Oh! Right, I didn't notice it was just an extra changelog entry for the
ppa.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945795
Title:
krb5: Fail to build against OpenSSL 3.0
To manage notificat
Hi, thanks for preparing the package, but to be sponsored the
debian/changelog needs a better description than "PPA upload". Could you
please update it with an appropriate changelog including the patch name,
what the patch does, and a LP tag to this bug?
Thanks!
--
You received this bug notifica
That is correct, samba 4.7.6 in bionic is not vulnerable to
CVE-2021-23192.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950363
Title:
Nov 2021 security update tracking bug
To manage notification
** Bug watch added: Debian Bug tracker #998355
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998355
** Also affects: samba via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=998355
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a
** Bug watch added: Samba Bugzilla #14918
https://bugzilla.samba.org/show_bug.cgi?id=14918
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14918
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs
In case we end up having to update bionic to a more recent samba, I've
stuck the update package and dependencies in my ppa here:
https://launchpad.net/~mdeslaur/+archive/ubuntu/testing/+packages
The current plan is to use the update in comment #5.
--
You received this bug notification because y
There is an updated Samba package for bionic in the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
It contains fixes for CVE-2016-2124, CVE-2020-25717, CVE-2020-25722 and
CVE-2021-3671 which appear to be the most severe issues. Upstream has
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1944788
Title:
URI defined for connectivity check is relative to search domain
To manage no
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945388
Title:
opening application steal
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
If you look into the openvpn configuration file that Network Manager
creates for your connection in /etc/NetworkManager/system-connections,
could you please paste the [ipv4] and [ipv6] sections?
** No longer affects: ubuntu
** Changed in: network-manager (Ubuntu)
Status: New => Incomplete
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948714
Title:
After reboot, the password set at install time doesn't work.
To manage notifi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
This was fixed in the following update:
https://ubuntu.com/security/notices/USN-5127-1
** Information type changed from Private Security to Public Security
** Changed in: webkitgtk (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubu
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949225
Title:
screen lock is not workin
** Package changed: linux (Ubuntu) => gnome-shell (Ubuntu)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950035
Title:
suspend does not
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu => gnome-shell (Ubuntu)
** Summary changed:
- security issue!
+ When screen is locked the top bar with apps shows
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Information type changed from Private Security to Public
** Changed in: golang-github-cloudflare-cfssl (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/19
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/freecad/+bug/1951748/+attachment/5542454/+files/CoreDump.gz
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: Samba Bugzilla #14867
https://bugzilla.samba.org/show_bug.cgi?id=14867
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14867
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs
ACK on the debdiffs, I've uploaded them with a slight changelog
formatting change, and I've specified a specific version for the
libseccomp Build-Depends on bionic and focal.
I've build the packages, along with the required libseccomp updates in
the following PPA:
https://launchpad.net/~ubuntu-se
@alex Do you think we can do a no-change rebuild of libseccomp into
bionic-security and focal-security? Are there any dependencies we need
to rebuild too?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/
** Bug watch added: Samba Bugzilla #14910
https://bugzilla.samba.org/show_bug.cgi?id=14910
** Also affects: samba via
https://bugzilla.samba.org/show_bug.cgi?id=14910
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs
Older releases of Ubuntu used a group called "admin" instead of "sudo"
which is the name Debian chose later on.
We need to maintain the "admin" group rights in our sudoers file for
people upgrading from earlier Ubuntu releases. If we remove it, they
will no longer have sudo rights after upgrading.
Fixing this issue on Ubuntu 18.04 LTS is going to be problematic.
The backport to 4.10 of the patchset to fix most of the CVEs contains
686 commits. Backporting that to bionic's 4.7.6 may not be feasible.
The main issue with updating bionic to 4.13.14 is the lack of support
for python 2.7. I have
A security update for Impish was just released which bumped samba to a
whole new version. I don't think this is necessary anymore.
https://ubuntu.com/security/notices/USN-5142-1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://
vulnerability.
https://www.samba.org/samba/security/CVE-2021-23192.html
** Affects: samba (Ubuntu)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: samba (Ubuntu Bionic)
Importance: Undecided
Status: New
Just FYI, I may use cmake-mozilla to build webkit2gtk too since the
newer version also requires a newer cmake...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1943842
Title:
rustc 1.53 and cargo 0.5
https://ubuntu.com/security/notices/USN-5123-1
** Changed in: mysql-5.7 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1947994
Title:
MySQL Server
** Changed in: apport (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1948657
Title:
Oct 2021 security update tracking bug
To manage notifications about th
*** This bug is a security vulnerability ***
Public security bug reported:
This is the tracking bug for the October 2021 security udpdate.
** Affects: apport (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs,
** Changed in: apache2 (Ubuntu Impish)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1945311
Title:
Fix for CVE-2021-40438 breaks existing configs
To manag
The updates are currently building in the security team PPA here, in
case someone wants to try them before they are published:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is su
** Changed in: apache2 (Ubuntu Bionic)
Importance: Undecided => High
** Changed in: apache2 (Ubuntu Focal)
Importance: Undecided => High
** Changed in: apache2 (Ubuntu Hirsute)
Importance: Undecided => High
** Changed in: apache2 (Ubuntu Impish)
Importance: Undecided => High
--
You
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: apache2 (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: apache2 (Ubuntu Hirsute)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: apache2 (Ubuntu Imp
Here are the 2.4.x backports:
https://github.com/apache/httpd/commit/6e768a811c59ca6a0769b72681aaef381823339f
https://github.com/apache/httpd/commit/81a8b0133b46c4cf7dfc4b5476ad46eb34aa0a5c
I will prepare updates that add those commits and will release them
likely today.
--
You received this bu
** Changed in: ca-certificates (Ubuntu Impish)
Status: New => Fix Committed
** Changed in: ca-certificates (Ubuntu Trusty)
Status: New => Fix Released
** Changed in: ca-certificates (Ubuntu Xenial)
Status: New => Fix Released
--
You received this bug notification because yo
** Changed in: libgetdata (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1912050
Title:
Use after free in libgetdata v0.10.0 may lead to arbitrary code
exec
** Changed in: libcaca (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1923273
Title:
buffer-overflow on libcaca-0.99.beta20/export.c export_tga,
exp
** Changed in: openjdk-13 (Ubuntu)
Status: New => Won't Fix
** Changed in: openjdk-14 (Ubuntu)
Status: New => Won't Fix
** Changed in: openjdk-15 (Ubuntu)
Status: New => Won't Fix
** Changed in: openjdk-16 (Ubuntu)
Status: New => Won't Fix
** Changed in: openjdk-17 (
** Changed in: fail2ban (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1939870
Title:
The package fail2ban is vulnerable to arbitrary command execution via
** Also affects: gedit via
https://gitlab.gnome.org/GNOME/gedit/-/issues/464
Importance: Unknown
Status: Unknown
** Changed in: gedit (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
** Changed in: gnome-screensaver (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1944464
Titl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Hirsute)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-cer
*** This bug is a security vulnerability ***
Public security bug reported:
USN-5079-1 introduced a regression in bionic:
https://ubuntuforums.org/showthread.php?t=2467177
Focal+ appear to work as intended.
** Affects: curl (Ubuntu)
Importance: Undecided
Status: New
--
You recei
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1933832
Title:
Path traversal leads to arbitrary file read
To manage notifications
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934308
Title:
Arbitrary file read in general hook (ubuntu.py)
To manage notificat
I'd rather these go through the SRU process first, and they will get
picked up automatically next time we do an openssl security update.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940656
Title:
** Changed in: haproxy (Ubuntu Impish)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940314
Title:
Aug 2021 security update
To manage notifications abo
The backported patches in comments #1 and #2 look reasonable to me. +1
from the security team.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1928648
Title:
expiring trust anchor compatibility issue
No, they do not include the fixes from this bug.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1921518
Title:
OpenSSL "double free" error
To manage notifications about this bug go to:
https://bugs.
Thanks for reporting this issue, but we disabled SSLv3 in 2015 in Ubuntu
16.04 LTS. There is absolutely no chance we will be enabling it again.
** Changed in: openssl (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: haproxy (Ubuntu Impish)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940314
Title:
Aug 2021 security update
To manage notifications about this b
** Changed in: haproxy (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: haproxy (Ubuntu Hirsute)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
(Ubuntu Focal)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: haproxy (Ubuntu Hirsute)
Importance: Medium
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: haproxy (Ubuntu Impish)
Importance
I suspect the MAAS snap has embedded some postgresql components while
relying on some other components from the system, and this mismatch is
causing the issue loading the newer shared library...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Here's the debconf bug report:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=223683
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934501
Title:
CVE-2018-15473 patch introduce user enumeration
This isn't specific to the openssh update. Debian packages use tools
such as debconf that need to write to /tmp to function correctly.
** Bug watch added: Debian Bug tracker #223683
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=223683
--
You received this bug notification because you are
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934501
Title:
CVE-2018-15473 patch introduce user enumeration vulnerability
To ma
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Private Security to Public Security
** Changed in: apport (Ubuntu)
Status: Incomplete => Confirmed
** Changed in: apport (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: unity (Ubuntu) => gnome-shell (Ubuntu)
** Changed in: gnome-shell (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935690
Title:
Lock Screen
** Changed in: openssh (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1937883
Title:
ssh-agent Shielded Private Key Extraction
To manage notifications about
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
I have uploaded new packages to the PPA that enables the test suite and adds
updated binary tests.
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1938730
Title:
GPSD time will jump back 1024
Thanks for the hints bzed.
Thanks for the tests paride.
I am currently working on enabling the test suite during build on focal
and re-enabling the binary tests on focal and hirsute. I'll have updated
packages in the PPA soon.
--
You received this bug notification because you are a member of Ubu
I have uploaded packages for focal and hirsute to the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
I'd appreciate it if someone could test them. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which
Upstream patch:
https://gitlab.com/gpsd/gpsd/-/commit/7f30d88d04dc62b8bd6265ad1d09d72d220f97f6
Debian patch:
https://salsa.debian.org/debian-gps-team/pkg-gpsd/-/commit/2df40c7640dcbc5cbc48969bec44932623ef243b
https://salsa.debian.org/debian-gps-team/pkg-gpsd/-/commit/c6af361ae1ba59dc8d3ac8783faa
> A test kernel is available here:
https://kernel.ubuntu.com/~juergh/lp1938013/
I found a laptop running bionic. Updated to the newest archive kernel
and rebooted. Hit the regression immediately, dmesg would show kernel
errors right after the wlan0 lines.
With the test kernel, I've been running f
** Changed in: containerd (Ubuntu Bionic)
Status: In Progress => Invalid
** Changed in: containerd (Ubuntu Focal)
Status: In Progress => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
ker.io (Ubuntu Bionic)
Status: New => In Progress
** Changed in: docker.io (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: docker.io (Ubuntu Focal)
Status: New => In Progress
** Changed in: docker.io (Ubuntu Focal)
Assign
> Invalid
** Changed in: containerd (Ubuntu Impish)
Status: Incomplete => Invalid
** Changed in: containerd (Ubuntu Bionic)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: containerd (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
301 - 400 of 11945 matches
Mail list logo