** Bug watch added: github.com/python/cpython/issues #124170
https://github.com/python/cpython/issues/124170
** Also affects: python via
https://github.com/python/cpython/issues/124170
Importance: Unknown
Status: Unknown
** Bug watch added: Debian Bug tracker #1079780
https://b
Any news on this? I did a release upgrade to Noble and have the exact
same problem.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2057693
Title:
Activating autotrim results in high load average due
: Install
NULL: ConfigurePending
Architecture: amd64
AudioDevicesInUse:
USERPID ACCESS COMMAND
/dev/snd/seq:jean-marc 1729 F pipewire
/dev/snd/controlC0: jean-marc 1733 F wireplumber
CasperMD5CheckResult: unknown
Date: Wed Sep 11 09:39:36 2024
ErrorMessage: problèmes de
/etc/cloud/build.info contains:
build_name: server
serial: 20221104
Op di 10 sep 2024 om 15:10 schreef Mate Kukri <2079...@bugs.launchpad.net>:
> Hmm it seems like `grub-{ef,pc}/cloud_style_installation: true` is wrong
> for this set up.
>
> Seems like the upgrader thinks this installation was d
Sure, That gives the next output:
```
(base) ubuntu@server2:~$ sudo debconf-show grub-pc
grub-efi/install_devices_failed: false
* grub2/update_nvram: false
grub-efi/partition_description:
grub-efi/install_devices:
grub-efi/install_devices_empty: false
grub-pc/postrm_purge_boot_grub: fals
lsblk gives:
sda 8:00 1.8T 0 disk
├─sda18:10 1G 0 part
│ └─md1 9:10 1022M 0 raid1 /boot
├─sda28:20 1.8T 0 part
│ └─md2 9:20 1.8T 0 raid1 /
├─sda38:30 512M 0 part [SWAP]
├─sda48:40 1K 0 part
└─sda58:50 1.9M 0
Public bug reported:
During upgrade to 24.04 and afterwards when executing "apt upgrade" I
get the following error:
Setting up grub-pc (2.12-1ubuntu7) ...
Installing for i386-pc platform.
mdadm: /dev/md does not appear to be an md device
grub-install: error: ioctl RAID_VERSION error: Inappropria
Thanks for the explanation and your help!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1861609
Title:
Xorg crashed with assertion failure (usually in a VM) at
[privates.h:121/122: dixGetPrivateAd
Thank you! :)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064846
Title:
xfce4-panel should be upgraded to 4.18.6 if glib 2.80 is used
To manage notifications about this bug go to:
https://bugs.l
I absolutely agree with Hans.
Any updates on the situation? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054919
Title:
xfce4-panel crashed with SIGABRT in g_assertion_message_expr()
To m
FYI: I have the some problem as Doug mentioned (fresh install of Xubuntu
24.04, although it's the .1 release), but I do not have deep technical
knowledge, so I don't think I'd be able to implement any kind of
workaround.
Does anybody know if and when the problem will be fixed (and if I can
just us
I also agree.
For the non tech-savvy of us: How would the workaround mentioned above
work? How do I actually upgrade to 4.18.6?
Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2064846
Title:
Update has been published now, thanks for testing!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075145
Title:
exfatprogs CVE-2023-45897 backport to jammy
To manage notifications about this bug go
Thanks for the debdiff for this issue. I've validated that that is the
only commit that affects jammy.
I have uploaded this package for building in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has finished building, c
I'll let someone else decide if this bug is still worth fixing even
though we aren't using the helper anymore.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell-portal-helper
Ah yes, this should be fixed now because of the security update. I meant
to update this bug, but forgot. Thanks for noticing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell
Thanks!
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077001
Title:
Clipboard contents available at locked screen
To manage no
Thanks Rico!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2076
Hi Rico, the debdiff in comment #1 contains a patch that doesn't
actually apply to jammy. Could you please fix it? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
Thanks for preparing these Rico, I'll prepare the security updates!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://
** Changed in: nautilus-share (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nautilus-share (Ubuntu Focal)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
(In reply to Steven Haigh from comment #74)
> These days, its become cheap enough to just have more RAM - so to be honest,
> I haven't seen an issue like this again in a number of years - but now I
> don't bother with less than 32Gb of RAM for a desktop.
>
> Likely, this has just become obsolete n
Unfortunately, we did not have access to the simplified patches for 9.16
when the security issues were published, and since 9.16 is no longer
supported by ISC since April 2024, we weren't expecting them to become
available.
The patches for 9.18 were much more sophisticated rendering backporting
to
I don't believe Ubuntu 20.04 shipped with a dnssec-enable directive.
Could you perhaps have upgraded from a previous release, or kept an old
configuration file? Did you get warnings in your log file about the
deprecated directive?
--
You received this bug notification because you are a member of
** Package changed: apache2 (Ubuntu) => firefox (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073942
Title:
Fox News Site Not Working
To manage notifications about this bug go to:
https:/
Unfortunately the nova package in jammy-proposed got superseded by a
security update and will have to be re-uploaded.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1999814
Title:
[SRU] Allow for spe
Thanks, that is very helpful, so we're getting an extra slash here:
rewrite '/asd.example.com/' -> 'http:///asd:8000/'
instead of:
rewrite '/asd.example.com/' -> 'http://asd:8000/'
and I can confirm this issue exists with upstream's 2.4.62 release too,
so I will keep an eye out for new fixes th
I'm having difficulty reproducing your exact issue. Could you please run
apache with "rewrite:trace3" and show working and non-working requests
from error.log? Thanks.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launch
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications about
: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications about this bug go to:
ht
Now that both Firefox and also Thunderbird are only delivered as snaps
on Ubuntu 24.04, I feel this bug should finally no longer be considered
with the importance of a "Wishlist"...
With the release of 22.04, Canonical was already advertising an AD
integration: https://ubuntu.com/blog/new-active-d
** Also affects: firefox (Ubuntu)
Importance: Undecided
Status: New
** Also affects: thunderbird (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net
Thanks for the example, the bug should be fixed in LyX 2.5.2.
Note that the bst file is irrelevant here, the issue was with LyX's own
parsing of the bib file.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
Regression fix USN has now been published:
https://ubuntu.com/security/notices/USN-6885-2
Thanks!
** Changed in: apache2 (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.
s: apache2 (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: apache2 (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: apache2 (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: apache2 (Ubuntu Jammy)
I have uploaded a test package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
If you could give it a spin and see if it fixes the issue, that would be
great. If it does, I'll release it as a regression update.
Thanks!
--
You receiv
This is a stab in the dark but perhaps this is part of the problem:
https://github.com/apache/httpd/commit/4d3a308014be26e5407113b4c827a1ea2882bf38
Would you be willing to try a test package if I build one?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072648
Title:
Regression in Apache 2.4.52-1ubuntu4
Is this all your are getting? "Reason: URI has no hostname: /…"
Or did you edit that to remove sensitive info?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072648
Title:
Regression in Apache 2.4.5
Thanks for the confirmation Konstantin.
I do not have any admin rights to do that, but in my mind this ticket
can be closed.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815278
Title:
LyX restore
** Changed in: crowdsec-firewall-bouncer (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069596
Title:
blocks wrong IPv4 and IPv6 addresses on LE systems (rev
We have no way of knowing why virustotal is flagging this as being
malicious, so there is no actionable item we can take with this bug
report.
Could you get more details on the issue?
** Changed in: golang-1.22 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification beca
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: pam (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069490
Title:
Possible fingerjacking vulnerability: CVE-2024-37408
To manage notifications a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Konstantin, is this bug still present for you?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815278
Title:
LyX restores the same cursor position wherever it was placed next
time(s)
To mana
Do you have support for danish hyphenation rule installed? I'd try to
install the package texlive-lang-european if it is not there.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2049926
Title:
Probl
Thanks for reporting this issue. It's a pretty odd issue, because all
the OpenSSH update did was disable a line that logged something, so I'm
not sure how it could be related to connecting from a different subnet.
Can you confirm that downgrading to the previous release fixes the
issue?
--
You r
Can you share the bibtex file or just the bad entry? The link that you
give here does not have the 1000 authors.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069792
Title:
lyx segfaults upon openi
** Summary changed:
- Investigate ASLR being disabled for children
+ Investigate ASLR re-randomization being disabled for children
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071815
Title:
Inves
Subscribing Nick, who appears to be the original delta author.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2071815
Title:
Investigate ASLR being disabled for children
To manage notifications abou
*** This bug is a security vulnerability ***
Public security bug reported:
The systemd-socket-activation.patch patch has an Ubuntu delta to fix bug
2011458, but this results in ASLR not being re-randomized for children
because the patch delta does "rexec_flag = 0;".
This was discovered as part o
** Information type changed from Private Security to Public Security
** Changed in: openssh (Ubuntu Oracular)
Status: In Progress => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2
Thanks, this is very helpful.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2069792
Title:
lyx segfaults upon opening a .lyx file
To manage notifications about this bug go to:
https://bugs.launchpa
It looks like upstream released a follow-up commit to fix this issue, or
one similar to it:
https://github.com/OpenPrinting/cups/commit/145b946a86062aafab76c656ee9c1112bfd4f804
We will build test packages to see if this solves the regression, and if
so, we will publish updates.
** Also affects:
Hello,
Thanks for the very complete bug report. I cannot reproduce any crash
loading the file from command line.
I do not see any error in the valgrind log, do you see one?
Finally, gdb seems to show an infinite recursion in regex, but there is
no way to see where it starts.
Is is possible fr y
5c7e72d92" BLOCK_SIZE="4096" TYPE="ext4"
PARTUUID="8fc6d76b-727a-42b2-be23-28467132a659"
/dev/nvme0n1p1: UUID="E256-F414" BLOCK_SIZE="512" TYPE="vfat" PARTLABEL="EFI
system partition" PARTUUID="fa0e08f9-fae7-43c8-b0f1
I have built packages in the security team proposed PPA for testing.
Additional packages required no-change rebuilds in the -security pocket
also. For Jammy, the additional packages are breeze, libksysguard,
layer-shell-qt, kwin, kwayland-server. For Focal, the additional
packages are kwin and bree
ACK on the debdiffs, packages are building now!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2067742
Title:
[SRU] CVE-2024-36041 Fix ksmserver: Unauthorized users can access
session manager
To m
I have tried your workaround from #2 and hibernate works. Thanks
Dmitry-a-durnev !
However, when I reboot my pc, I'm back to square one. Hibernate stops working
till I execute the steps in #2 again.
Any idea's ?
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
In response to comment #7, I have no issue releasing a security update
regression fix for focal and jammy that relaxes the CVE fix for sockets
since that is a change in behaviour. Let me know once the proposed patch
has been successfully tested to resolve the issue.
--
You received this bug notif
This is the upstream commit which introduced the change in behaviour:
https://gitlab.com/qemu-
project/qemu/-/commit/f6b0de53fb87ddefed348a39284c8e2f28dc4eda
There is no subsequent fix to the new restrictions, and the only more
recent commit is one to deprecate the whole proxy backend:
https://g
These were all released:
https://ubuntu.com/security/notices/USN-6789-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Mantic)
Sta
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2059852
Title:
Invalid free called during libfreetype FT_Done_Glyph
To manage noti
Adding gnome-session as this is where the logic exists.
I don't see any changes in the latest gnome-session script. Could you
please file a bug with the upstream gnome-session developers here?:
https://gitlab.gnome.org/GNOME/gnome-session/-/issues
Thanks!
** Also affects: gnome-session (Ubuntu)
** Changed in: linux (Ubuntu)
Status: New => Invalid
** Changed in: network-manager-pptp (Ubuntu)
Status: New => Won't Fix
** Changed in: ubuntu-release-notes
Status: New => Fix Released
** Changed in: pptp-linux (Ubuntu)
Status: New => Confirmed
--
You received thi
** Changed in: openjdk-22 (Ubuntu)
Status: Triaged => Fix Committed
** Changed in: openjdk-22 (Ubuntu)
Status: Fix Committed => Fix Released
** Changed in: openjdk-23 (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubun
** Changed in: mate-desktop (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058434
Title:
leakage of private information through window list preview
To manag
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Tags added: community-security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063055
Title:
Boot failure 24.04
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+bu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065678
Title:
nvidia-graphics-drivers-545 package fails to launch graphical
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Since they are new upstream versions, and are already going through the
SRU process, I'll wait until they are verified-done, and I will do a no-
change rebuild of them into the -security pocket.
Does that sound reasonable? Thanks!
--
You received this bug notification because you are a member of
Thanks for the debdiffs, I will prepare packages in the security PPA and
will comment back
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2065728
Title:
CVE-2024-3044
To manage notifications about t
Well, the main impact for me was that after the update, suddenly the
autostart of all Virtual Machines failed after a reboot, which to me is
a seriously POLA violation and not something I would expect to happen
within an LTS release.
Even though you are correct in the fact that it was broken alrea
I'm sorry, but if this means that in the default configuration this is
no longer working, how is this not a regression ?
Should the default configuration not be so that both bind9 and libvirtd
can be installed and used without issue as was the case before the
dnsmasq update?
Breaking this within
ACK on the debdiffs. Uploaded for processing by the SRU team. Thanks!
** Changed in: openscap (Ubuntu Focal)
Status: New => In Progress
** Changed in: openscap (Ubuntu Jammy)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs,
The regression fix has now been published:
https://ubuntu.com/security/notices/USN-6728-3
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
That is pretty odd, I can't reproduce this issue on jammy.
what's the output of "ldd /lib/x86_64-linux-
gnu/libwebkit2gtk-4.0.so.37"?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2062916
Title:
ev
Thanks for testing it, it's much appreciated!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2060880
Title:
squid crashes after update to 4.10-1ubuntu1.10
To manage notifications about this bug go t
Public bug reported:
i tried to purge all ppa, but that did not solve the problem
ProblemType: Bug
DistroRelease: Ubuntu 23.10
Package: ubuntu-release-upgrader-core 1:23.10.14
ProcVersionSignature: Ubuntu 6.5.0-28.29-generic 6.5.13
Uname: Linux 6.5.0-28-generic x86_64
NonfreeKernelModules: nvidia
I have located the issue and have prepared an updated package that will
reintroduce the fixes for CVE-2023-5824. I have uploaded the updated
package to the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it has finished building, could y
Public bug reported:
1. Ubuntu 24.04 Numbat (development) installation medium.
2. no specific package.
3. Installation of ubuntu should be possible on a partition of a raid array.
4. when doing the installation and selecting other (manual selection) where to
install ubuntu; the raid array partiti
Public bug reported:
1. Ubuntu 24.04 Numbat (development) iso.
2. No specific package: Booted from installation iso usb.
3. Desktop should be displayed.
4. white screen; in the middle "oh no something has gone wrong"
after some time the welcome sound; and a small window appears in the upper left
That's good to see!
Since this is a deliberate side-effect of the security change, I am
marking this bug as "invalid". Thanks
** Changed in: apache2 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubunt
I think this is actually the correct new behaviour for the security
update...could you please try using ap_trust_cgilike_cl as instructed
here:
https://bz.apache.org/bugzilla/show_bug.cgi?id=68872
** Bug watch added: bz.apache.org/bugzilla/ #68872
https://bz.apache.org/bugzilla/show_bug.cgi?id
Thanks for testing, I'll keep digging...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chunked where
this is undesired
To m
I have uploaded a package with a possible fix to the security team PPA
here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once it's finished building, could you please give it a try and see if
it solves the issue for you? If so, I will publish it as a security
re
I believe I've spotted the regression and will have a package to test
soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061816
Title:
apache2 2.4.41-4ubuntu3.17 defaults to transfer-encoding=chun
Thanks for filing this bug, I'll investigate the changes and will report
back.
Have you seen this behaviour on anything other than focal?
** Changed in: apache2 (Ubuntu)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Information type changed from Public to Public
1 - 100 of 17703 matches
Mail list logo