bluez/+bug/2059265/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058298] Re: intel-ipu6-dkms 0~git202211220708.278b7e3d-0ubuntu0.22.04.1: ipu6-drivers kernel module failed to build

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058298

Title:
  intel-ipu6-dkms 0~git202211220708.278b7e3d-0ubuntu0.22.04.1:
  ipu6-drivers kernel module failed to build

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/ipu6-drivers/+bug/2058298/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059224] Re: package linux-image-5.15.0-101-generic 5.15.0-101.111~20.04.1 failed to install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools exited with return code 1

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059224

Title:
  package linux-image-5.15.0-101-generic 5.15.0-101.111~20.04.1 failed
  to install/upgrade: run-parts: /etc/kernel/postinst.d/initramfs-tools
  exited with return code 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/initramfs-tools/+bug/2059224/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059883] Re: package unixodbc-common 2.3.9-5 failed to install/upgrade: trying to overwrite '/etc/odbc.ini', which is also in package odbcinst 2.3.11-1

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059883

Title:
  package unixodbc-common 2.3.9-5 failed to install/upgrade: trying to
  overwrite '/etc/odbc.ini', which is also in package odbcinst 2.3.11-1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/unixodbc/+bug/2059883/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2059822] Re: package linux-intel-iotg-tools-common 5.15.0-1050.56 [modified: usr/share/man/man1/perf-annotate.1.gz usr/share/man/man1/perf-archive.1.gz usr/share/man/man1/perf-bench.1.gz usr/shar

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059822

Title:
  package linux-intel-iotg-tools-common 5.15.0-1050.56 [modified:
  usr/share/man/man1/perf-annotate.1.gz usr/share/man/man1/perf-
  archive.1.gz usr/share/man/man1/perf-bench.1.gz
  usr/share/man/man1/perf-buildid-cache.1.gz usr/share/man/man1/perf-
  buildid-list.1.gz usr/share/man/man1/perf-c2c.1.gz
  usr/share/man/man1/perf-config.1.gz usr/share/man/man1/perf-
  daemon.1.gz usr/share/man/man1/perf-data.1.gz usr/share/man/man1/perf-
  diff.1.gz usr/share/man/man1/perf-dlfilter.1.gz
  usr/share/man/man1/perf-evlist.1.gz usr/share/man/man1/perf-
  ftrace.1.gz usr/share/man/man1/perf-help.1.gz usr/share/man/man1/perf-
  inject.1.gz usr/share/man/man1/perf-intel-pt.1.gz
  usr/share/man/man1/perf-iostat.1.gz usr/share/man/man1/perf-
  kallsyms.1.gz usr/share/man/man1/perf-kmem.1.gz
  usr/share/man/man1/perf-kvm.1.gz usr/share/man/man1/perf-list.1.gz
  usr/share/man/man1/perf-lock.1.gz usr/share/man/man1/perf-mem.1.gz
  usr/share/man/man1/perf-probe.1.gz usr/share/man/man1/perf-record.1.gz
  usr/share/man/man1/perf-report.1.gz usr/share/man/man1/perf-sched.1.gz
  usr/share/man/man1/perf-script-perl.1.gz usr/share/man/man1/perf-
  script-python.1.gz usr/share/man/man1/perf-script.1.gz
  usr/share/man/man1/perf-stat.1.gz usr/share/man/man1/perf-test.1.gz
  usr/share/man/man1/perf-timechart.1.gz usr/share/man/man1/perf-
  top.1.gz usr/share/man/man1/perf-trace.1.gz usr/share/man/man1/perf-
  version.1.gz usr/share/man/man1/perf.1.gz] failed to install/upgrade:
  trying to overwrite '/usr/bin/acpidbg', which is also in package
  linux-tools-common 5.15.0-101.111

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-intel-iotg/+bug/2059822/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060174] Re: i run a program at night and when i come back in the morning the system is unresponsive

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Package changed: ubuntu => linux (Ubuntu)

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060174

Title:
  i run a program at night and when i come back in the morning the
  system is unresponsive

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060174/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060372] Re: Siempre me sale este error

2024-04-12 Thread Marc Deslauriers
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.

Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.com/Bugs/FindRightPackage . Additionally,
in the report please include:

1) The release of Ubuntu you are using, via 'cat /etc/lsb-release' or System -> 
About Ubuntu.
2) The version of the package you are using, via 'dpkg -l PKGNAME | cat' or by 
checking in Synaptic.
3) What happened and what you expected to happen.

The Ubuntu community has also created debugging procedures for a wide
variety of packages at https://wiki.ubuntu.com/DebuggingProcedures .
Following the debugging instructions for the affected package will make
your bug report much more complete. Thanks!


** Information type changed from Private Security to Public

** Changed in: mysql-5.6 (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060372

Title:
  Siempre me sale este error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/mysql-5.6/+bug/2060372/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060378] Re: ubuntu stuck at every day

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060378

Title:
  ubuntu stuck at every day

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060378/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060398] Re: xfsettingsd crashed with SIGTRAP in g_log_writer_default()

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060398

Title:
  xfsettingsd crashed with SIGTRAP in g_log_writer_default()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfce4-settings/+bug/2060398/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060438] Re: laptop internal stereo microphone not detected by ubuntu but detected by windows 11

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Package changed: ubuntu => linux (Ubuntu)

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060438

Title:
  laptop internal stereo microphone not detected by ubuntu but detected
  by windows 11

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2060438/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060752] Re: package samba-common 2:4.15.13+dfsg-0ubuntu1.6 failed to install/upgrade: el subproceso instalado paquete samba-common script post-installation devolvió el código de salida de error

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060752

Title:
  package samba-common 2:4.15.13+dfsg-0ubuntu1.6 failed to
  install/upgrade: el subproceso instalado paquete samba-common script
  post-installation devolvió el código de salida de error 1

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/2060752/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060859] Re: Xorg freeze

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Package changed: ubuntu => xorg-server (Ubuntu)

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060859

Title:
  Xorg freeze

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xorg-server/+bug/2060859/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060900] Re: gst-plugin-scanner crashed with SIGABRT in __assert_fail_base()

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Attachment removed: "CoreDump.gz"
   
https://bugs.launchpad.net/ubuntu/+source/gstreamer1.0/+bug/2060900/+attachment/5763572/+files/CoreDump.gz

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060900

Title:
  gst-plugin-scanner crashed with SIGABRT in __assert_fail_base()

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gstreamer1.0/+bug/2060900/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060961] Re: package libc6 2.35-0ubuntu3.1 failed to install/upgrade: subproces van het nieuwe pakket libc6:amd64 het script pre-installation gaf de foutwaarde 2 terug

2024-04-12 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Private Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060961

Title:
  package libc6 2.35-0ubuntu3.1 failed to install/upgrade: subproces van
  het nieuwe pakket libc6:amd64 het script pre-installation gaf de
  foutwaarde 2 terug

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/2060961/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
@adampankow: the bug only applied to focal and jammy, which are marked
as "fix released", the "invalid" task is the development release noble,
which isn't affected by this bug. This looks a bit odd, but it's how
launchpad bugs work.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
https://ubuntu.com/security/notices/USN-6727-2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
** Changed in: nss (Ubuntu)
   Status: Confirmed => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
Thanks for testing, I'll publish the regression fix as soon as all archs
have finished building.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
I have uploaded packages that fix this issue for focal and jammy to the
security team PPA here:

https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages

Once they have finished building, please test them to make sure they fix
the issue for you, and I will publish them as a security regression fix
this afternoon.

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
Thanks for reporting this issue, I am currently investigating and will
have an updated package for testing soon.

** Also affects: nss (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: nss (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: nss (Ubuntu Focal)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: nss (Ubuntu Jammy)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: nss (Ubuntu Focal)
   Status: New => In Progress

** Changed in: nss (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: nss (Ubuntu Focal)
   Importance: Undecided => Critical

** Changed in: nss (Ubuntu Jammy)
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060968] Re: SafeNet Authentication Client eToken driver error

2024-04-11 Thread Marc Deslauriers
*** This bug is a duplicate of bug 2060906 ***
https://bugs.launchpad.net/bugs/2060906

This is the same core issue as bug #2060906, so marking as a duplicate,
please follow the progress in that bug. Thanks!

** This bug has been marked a duplicate of bug 2060906
   attempt to add opensc using modutil suddenly fails

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060968

Title:
  SafeNet Authentication Client eToken driver error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060968/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060968] Re: SafeNet Authentication Client eToken driver error

2024-04-11 Thread Marc Deslauriers
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060968

Title:
  SafeNet Authentication Client eToken driver error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060968/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060906] Re: attempt to add opensc using modutil suddenly fails

2024-04-11 Thread Marc Deslauriers
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060906

Title:
  attempt to add opensc using modutil suddenly fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/nss/+bug/2060906/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-11 Thread Marc Deslauriers
https://ubuntu.com/security/notices/USN-6728-2

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-11 Thread Marc Deslauriers
Thanks for testing everyone, and thanks for the configuration details. I
will attempt to reproduce this issue so that I can figure out what
exactly caused the regression so that we can get CVE-2023-5824 fixed
again soon.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-10 Thread Marc Deslauriers
** Information type changed from Public to Public Security

** Changed in: squid (Ubuntu)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

** Changed in: squid (Ubuntu)
   Importance: Undecided => Critical

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-10 Thread Marc Deslauriers
I have prepared an update with the patches for CVE-2023-5824 backed out
as they were extensive and are the most likely cause of this regression.
I have uploaded it to the security team PPA here:

https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages

Once the package has finished building, could you please give it a try
and see if that is the cause of the frequent crashes?

Thanks!

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2023-5824

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060880] Re: squid crashes after update to 4.10-1ubuntu1.10

2024-04-10 Thread Marc Deslauriers
Thanks for reporting this issue. What configuration is this squid server
used in? I would like to reproduce the issue, but I need more details to
set up a similar environment.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880

Title:
  squid crashes after update to 4.10-1ubuntu1.10

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/squid/+bug/2060880/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2041837] Re: squid:update to 6.4+ get fixes for CVEs

2024-04-10 Thread Marc Deslauriers
More CVE fixes have gone in here:

https://ubuntu.com/security/notices/USN-6728-1

I believe there are no more open CVEs for Squid, so I am closing this
bug. Thanks!

** Changed in: squid (Ubuntu Focal)
   Status: Confirmed => Fix Released

** Changed in: squid (Ubuntu Jammy)
   Status: Confirmed => Fix Released

** Changed in: squid (Ubuntu Lunar)
   Status: Confirmed => Won't Fix

** Changed in: squid (Ubuntu Mantic)
   Status: Confirmed => Fix Released

** Changed in: squid (Ubuntu Noble)
   Status: Confirmed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2041837

Title:
  squid:update to 6.4+ get fixes for CVEs

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-docker-images/+bug/2041837/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2060014] Re: CVE-2024-2947 command injection when deleting a sosreport with a crafted name

2024-04-09 Thread Marc Deslauriers
@pitti: mantic will be EoL in a couple of months, I think if you want
the fix in quickly, having the minimal fix would be the fastest way to
do it, though you may decide it's not worth it seeing as the release
will be ending soon.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060014

Title:
  CVE-2024-2947 command injection when deleting a sosreport with a
  crafted name

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/cockpit/+bug/2060014/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1597017] Re: mount rules grant excessive permissions

2024-03-29 Thread Marc Deslauriers
FYI This is now in the jammy and focal upload queues to go to -proposed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1597017

Title:
  mount rules grant excessive permissions

To manage notifications about this bug go to:
https://bugs.launchpad.net/apparmor/+bug/1597017/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1976556] Re: [Lenovo 300e 2nd GEN] ELAN Touchpad not working

2024-03-27 Thread Marc Deslauriers
There's a relevant thread here:

https://lore.kernel.org/all/27131a7fae2794a63f4f285a20e41116ba4198f3.ca...@gmail.com/T/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976556

Title:
   [Lenovo 300e 2nd GEN] ELAN Touchpad not working

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1976556/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058743] Re: systemd local DNS tests failing with timeout

2024-03-22 Thread Marc Deslauriers
It appears most of the systemd autopkgtest failures are because of this
flaky test:

https://autopkgtest.ubuntu.com/packages/systemd/jammy/amd64

The effort required to manually retrigger systemd autopkgtests because
of that flaky test is substantial. We should disable that particular
test unless someone manages to fix it properly.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058743

Title:
  systemd local DNS tests failing with timeout

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2058743/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058743] Re: systemd local DNS tests failing with timeout

2024-03-22 Thread Marc Deslauriers
The same issue was present with the old dnsmasq package...for example:

https://autopkgtest.ubuntu.com/results/autopkgtest-
jammy/jammy/amd64/s/systemd/20240224_133847_88f29@/log.gz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058743

Title:
  systemd local DNS tests failing with timeout

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2058743/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-18 Thread Marc Deslauriers
I've filed the upstream bug and have linked it here, please ignore my
comment #6.

** Bug watch added: bugzilla.sudo.ws/ #1068
   http://bugzilla.sudo.ws/show_bug.cgi?id=1068

** Also affects: sudo via
   http://bugzilla.sudo.ws/show_bug.cgi?id=1068
   Importance: Unknown
   Status: Unknown

** Also affects: sudo (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: sudo (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Also affects: sudo (Ubuntu Mantic)
   Importance: Undecided
   Status: New

** Also affects: sudo (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Changed in: sudo (Ubuntu Focal)
   Status: New => Confirmed

** Changed in: sudo (Ubuntu Jammy)
   Status: New => Confirmed

** Changed in: sudo (Ubuntu Mantic)
   Status: New => Confirmed

** Changed in: sudo (Ubuntu Noble)
   Status: New => Confirmed

** Changed in: sudo (Ubuntu Noble)
 Assignee: (unassigned) => Marc Deslauriers (mdeslaur)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-18 Thread Marc Deslauriers
I'll fix this issue in noble.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-18 Thread Marc Deslauriers
Could you please file a bug upstream about the missing change, and let
us know the bug number?

https://bugzilla.sudo.ws/index.cgi

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-18 Thread Marc Deslauriers
Actually, I think you're right, the brains one does seem to be included
because while that upstream patch does do the following to
plugins/sudoers/ins_classic.h, it didn't apply the same change to
plugins/sudoers/ins_csops.h:

-#ifdef PC_INSULTS
+#ifndef OFFENSIVE_INSULTS

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-15 Thread Marc Deslauriers
Great, I'll leave this bug open for now. Please let us know if there is
anything that is enabled that shouldn't be. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2058053] Re: Change sudo compile options from --with-all-insults to --with-pc-insults

2024-03-15 Thread Marc Deslauriers
I'm not sure I understand this bug, the --with-pc-insults option is
deprecated since 2017-09-18 as it is the default option.

The noble package doesn't use --enable-offensive-insults.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058053

Title:
  Change sudo compile options from --with-all-insults to --with-pc-
  insults

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/2058053/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056690] Re: FFe: version 0.58 introduces a new field

2024-03-12 Thread Marc Deslauriers
Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690

Title:
  FFe: version 0.58 introduces a new field

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056690] Re: FFe: version 0.58 introduces a new field

2024-03-10 Thread Marc Deslauriers
** Attachment added: "Build log"
   
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754633/+files/pasaffe_0.58-0ubuntu1_amd64.build

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690

Title:
  FFe: version 0.58 introduces a new field

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056690] Re: FFe: version 0.58 introduces a new field

2024-03-10 Thread Marc Deslauriers
NEWS file:

0.58 (2024-03-09)

 * Enhancements:
   - Add email field
   - Updated translations

 * Bug fixes:
   - Fix some deprecation warnings in the test suite

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690

Title:
  FFe: version 0.58 introduces a new field

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056690] Re: FFe: version 0.58 introduces a new field

2024-03-10 Thread Marc Deslauriers
** Attachment added: "ChangeLog"
   
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+attachment/5754632/+files/ChangeLog

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690

Title:
  FFe: version 0.58 introduces a new field

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2056690] [NEW] FFe: version 0.58 introduces a new field

2024-03-10 Thread Marc Deslauriers
Public bug reported:

I would like to request a FFe for version 0.58 of Pasaffe.

The new version updates translations, and adds a single feature:
displaying the email field from the password database which has been
requested for a long time, but I had not had time to implement it until
now.

It's not a major change, it simply exposes a field that has always been
part of the password safe compatible database, but was omitted from
previous versions of Pasaffe. I would really like to get this change
into the LTS.

This package is in universe, and is self-contained, so has no impact on
any other package.

I am the upstream author, so I will immediately fix any issues that may
get introduced with this version. There is also a test suite that was modified 
to include the changes.

Attached is the ChangeLog for the new version.

Thanks!

** Affects: pasaffe (Ubuntu)
 Importance: Undecided
 Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2056690

Title:
  FFe: version 0.58 introduces a new field

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/pasaffe/+bug/2056690/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-04 Thread Marc Deslauriers
I am marking this bug as "invalid" per your last comment. Thanks!

** Changed in: dnsmasq (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-04 Thread Marc Deslauriers
By default bind will listen on all interfaces. I don't understand why
we're not seeing anything listening on 192.168.122.1 but you are still
getting the error message.

I suggest adding a listen-on directive to your
/etc/bind/named.conf.options file, restarting bind, and seeing if
libvirt will now successfully listen on virbr0.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055455] Re: dnsmasq-base causes network device virbr0 to shut down

2024-03-03 Thread Marc Deslauriers
That is great news, I'm glad we've identified the root cause of the
problem and you have successfully resolved it.

I will mark this bug as invalid since, while the dnsmasq update did
change behaviour, the behaviour change revealed a configuration issue
rather than being an actual regression.

Thanks!

** Changed in: dnsmasq (Ubuntu)
   Status: New => Invalid

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455

Title:
  dnsmasq-base causes network device virbr0 to shut down

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055455] Re: dnsmasq-base causes network device virbr0 to shut down

2024-03-02 Thread Marc Deslauriers
So, it looks like you are running bind on this machine, and bind is
listening on port 53 UDP:

udp0  0 192.168.122.1:530.0.0.0:*
1521/named

The old dnsmasq would ignore the error when it couldn't bind to a port,
but the new dnsmasq will fail if the port is already used, which makes
sense.

Perhaps you need to configure bind to not listen on the 192.168.122.1
interface...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455

Title:
  dnsmasq-base causes network device virbr0 to shut down

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055455] Re: dnsmasq-base causes network device virbr0 to shut down

2024-03-02 Thread Marc Deslauriers
What's the output of "sudo netstat --tcp --udp --listening --programs
--numeric"? Thanks!

** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455

Title:
  dnsmasq-base causes network device virbr0 to shut down

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-02 Thread Marc Deslauriers
** Information type changed from Public to Public Security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-02 Thread Marc Deslauriers
Do you know what else could be listening on that interface? What's the
output of "netstat --tcp --udp --listening --programs --numeric"?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-02 Thread Marc Deslauriers
I will prepare updates for testing with the problematic commit reverted.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-02 Thread Marc Deslauriers
Out of curiosity, what is the contents of your /etc/dnsmasq.d directory?
Is there a symlink in there to /etc/dnsmasq.d-available/libvirt-daemon?
What is the contents of that file?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055455] Re: dnsmasq-base causes network device virbr0 to shut down

2024-03-02 Thread Marc Deslauriers
This may be caused by the same issue as bug 2055776. I am preparing
updated packages with the problematic commit reverted for testing.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455

Title:
  dnsmasq-base causes network device virbr0 to shut down

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055776] Re: After updating ubuntu, the network to which the subnet address is assigned does not become active in KVM.

2024-03-02 Thread Marc Deslauriers
Thanks for filing this bug, and the excellent analysis.

So it looks like the dnsmasq change was introduced here:
https://thekelleys.org.uk/gitweb/?p=dnsmasq.git;a=commit;h=744231d99505cdead314d13506b5ff8c44a13088

That was in response to this mailing list discussion:
https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017333.html

I think we need to report this issue upstream, perhaps we can revert
that commit in the meantime.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055776

Title:
  After updating ubuntu, the network to which the subnet address is
  assigned does not become active in KVM.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055776/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2055455] Re: dnsmasq-base causes network device virbr0 to shut down

2024-03-01 Thread Marc Deslauriers
Hi,

What the contents of the /etc/dnsmasq.d directory?
Is there a symlink to /etc/dnsmasq.d-available/libvirt-daemon ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055455

Title:
  dnsmasq-base causes network device virbr0 to shut down

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dnsmasq/+bug/2055455/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2052739] Re: tzdata 2024a release

2024-02-29 Thread Marc Deslauriers
+1 from security. Please remember to also release it to the -security
pocket on all releases in addition to just -updates.

Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052739

Title:
  tzdata 2024a release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/tzdata/+bug/2052739/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2028413] Re: MRE updates of bind9 for focal, jammy and lunar

2024-02-28 Thread Marc Deslauriers
bind9 9.16.48 is now in focal with the latest security update.

** Changed in: bind-dyndb-ldap (Ubuntu Focal)
   Status: Triaged => Fix Released

** Changed in: bind9 (Ubuntu Focal)
   Status: Triaged => Fix Committed

** Changed in: bind-dyndb-ldap (Ubuntu Focal)
   Status: Fix Released => Won't Fix

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2028413

Title:
  MRE updates of bind9 for focal, jammy and lunar

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/bind-dyndb-ldap/+bug/2028413/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2046609] Re: sync request: netatalk 3.1.18~ds-1 Debian sid main

2024-01-19 Thread Marc Deslauriers
** Changed in: netatalk (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2046609

Title:
  sync request: netatalk 3.1.18~ds-1 Debian sid main

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/netatalk/+bug/2046609/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007272]

2023-03-17 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Tags added: community-security

** Information type changed from Private Security to Public Security

** Changed in: heimdal (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007272

Title:
  I have ubuntu 22.04 on my system and have the following vulnerability
  : CVE-2022-42898.  On which release/path of Ubuntu can I expect them
  to be fixed ?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/heimdal/+bug/2007272/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007380] Re: Power manager locks screen but does not show lock-screen

2023-03-17 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is available, members of the security team will review it and
publish the package. See the following link for more information:
https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

** Information type changed from Private Security to Public Security

** Tags added: community-security

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007380

Title:
  Power manager locks screen but does not show lock-screen

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/xfce4-power-manager/+bug/2007380/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2009082] Re: SDK version in LTS EOL

2023-03-17 Thread Marc Deslauriers
Making this bug public to the Ubuntu community can see it and perhaps
propose a fix for the issue. Thanks!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2009082

Title:
  SDK version in LTS EOL

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/python-braintree/+bug/2009082/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007456] Re: CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser.

2023-02-20 Thread Marc Deslauriers
We are currently working on updates, and they should be released within
the next few days.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007456

Title:
  CVE-2023-20032: Fixed a possible remote code execution vulnerability
  in the HFS+ file parser.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/2007456/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 2007456] Re: CVE-2023-20032: Fixed a possible remote code execution vulnerability in the HFS+ file parser.

2023-02-16 Thread Marc Deslauriers
** Information type changed from Private Security to Public Security

** Also affects: clamav (Ubuntu Kinetic)
   Importance: Undecided
   Status: New

** Also affects: clamav (Ubuntu Bionic)
   Importance: Undecided
   Status: New

** Also affects: clamav (Ubuntu Lunar)
   Importance: Undecided
 Assignee: David Fernandez Gonzalez (litios)
   Status: New

** Also affects: clamav (Ubuntu Focal)
   Importance: Undecided
   Status: New

** Also affects: clamav (Ubuntu Jammy)
   Importance: Undecided
   Status: New

** Changed in: clamav (Ubuntu Bionic)
   Status: New => In Progress

** Changed in: clamav (Ubuntu Focal)
   Status: New => In Progress

** Changed in: clamav (Ubuntu Jammy)
   Status: New => In Progress

** Changed in: clamav (Ubuntu Kinetic)
   Status: New => In Progress

** Changed in: clamav (Ubuntu Lunar)
   Status: New => In Progress

** Changed in: clamav (Ubuntu Kinetic)
 Assignee: (unassigned) => David Fernandez Gonzalez (litios)

** Changed in: clamav (Ubuntu Jammy)
 Assignee: (unassigned) => David Fernandez Gonzalez (litios)

** Changed in: clamav (Ubuntu Focal)
 Assignee: (unassigned) => David Fernandez Gonzalez (litios)

** Changed in: clamav (Ubuntu Bionic)
 Assignee: (unassigned) => David Fernandez Gonzalez (litios)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2007456

Title:
  CVE-2023-20032: Fixed a possible remote code execution vulnerability
  in the HFS+ file parser.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamav/+bug/2007456/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1997220] Re: CVE-2022-42898

2022-12-06 Thread Marc Deslauriers
** Changed in: samba (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1997220

Title:
  CVE-2022-42898

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1997220/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1983778] Re: Major security issue in Ubuntu Desktop default config - Removable Media

2022-09-23 Thread Marc Deslauriers
I personally don't think the reasons you've listed above are good enough
to change the default setting, but please file a bug with the upstream
project and you can convince them to change them:

https://gitlab.gnome.org/GNOME/gnome-control-center/-/issues

Once you've filed a bug with the GNOME project, please paste the bug
number here.

Thanks!

** Changed in: gnome-control-center (Ubuntu)
   Status: Incomplete => Confirmed

** Changed in: gnome-control-center (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1983778

Title:
  Major security issue in Ubuntu Desktop default config - Removable
  Media

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnome-control-center/+bug/1983778/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1930140] Re: GUI "Extract Here" bug - loop until disk is full

2022-08-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1930140

Title:
  GUI "Extract Here"  bug - loop until disk is full

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/file-roller/+bug/1930140/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1838067] Re: made Ubuntu very slow then crash

2022-08-24 Thread Marc Deslauriers
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug.  I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privilege boundaries nor directly cause loss of data/privacy.
Please feel free to report any other bugs you may find.

** Information type changed from Public Security to Public

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1838067

Title:
  made Ubuntu very slow then crash

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/clamtk/+bug/1838067/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-17 Thread Marc Deslauriers
I can't get cog to work on 20.04:

$ cog -P x11 https://ubuntu.com

** (cog:4346): WARNING **: 14:11:55.892: Could not load:
libcogplatform-x11.so (possible cause: Resource temporarily
unavailable).

wpe: could not load the impl library. Is there any backend installed?: 
libWPEBackend-default.so: cannot open shared object file: No such file or 
directory
Aborted (core dumped)

$ cog -P headless https://ubuntu.com

** (cog:4370): WARNING **: 14:12:05.112: Could not load: libcogplatform-
headless.so (possible cause: No such file or directory).

wpe: could not load the impl library. Is there any backend installed?: 
libWPEBackend-default.so: cannot open shared object file: No such file or 
directory
Aborted (core dumped)


I have no idea why you are making a snap in the comment above...that has 
nothing to do with this bug or with the wpewebkit package in the archive...

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.6 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1970779] Re: Upgrade to 2.36.6 for Focal and Jammy

2022-08-17 Thread Marc Deslauriers
Please give details on how you are testing these updates. We will not be
sponsoring packages that haven't been tested, and that we are unable to
test ourselves.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970779

Title:
  Upgrade to 2.36.6 for Focal and Jammy

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wpewebkit/+bug/1970779/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1974265] Re: `demangle_const` causes infinite recursion and stack overflow

2022-08-10 Thread Marc Deslauriers
** Changed in: binutils (Ubuntu)
   Status: New => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1974265

Title:
  `demangle_const` causes infinite recursion and stack overflow

To manage notifications about this bug go to:
https://bugs.launchpad.net/binutils/+bug/1974265/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

  1   2   3   4   5   6   7   8   9   10   >