Hello Luís, we released a fix for this CVE for linux-azure-fde on 22
February 2022 in USN-5294-2:
https://ubuntu.com/security/notices/USN-5294-2
The linux-azure-fde source package is actually just some scripts, and
our kernel update tooling shows incorrect results on the webpage as a
result. Hopef
Hello, note your filesystem is full:
Filesystem 1K-blocks Used Available Use% Mounted on
udev 9812920981292 0% /dev
tmpfs 202808 1508201300 1% /run
/dev/sda5 11167656 11000192 0 100% /
That causes errors like this:
cp: error
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello, your bug has a few things:
cp: reguläre Datei '/usr/opt/eset/esets/lib/libesets_pac.so' kann nicht
angelegt werden: Datei oder Verzeichnis nicht gefunden
This error message means something is broken with your antivirus
program. I suggest contacting ESET about this. Give them a link to this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970779
Title:
Multiple vulnerabilities in Bionic, Focal and Impish
To manage noti
This looks like a third-party package, not the 'slack' configuration
management package. I suggest filing a bug report with whoever provided
the slack-desktop package you're installing.
Thanks
** Package changed: slack (Ubuntu) => ubuntu
--
You received this bug notification because you are a m
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Hello, this looks like the starting point of the problem:
Start-Date: 2022-04-17 16:08:22
Commandline: apt-get purge firefox
Purge: firefox-locale-de:amd64 (1:1snap1-0ubuntu2), firefox:amd64
(1:1snap1-0ubuntu2)
End-Date: 2022-04-17 16:08:24
Start-Date: 2022-04-17 16:12:17
Commandline: apt-get
Thanks for reporting it; this is surprisingly the best resolution I've
ever seen for "this file trips a security scanner" I've ever seen. Nice.
:)
** Information type changed from Private Security to Public Security
** Changed in: clamtk (Ubuntu)
Status: New => Invalid
--
You received th
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970294
Title:
fwsnort --ipt-apply
To manage notifications about this bug go to:
h
Thanks, Ray
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970260
Title:
SECURITY: safe.directory backport doesn't check key nam
I'm sorry, this doesn't make enough sense for me to know where to re-
assign this. I suggest giving a lot more details about what applications
you're using, etc.
Thanks
** Information type changed from Private Security to Public
** Package changed: linux (Ubuntu) => ubuntu
--
You received this
This may be a hardware problem, or a mistake on how your drive is
formatted. Hopefully someone else will know what questions to ask.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to U
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1970206
Title:
Cursor goes missing in games
To manage notifications about this bug go to:
h
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
On Thu, May 05, 2022 at 09:09:07PM -, Alvaro wrote:
> acs@lsp-022:~$ ssh -vT g...@github.com
> ...
> debug1: connect to address 140.82.121.4 port 22: Connection timed out
Note that "Connection timed out" is an error at the TCP level, that
indicates that your computer wasn't able to establish a
Possibly related to https://bugs.launchpad.net/bugs/1832421
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971650
Title:
wrong check for "server" in libssl3.postinst
To manage notifications about t
Hello Luís, thanks; I just glanced at the debdiffs quickly, and noticed
this one appears to missing the quilt series changes:
+varnish (6.6.1-1ubuntu0.1) jammy-security; urgency=medium
Please also report back how you've tested the patches.
Thanks
--
You received this bug notification because y
Thanks Steve; I mentioned to the upstream maintainers that we would
probably not remove it from supported releases, and they seemed okay
with this. Thanks!
** Changed in: elog (Ubuntu)
Status: Incomplete => Fix Released
--
You received this bug notification because you are a member of Ubu
Public bug reported:
Hello, I wanted to use apt-file -I dsc recently and found that Ubuntu's
archive is missing the Contents-source files that the Debian repo has,
compare:
http://ftp.debian.org/debian/dists/bookworm/main/
vs
http://archive.ubuntu.com/ubuntu/dists/kinetic
The Contents-source.gz
Yes, managing the configurations for the huge variety of cryptography
toolkits on a Linux system is definitely something of a chore. It would
be nice to give people one command they could use to return to unsafe-
but-compatible cryptography -- or enforce only modern cryptography.
Our friends at Re
I switched this from ca-certificates to firefox and chromium-browser,
since both browsers manage their own certificate lists and don't use the
system-provided ca-certificates. (You manage that with different tools,
see the first few lines of /etc/ca-certificates.conf for details.)
Thanks
** Packa
Public bug reported:
Hello, the upstream developers of elog have asked Debian and Ubuntu to
remove elog from the repositories because the packages are unmaintained:
https://bugs.debian.org/1010196
https://bugs.debian.org/1010197
https://ubuntu.com/security/cves?q=&package=elog&priority=&version=&
Thank you for using Ubuntu and taking the time to report a bug. Your
report should contain, at a minimum, the following information so we can
better find the source of the bug and work to resolve it.
Submitting the bug about the proper source package is essential. For
help see https://wiki.ubuntu.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969938
Title:
Ao tentar atualizar os programas pelo atualizador ele informa que não
há co
Hello Adil, looking through the terminal log it looks like you've
selected an incorrect interface for snort to listen on; this is probably
not a bug.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: systemd (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969593
Title:
rules to prevent non-root users from rebooting not taken in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969593
Title:
rules to prevent non-root users from rebooting not taken into accoun
The frog is definitely weird, but clamscan is almost certainly just
reporting a tool that might be used by attackers. There's lots of those.
Does it also report tcpdump? wireshark? ettercap? nc? telnet? nmap?
socat? stunnel?
Thanks
--
You received this bug notification because you are a member o
This may be a duplicate of https://launchpad.net/bugs/1969162
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968845
Title:
Upgrade to 22.04 from 20.04 ends with dbus installation asking for a
rebo
This looks like an emacs failure to me:
Install emacsen-common for emacs
emacsen-common: Handling install of emacsen flavor emacs
emacs: error while loading shared libraries: libotf.so.0: cannot open shared
object file: No such file or directory
ERROR: install script from emacsen-common package f
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Package changed: ubuntu-docs (Ubuntu) => ubuntu
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1969144
Title:
/Dev/Sda1 (en resumen) fu
Hello Mikko, thanks for the report; I believe that's working as
intended, those bytes are part of the DER encoding; there's an excellent
answer at https://crypto.stackexchange.com/a/19982/1400 that describes
the meanings of each of those bytes.
Thanks
** Information type changed from Private Secu
Here's the postinst I've got for that package. Maybe the
reload_dbus_config() could use a --reply-timeout=5000 or something?
Thanks
$ cat /fst/trees/ubuntu/main/d/dbus/dbus_1.12.20-2ubuntu4/debian/dbus.postinst
#!/bin/sh
# Copyright © 2003 Colin Walters
# Copyright © 2006 Sjoerd Simons
set -e
Hello, my guess is clamav is helpfully pointing out that the program
exists at all; I doubt it has any intelligence beyond looking for a few
markers for pnscan within files named pnscan.
Diagnosing load issues takes a bit of work; I suggest starting with
https://www.brendangregg.com/blog/2015-12-0
Yikes, does it actually *stop* at that point? That's .. not ideal.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968845
Title:
Upgrade to 22.04 from 20.04 ends with dbus installation asking
** Information type changed from Private Security to Public Security
** Changed in: pnscan (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968806
Title:
Cla
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964827
Title:
zfs-linux upstream at 2.1.4, jammy has 2.1.2
To manage notifications about th
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1968334
Title:
libssh2 upgrade
To manage notifications about this bug go to:
https
This reminds me of several previous bugs; this may or may not be a
duplicate, and this may or may not be intentional behaviour. Hopefully
these are are useful and save some debugging effort:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1922212
https://bugs.launchpad.net/ubuntu/+source/op
Hopefully this is helpful for you:
https://sources.debian.org/data/main/r/ruby3.0/3.0.3-1/debian/patches/Update-
openssl-to-version-3.0.0.patch
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/19
I reviewed libtpms 0.9.0-0ubuntu4 as checked into jammy. This shouldn't
be considered a full audit but rather a quick gauge of maintainability. I
certainly didn't carefully review if libtpms is fit for use as a software
TPM. It appears to have been programmed with care and dilligence and
the upstr
But who would keep that resolution when it sure *looks* broken? I can
understand the "it's not new and we don't know how to fix it" :) but
probably users won't know that they'll be fine after a reboot.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
B[], aha, you've received no Chromium updates since November 2021
because the author of that PPA hasn't provided any.
apt-file will report what files are in the Ubuntu package whether or not
you have it installed. It's very handy to see what files are in an
Ubuntu package without installing it.
d
The 20.04 LTS chromium-browser deb package exists only to install the
chromium snap and deliver a few files to the filesystem outside the snap
packaging system:
$ apt-file show chromium-browser
chromium-browser: /usr/bin/chromium-browser
chromium-browser: /usr/share/applications/chromium-browser.d
libtpms might need to pull in
https://github.com/stefanberger/libtpms/commit/d78a4520ba3157087e1e438b519618f26d85fae3
-- I think without this fix, the following algorithms may not work
right:
#define ALG_KDF1_SP800_56A_VALUE0x0020
#define TPM_ALG_KDF1_SP800_56A (TPM_ALG_ID)(ALG_KD
I reviewed swtpm 0.6.1-0ubuntu5 as checked into jammy. This shouldn't be
considered a full audit but rather a quick gauge of maintainability. I
especially didn't audit the fuse/cuse interface, nor suitability of the
software tpm to replace a hardware tpm.
And especially especially I didn't invest
I'm not entirely sure when the actual real for real really deadline is,
but if it's monday, probably not.
Sorry.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1953363
Title:
[MIR] python-xmlschema,
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965958
Title:
list-oem-metapackages crashed with AttributeError in
packages_for_modalias(
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965857
Title:
software-properties-gtk crashed with AttributeError in
packages_for_modalia
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1965661
Title:
software-properties-gtk crashed with AttributeError in
packages_for_modalia
Can an update for this issue be incorporated before a release?
https://github.com/stefanberger/swtpm/security/advisories/GHSA-2qgm-8xf4-3hqw
It's something Coverity spotted in our version, and I was very pleased
to see that there's already an advisory for this :) saving me some
effort.
Thanks
-
I can't speak for the SRU team, but it's entirely possible that if you
prepare and test a debdiff, and show that this can be fixed, you could
drive an SRU through to completion; see
https://wiki.ubuntu.com/StableReleaseUpdates for more information.
Thanks
--
You received this bug notification be
I can really appreciate the appeal of a "do nothing today" solution but
I'm worried about how much work, and unknown surprises, await us on our
*first* update in the future.
At some point, we'll have a security issue in a rust program that can
only be solved in coordination with a toolchain update
Yeah it seems unlikely to be ssh to me -- can you ping the machine? does
virtualbox networking do interfaces that can ping? Does virtualbox offer
a 'console view' that you can use to debug the system?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscrib
Corruption was my first idea, too, but the Dependencies.txt didn't
report debsums mismatches. Thanks for the explanations.
** Also affects: debconf (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
** Changed in: unzip (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1957077
Title:
SIGSEGV during processing of unicode string
To manage notifications about
** Changed in: mate-screensaver (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1960953
Title:
lockscreen is bypassed after screensaver segfault
To ma
Hello, the tail end of the dpkg terminal log suggests mesa-amdgpu-vdpau-
drivers might be to blame; I don't see that package on my local mirror,
did this come from outside Ubuntu? If so, you may need to report the
issue there.
Thanks
--
You received this bug notification because you are a member
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Bartłomiej, can you report this to the upstream developers? This
will need their input to address.
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
http
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Alejandro, the error message from the package installation script
is:
---
The hostname -f command returned: amora-diarioas
Your system needs to have a fully qualified domain name (fqdn) in
order to install the var-qmail packages.
Installation aborted
---
You can probably fix this via th
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Nils, have you reported this issue upstream yet? Has a bug or fix
already been created?
Thanks
** Changed in: p7zip (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
Hello Girish, there's some errors in your dmesg that make me think you
may have hardware problems. It's not clear, but it's possible. Also,
there's some packages in the Dependencies.txt marked with [origin:
unknown] that might be worth investigating.
Thanks
** Information type changed from Privat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
These lines from the logs look most relevant:
Unpacking libpam-runtime (1.3.1-5ubuntu4.3) over (1.3.1-5ubuntu4.1) ...
Setting up libpam-runtime (1.3.1-5ubuntu4.3) ...
Can't locate object method "new" via package
"Debconf::Element::Noninteractive::Multiselect" (perhaps you forgot to load
"Debconf
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1964461
Title:
under 22.04 development release, fail2ban won't start
To manage notification
Linux Mint replaces the kernel; if you're having errors with basic
kernel operations you'll need to seek support from the Mint community.
Thanks.
** Information type changed from Private Security to Public
** Changed in: linux (Ubuntu)
Status: New => Invalid
--
You received this bug noti
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Johnny, there's indications in your logs that suggest you may have
broken firmware or perhaps broken hardware. It's possible that your
problems here are caused by whatever the logs have reported, but it
might also be something unrelated.
It'd be worth trying to do a BIOS update for your moth
** Also affects: nvidia-graphics-drivers-340 (Ubuntu)
Importance: Undecided
Status: New
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
Thanks for doing the digging to confirm the cause; I suspect unattended-
upgrades should be modified to perform something similar to apt upgrade,
rather than apt-get upgrade, and bring in new dependencies when
necessary. A lot of systems never have interactive users any more.
Thanks
** Changed in
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1963861
Title:
Can't tell what application will be launched with custom schemes
To
It looks like this was added in:
https://github.com/openssl/openssl/commit/72d2670bd21becfa6a64bb03fa55ad82d6d0c0f3
in order to address servers that have not yet been updated for
CVE-2009-3555.
It's possible to add a flag at the C level to connect insecurely,
SSL_OP_LEGACY_SERVER_CONNECT, but I
Hello Steve, thanks for the report; can you run a manual:
sudo apt update && sudo apt upgrade
and report back the apt output, which will give a better idea of what
exactly is holding back the upgrade?
Thanks
** Changed in: webkit2gtk (Ubuntu)
Status: New => Incomplete
--
You receiv
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1963751
Title:
focal security update 2.34.6-0ubuntu0.20.04.1 cannot be automaticall
I reviewed adsys 0.8 as checked into jammy. This shouldn't be
considered a full audit but rather a quick gauge of maintainability. As
usual with golang code, there's vastly more code in the package than we've
authored, and it's not feasible to review the entirety.
adsys allows network administrat
This reminds me a lot of https://bugs.launchpad.net/bugs/1871538
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1962036
Title:
dbus was stopped during today's jammy update, breaking desktop
To manag
Thanks for the concern, probably it's just packages that haven't moved
through the full publishing process yet.
If it's still around, maybe including the full apt-get upgrade output
would help.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notifica
Heh, so Dmitry might actually remove the other 'free' calls in the error
paths :) -- and he spotted that the strdup() calls are unchecked:
https://github.com/linux-pam/linux-pam/issues/444
It might be worth mirroring whatever he decides to do.
Thanks
** Bug watch added: github.com/linux-pam/lin
Oh yes, the waitpid() stuff.. if it works in testing, leaving it alone
is probably fine then. Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961459
Title:
adsys pam issues
To manage notific
Hah so I've got another bug to report then? :) Thanks!
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961459
Title:
adsys pam issues
To
** Changed in: wireguard (Ubuntu)
Status: Confirmed => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1950317
Title:
[MIR] Wireguard
To manage notifications about this bug go to
None of us are ARM architecture experts but the upstream code nearby
doesn't look like it's changed since this patch was introduced:
https://github.com/openssl/openssl/blame/master/crypto/poly1305/asm/poly1305-armv8.pl
https://github.com/openssl/openssl/blame/OpenSSL_1_1_1-stable/crypto/poly1305/a
Are there any log entries in your proxy that might help explain what's
happening?
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1960264
Title:
503 errors for Jammy PPAs
To manage notificati
It looks like I lost track of this browser tab a lot longer than I
expected.
Thanks Hangyu Hua for the fixes! :)
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
htt
Ah, sorry, I see I lost a race condition :) thanks
** Changed in: gcc-defaults (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1959841
Title:
Lower 8 bi
Hello, the stack checking is intended to detect simplistic overwrites of
stack control structures. If an attacker is able to overwrite a single
NUL in the canary with a NUL supplied from an input string, but no
further, then the stack control structures are still intact and
undamaged. As far as the
201 - 300 of 6488 matches
Mail list logo