I have uploaded a remmina fix to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it has finished building, could someone please test it in their
environment to see if it resolves the issue for them and comment back
here?
I'll publis
** Changed in: remmina (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: remmina (Ubuntu)
Importance: Undecided => Critical
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
2.1.1 is now in all releases:
https://usn.ubuntu.com/4379-1/
** Changed in: freerdp2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1873514
T
Updates for this issue have now been published:
https://usn.ubuntu.com/4377-1/
** Changed in: ca-certificates (Ubuntu Xenial)
Status: In Progress => Fix Released
** Changed in: ca-certificates (Ubuntu Bionic)
Status: In Progress => Fix Released
** Changed in: ca-certificates (Ubun
Updated will be released within the next half-hour.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1881533
Title:
Remove expired AddTrust_External_Root.crt because it breaks software
To manage notif
ntu Focal)
Status: New => In Progress
** Changed in: ca-certificates (Ubuntu Groovy)
Status: Confirmed => In Progress
** Changed in: ca-certificates (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: ca-certificates (Ubuntu Bionic)
*** This bug is a duplicate of bug 1881533 ***
https://bugs.launchpad.net/bugs/1881533
** This bug has been marked a duplicate of bug 1881533
Remove expired AddTrust_External_Root.crt because it breaks software
--
You received this bug notification because you are a member of Ubuntu
Bugs,
You can get untested packages in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1873514
FYI, my current plan is to release 2.1.1 to all Ubuntu stable releases.
I am currently fixing incompatibilities with the new version in vinagre,
gnome-boxes, and remmina.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https:/
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1875186
Title:
Booting continues despite three failed attempts if the root partition
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for your comments. This does not appear to be a bug report and we
are closing it. We appreciate the difficulties you are facing, but it
would make more sense to raise your question in the support tracker.
Please visit https://answers.launchpad.net/ubuntu/+addquestion
** Information type cha
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878585
Title:
Desktop freezes (no keyboard input, mouse still works but can't click
on an
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878592
Title:
super key problem
To manage notifications about this bug go to:
https://bugs
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878922
Title:
no puedo installar ubuntu 18.04
To manage notifications about this bug go to
Also see https://github.com/json-c/json-c/pull/610/
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1878723
Title:
Kernel panic when used with upstart after 0.11-4ubuntu2.1 update
To manage notificat
Is this when using MariaDB or when using MySQL?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1877504
Title:
new version of libmysqlclient21 8.0.20-0ubuntu0.20.04.1 causes mythtv-
set, myt
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: Confirmed
** Also affects: file (Ubuntu Eoan)
Importance: Undecided
Status: New
** Changed in: file (Ubuntu Eoan)
Status: New => Fix Released
** Changed in: file (Ubuntu Focal)
Status: New =&g
Sorry, I meant "Are you able to reproduce the issue with the pre-
compiled version of Whoopsie that comes with it?"
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
integer overflow in w
Thanks for the video, but I still can't reproduce the issue.
What version of Ubuntu are you running in the video?
How much ram do you have in that machine?
Are you able to reproduce the issue with the pre-compiled version of Ubuntu
that comes with it?
--
You received this bug notification becau
Hi,
What release did you use to reproduce this? I tried reproducing it in
Ubuntu 18.04 LTS, but whoopsie parses the file without segfaulting.
I tried both
$ python -c "print('A' * 0x + ' : ' + 'B')" >
/var/crash/fake.crash
and
$ python -c "print('A' * 0xFFFE + ' : ' + 'B')" >
/var/
I have tested the package in proposed on eoan, and it works as expected.
** Tags removed: verification-needed verification-needed-eoan
** Tags added: verification-done verification-done-eoan
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubu
I have now published the regression fix:
https://usn.ubuntu.com/4341-3/
Please let me know if you still experience issues after installing the
new package. Thanks.
** Changed in: samba (Ubuntu)
Status: Confirmed => Invalid
--
You received this bug notification because you are a member o
Thanks aflorent for testing it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875798
Title:
Samba 2:4.3.11+dfsg-0ubuntu0.16.04.26: LDAP request size (81) exceeds
(0)
To manage notifications abou
Please make sure you don't install other packages from that PPA, just the samba
ones.
You can either enable the PPA, install the samba packages only, then disable
the PPA, or manually download the packages using the following link:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu
I have uploaded a fixed package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has finished building, please confirm that it fixes the
regression in your environment, and I will immediately publish it as a
security fi
Apologies, this is indeed a regression in Ubuntu 16.04 LTS. I am working
on a fix and will have updated packages to test later today.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875798
Title:
Sam
Critical
** Changed in: samba (Ubuntu Xenial)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1875798
Title:
Samba 2:4.3.11+dfsg-0ubuntu0.16
Hi,
Thanks for reporting this issue. We are currently investigating it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1872560
Title:
integer overflow in whoopsie 0.2.69
To manage notifications abo
It looks like bson.c in whoopsie was originally taken from here:
https://github.com/10gen-archive/mongo-c-driver-legacy/tree/master/src
The upstream repo has seen a lot of security fixes since the code was
copied, perhaps we should investigate re-syncing it before attempting to
fix it ourselves.
*** This bug is a duplicate of bug 1864689 ***
https://bugs.launchpad.net/bugs/1864689
Hi, thanks for reporting this issue.
This isn't caused by the patch for CVE-2020-1967, it is caused by
OPENSSL_TLS_SECURITY_LEVEL=2 being set as the minimum security level.
You can try it with a lowered se
The -security pocket gets security fixes only.
The -updates pocket gets security fixes, and also bug fixes.
This is a bug fix, which is why it is in the -updates pocket only.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
htt
** Changed in: pam-ssh-agent-auth (Ubuntu Focal)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1869512
Title:
sudo crashed with SIGSEGV in BN_is_z
** Bug watch added: Debian Bug tracker #956399
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956399
** Also affects: pam-ssh-agent-auth (Debian) via
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=956399
Importance: Unknown
Status: Unknown
--
You received this bug notificat
ged in: pam-ssh-agent-auth (Ubuntu Focal)
Status: New => In Progress
** Changed in: pam-ssh-agent-auth (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Attachment removed: "CoreDump.gz"
https://bugs.launchpad.net/ubuntu/+source/pam-ssh-agent-
Apologies for hijacking Alan's bug. I thought we were experiencing the same
symptoms.
I'll let Alan add his info.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
Title:
Printer notification e
I'm using the latest available version on bionic:
cups-browsed 1.20.2-0ubuntu3.1
What version are you expecting me to be running?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
Title:
Printe
** Attachment added: "cups-browsed_log"
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1869981/+attachment/5344359/+files/cups-browsed_log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
Sure...
# systemctl stop cups-browsed
# rm /var/log/cups/cups-browsed_log
# lpstat -v
device for Color-LaserJet-CP2025dn:
hp:/net/HP_Color_LaserJet_CP2025dn?ip=192.168.66.6
device for HP_OfficeJet_Pro_7740_series_7646EB_:
ipp://HP40B0347646EB.local:631/ipp/print
# lpadmin -x HP_OfficeJet_Pro_77
$ lpstat -v
device for Color-LaserJet-CP2025dn:
hp:/net/HP_Color_LaserJet_CP2025dn?ip=192.168.66.6
device for HP_OfficeJet_Pro_7740_series_7646EB_:
ipp://HP40B0347646EB.local:631/ipp/print
device for HP_OfficeJet_Pro_7740_series_7646EB_@HP40B0347646EB.local:
ipps://HP40B0347646EB.local:443/ipp/p
** Attachment added: "cups-browsed_log"
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1869981/+attachment/5344288/+files/cups-browsed_log
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
** Attachment added: "cups-browsed.conf"
https://bugs.launchpad.net/ubuntu/+source/cups/+bug/1869981/+attachment/5344279/+files/cups-browsed.conf
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/18699
I have two printers. I've had two printers configured in cups for a long
time.
I believe this issue started happening at the same time that a third
printer started appearing automatically by cups, which is a duplicate of
a printer I already have configured:
Color-LaserJet-CP2025dn
HP_OfficeJet_Pr
I can reproduce the notification just by doing "systemctl restart cups",
so perhaps it is related to the logrotate job restarting cups?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
Title:
P
I just started getting this behaviour on 18.04 for the past few weeks
too.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1869981
Title:
Printer notification every day at midnight
To manage notifica
I understand your reasoning, but as I understand the issue, with TLSv1.2
renegotiation was used to see if the client can provide a certificate or
not, but TLSv1.3 doesn't support renegotiation, so post-handshake
authentication must be used.
Thanks for opening the upstream bug, let's see what they
@vladimir-mencl: what you are seeing is actually this bug:
https://bugs.launchpad.net/ubuntu/+source/firefox/+bug/1834671
Basically, with TLSv1.3 you need a client that supports post-handshake
authentication.
Some clients, such as Firefox for example, support it but it needs to be
enabled, as it'
Thanks for reporting the regression. What client are you using to access
the web server?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865900
Title:
apache 2.4.29-1ubuntu4.12 authentication with cl
Unfortunately, the ! character at the beginning the the line in ca-
certificates.conf is just for blacklisting ca certificates from being
imported into the system store, it's not really a backlist that can be
used by a crypto library.
--
You received this bug notification because you are a member
Looks like Fedora substantially modified the scripts used by ca-
certificates to extract untrusted and blacklisted certs. We should
probably start by investigating how their package is handling this, what
files they are generating, and if they are being properly handled by p11
-kit-trust.
--
You
** Tags removed: verification-needed verification-needed-disco
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1844853
Title:
IBus no longer works in Qt applications after upgrade
To manage notificat
Before we switch any software to using p11-kit-trust.so, we need to fix
our ca-certificates package to properly handle untrusted or blacklisted
certificates. At the moment, I believe they are simply skipped when
generating the contents of /usr/share/ca-certificates.
--
You received this bug notif
Thanks for the test. That does in fact look like the Apache side of
things is now fixed as you are getting the appropriate error message
when the client support is missing, which wasn't happening before.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subsc
I have uploaded an apache2 package to the security team PPA for testing
here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa
It includes a few fixes related to TLSv1.3.
Could environment having this issue please test that package and see if
it solves the issue?
Thanks!
--
I have uploaded an apache2 package to the security team PPA for testing
here:
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa
It includes the commit mentioned in this bug, along with a few others
related to TLSv1.3.
@JonH: could you please test that package and see if it solv
I'll prepare some updates for testing, thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1867223
Title:
REMOTE_USER environmental variable not set for TLSv1.3 connections
To manage notification
** Information type changed from Private Security to Public Security
** Changed in: isc-dhcp (Ubuntu Focal)
Status: New => In Progress
** Changed in: isc-dhcp (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because y
** Changed in: lightdm (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1854120
Title:
Screen contents visible briefly on lock screen on resolution change
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856494
Title:
system program problem detected
To manage notifications about this bug go to
** Changed in: sa-exim (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1856873
Title:
sa-exim Greylisting.pm vulnerability
To manage notifications about this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1857761
Title:
Laptop going to sleep in stead of shutdown if docked and lid closed
T
Are you perhaps pressing the button when you are unplugging it?
If not, could you please give detailed steps on how to reproduce this
issue with a freshly installed version of Ubuntu?
Thanks!
** Changed in: ubuntu
Status: New => Incomplete
--
You received this bug notification because y
** Changed in: msgpack-c (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1861448
Title:
buffer overflow in msgpack_object_print_buffer
To manage notif
** Changed in: netplan.io (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1862600
Title:
sensitive config files are world-readable
To manage notifications abo
** Changed in: checkinstall (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861281
Title:
checkinstall adds local root exploits to any package with a symlink
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864948
Title:
circumflex accent in a password is not hidden properly
To manage notificatio
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865474
Title:
sysytemd-resolved automatically use an ipv6 dns server on lan
To manage noti
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
In Ubuntu packages, the AJP connector is disabled by default,
so unless specifically enabled by an admin, deployments made
using the package are not vulnerable to this issue.
** Information type changed from Private Security to Public Security
** Changed in: tomcat8 (Ubuntu)
Status: New =
What desktop environment are you using?
** Changed in: lightdm (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1864982
Title:
Ubuntu desktop computer doesn't
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
ACK on the debdiff in comment #3. Uploaded to focal. Thanks!
** Changed in: util-linux (Ubuntu)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865504
Title:
hwcl
Firefox in bionic added an option to handle PHA, but it's disabled by
default because it conflicts with http2.
I'm not aware if there's an equivalent "fix" for python-requests.
** Bug watch added: github.com/urllib3/urllib3/issues #1634
https://github.com/urllib3/urllib3/issues/1634
--
You r
Perhaps this: https://github.com/urllib3/urllib3/issues/1634
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865900
Title:
apache 2.4.29-1ubuntu4.12 authentication with client certificate
broken
T
Most clients don't support post handshake authentication, hence can't
use client side certificates with TLSv1.3.
In environments where client side certificates are used, TLSv1.3 has to
be disabled in the Apache configuration until browsers and other clients
support post handshake authentication.
This is likely a dupe of bug 1834671...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865900
Title:
apache 2.4.29-1ubuntu4.12 authentication with client certificate
broken
To manage notification
Is anyone actively working on the glib2.0 SRUs? We are blocked on them
for our ibus security update...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1844853
Title:
IBus no longer works in Qt applica
I don't know what the way forward is to resolve this issue. While
upstream qemu has added some new CPU models, "Skylake-Client-noTSX-
IBRS", "Skylake-Server-noTSX-IBRS", etc, libvirt has not. If I do add
these to libvirt, we will need to carry them forward as a delta to
upstream possibly forever.
Awesome, thanks! :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1862787
Title:
inconsistent-maintainer error not applicable to Ubuntu
To manage notifications about this bug go to:
https://bugs.la
These look like the list of commits to support recent kernel/microcode
feature updates:
qemu:
https://git.qemu.org/?p=qemu.git;a=commit;h=7fac38635e1cc5ebae34eb6530da1009bd5808e4
(taa)
https://git.qemu.org/?p=qemu.git;a=commit;h=0723cc8a5558c94388db75ae1f4991314914edd3
(vmx)
https://git.qemu.org
** Attachment added: "ppp_2.4.7-2+4.1ubuntu5_source.changes"
https://bugs.launchpad.net/ubuntu/+source/lintian/+bug/1862787/+attachment/5327383/+files/ppp_2.4.7-2+4.1ubuntu5_source.changes
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
Public bug reported:
Building a package in focal now gives me the following lintian error:
E: ppp changes: inconsistent-maintainer Marc Deslauriers
(changes vs. source) Ubuntu Developers
This should not be an error in Ubuntu as the maintainer field is handled
differently:
https
Security updates were already released for these two CVEs here:
https://usn.ubuntu.com/4265-1/
** Changed in: spamassassin (Ubuntu Xenial)
Status: New => Fix Released
** Changed in: spamassassin (Ubuntu Bionic)
Status: New => Fix Released
** Changed in: spamassassin (Ubuntu Disco)
Perhaps the hash is missing in debian/openssh-server.ucf-md5sum?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861472
Title:
upgrade from fresh bionic to focal needlessly prompts user
To manage no
Ubuntu 18.04 contains two versions of Openssl: openssl 1.1 and openssl
1.0.
Unfortunately, upstream MySQL now requires it to be linked against
OpenSSL 1.1, where previously it used an internal ssl library.
It is no longer possible to use openssl 1.0 concurrently with MySQL.
What is requiring you
** Also affects: pasaffe
Importance: Undecided
Status: New
** Changed in: pasaffe
Status: New => Confirmed
** Changed in: pasaffe
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubun
** Description changed:
- In eoan+, running the wordpress setup script provided with the package
- fails:
+ [Impact]
+ Users can't setup wordpress on Ubuntu because of an incompatibility with
MySQL 8.0.
+
+ [Test Case]
+ apt install mysql-server
+ apt install wordpress php-gd libapache2-mod-php
** Also affects: wordpress (Ubuntu Eoan)
Importance: Undecided
Status: New
** Also affects: wordpress (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: wordpress (Ubuntu Eoan)
Status: New => Confirmed
** Changed in: wordpress (Ubuntu Focal)
Status:
Test cases:
gnutls-cli --priority='NORMAL' -p 443 sha1-intermediate.badssl.com
gnutls-cli --priority='NORMAL:%VERIFY_ALLOW_BROKEN' -p 443
sha1-intermediate.badssl.com
gnutls-cli --priority='NORMAL:%VERIFY_ALLOW_SIGN_WITH_SHA1' -p 443
sha1-intermediate.badssl.com
--
You received this bug notifi
701 - 800 of 11945 matches
Mail list logo