The unfortunate thing with AppImage is that there's no easy default path
that can be confined as can be done for other systems. So you'll need to
construct an AppArmor profile for your applications following the
instructions at https://discourse.ubuntu.com/t/noble-numbat-release-
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063830
Title:
package nginx-core (not installed) failed to install/upgrade:
installed
Hey James, thanks for maintaining pptpd for so many years. I know I'm
cranky when old software I use is removed just because it's no longer in
fashion. But we do try to move people to safer protocols and safer
programs over time.
--
You received this bug notification because you are a member of
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063536
Title:
flickering screen
To manage notifications about this bug go to:
Public bug reported:
Hello, ubuntu-bug can't report bugs in packages provided by Ubuntu Pro.
For example, I have lynx installed, which has an update issued through
esm-apps:
$ dpkg -l lynx | grep ^ii
ii lynx 2.9.0dev.5-1ubuntu0.1~esm1 amd64classic
non-graphical (text-mode)
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061249
Title:
remmina crashed with SIGABRT in freerdp_settings_get_bool()
To manage
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061289
Title:
drkonqi crashed with SIGABRT in QScreen::QScreen()
To manage notifications
I gave the nbd-client.c file a very quick read and it looked moderately
well-written to me. It feels like it's got nearly three decades of
history to it -- solid, been around a while, and maybe you'd do things
different if you were doing it again, but it exists today and solves
problems, today.
** Package changed: openssh (Ubuntu) => openssl (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063271
Title:
Illegal opcode in libssl
To manage notifications about this bug go to:
AppArmor's signal handling is a bit more involved than eg capabilities
or file accesses: both the sender profile and receiver profile need to
have signal rules to allow sending the signal or receiving the signal,
as appropriate.
23.10 and 24.04 LTS have introduced restrictions on unprivileged
** Changed in: linux-hwe-6.5 (Ubuntu)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2063009
Title:
package linux-headers-6.5.0-28-generic 6.5.0-28.29~22.04.1 failed to
*** This bug is a duplicate of bug 2061851 ***
https://bugs.launchpad.net/bugs/2061851
** This bug has been marked a duplicate of bug 2061851
linux-gcp 6.8.0-1005.5 (+ others) Noble kernel regression with new apparmor
profiles/features
--
You received this bug notification because you
Does prelink even work?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2061029
Title:
prelink FTBFS on Noble
To manage notifications about this bug go to:
I've been asked to try to help these updates along; I'm not on the SRU
team so I can't give concrete directions, only suggestions.
My assumption is that these package updates should be published first to
-updates for autopkgtest testing, and once they have passed testing and
phased to users, then
Hello, input/output errors like this are usually an indicator of failing
hardware. Make sure your backups are in good working order, and make
sure you don't overwrite backups with bad data.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hello Jussi, thanks for the report. I believe this is an intentional
design choice -- if someone cannot stop music gently they may do so
violently.
Thanks
** Changed in: gnome-shell (Ubuntu)
Status: New => Won't Fix
--
You received this bug notification because you are a member of
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
The 'm' permission shouldn't be a default; restricting what the CPU will
execute is a very useful security mitigation.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2058690
Title:
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I'm adding the snapd package as it feels plausible that snapd could make
this task easier, too.
** Also affects: snapd (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Erich, I think the only 'Ubuntu system builds' that would have Ubuntu
Pro enabled in any way are the images at cloud providers that
automatically attach to Ubuntu Pro with on-demand subscription pricing:
-
It's on the security team's todo list to try to bring issues discovered
during the MIR to the attention of the Fraunhofer team. Hopefully
they'll be more receptive than the Android team.
It sounds like there are open questions if this is actually useful for
us; is the version without the
** Changed in: fdk-aac-free (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => Jeremy Bícha (jbicha)
** Changed in: fdk-aac-free (Ubuntu)
Status: Confirmed => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Hello, the MIR process says any MIRs assigned to the security team after
the Beta Freeze deadline need to be discussed with the Director of
Security Engineering:
For a MIR to be considered for a release, it must be assigned to the
Security team (by the MIR team) before Beta Freeze. This
** Changed in: libmysofa (Ubuntu)
Status: New => Won't Fix
** Changed in: libmysofa (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I had a similar problem. Flip the mouse over and look for a hair in the
sensor. If that isn't it, try replacing the mouse, it might be a bad
cable or similar. (That worked for me.)
** Changed in: linux (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you
Hello Arunaav, I'm curious if you could double-check the testing
environment to make sure the user accounts are as you expected?
chmod 0600 /home/core/.ssh/authorized_keys
ssh -i .ssh/id_rsa onprem_shell@10.14.169.25
ssh -v user@10.14.169.25
debug1: identity file /root/.ssh/id_rsa type -1
Public bug reported:
Hello, I wanted a mirror of the irc logs hosted on
https://irclogs.ubuntu.com/ and started the project with:
wget --mirror https://irclogs.ubuntu.com/
This worked okay but was very slow, as there's probably hundreds of
thousands of links to traverse.
I switched to wget2 to
I added llvm and gcc toolchains to the affected packages list here based
on some internet reports, not my own testing:
https://stackoverflow.com/questions/77894856/possible-bug-in-gcc-sanitizers
** Also affects: llvm-toolchain-15 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-16 (Ubuntu)
Importance: Undecided
Status: New
** Also affects: llvm-toolchain-17 (Ubuntu)
Importance: Undecided
Status: New
** Also affects:
** Tags added: sec-3971
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2055434
Title:
[MIR] pemmican
To manage notifications about this bug go to:
Public bug reported:
Hello, a pal recently mentioned some debugging printk statements in our
kernels, eg:
evict_inodes inode d69da69b, i_count = 1, was skipped!
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2037214 has some
additional details.
** Also affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2052961
Title:
Error: OCI runtime error: crun: chmod : Operation not
Hello, thanks for the bug report. I suggest taking your dmesg output
(from CurrentDmesg.txt) to the virtualbox developers, it looks very
unhappy.
Thanks
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs,
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Loïc, it's possible the 'fix' (really a work-around) is to add
`flags=(attach_disconnected)` to the profile in question. (I'm guessing
that would be enough to prevent AppArmor from replacing the file.)
In your logs it looks like it's already trying to use /tmp/output. This
might be unsafe,
If I'm reading the terminal log correctly, this is a local configuration
problem that you need to address on your own system.
Thanks
** Information type changed from Private Security to Public
** Changed in: phpmyadmin (Ubuntu)
Status: New => Incomplete
--
You received this bug
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Hello, thanks for the report; note that the fstab(5) and mount(8) man
pages both say "user", singular, not "users", plural. That's probably
why your mount command didn't work when run as a user.
I don't know about the gio or udisksctl tool errors, I'm unfamiliar with
their operation. Maybe they
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I suggest talking with the virtualbox devs:
[4.040754] UBSAN: array-index-out-of-bounds in
/tmp/vbox.0/common/log/log.c:1791:41
It may or may not be related to your audio issues, but it can't be good.
Thanks
** Information type changed from Private Security to Public
--
You received this
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
I couldn't see anything to suggest vagrant was actually involved.
** Package changed: vagrant (Ubuntu) => ubuntu
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054613
Title:
[HP EliteBook 840 G3
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2054343
Title:
arm64 build of gcc-10 10.5.0-3ubuntu1 still broken (CVE-2023-4039
I don't have a noble vm up and running yet, has this issue been
addressed yet?
https://bugs.launchpad.net/ubuntu/+source/bpftrace/+bug/1969625
https://github.com/bpftrace/bpftrace/issues/954
It's pretty annoying to need to configure and install a ddeb package
just to use these binaries. At least
> Specific binary packages built, but NOT to be promoted to main: python3-bpfcc,
> bpfcc-tools, [...]
I would have thought that getting these tools would have been the entire
point of this MIR. There's an immense amount of value built in them, and
without the tools we've got the framework but no
How about a debian/rules 'vendor' target that would run the crate vendor
and then rm -rf the windows crates?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2048781
Title:
[MIR] authd
To manage
Thanks Mario and Masum for working this through.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2047374
Title:
TPM PCR0 recontruction fails on Pluton fTPM
To manage notifications about this
Thanks for the report, Masum.
I'm not sure if this is actually a bug against fwupd or just that fwupd
is the tool that reported the change.
And it's entirely possible that this is the correct outcome. If the TPM
device changes on a system, it's suddenly a very different system.
Hopefully
** Information type changed from Private Security to Public Security
** Also affects: libclamunrar (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
Hello Tobias, thanks for writing.
We've prioritized CVE-2023-2953 as "low", which means we'll include this
if there is a future update to fix something more important, but won't
make an update specifically for this issue.
Thanks
** CVE added:
On Mon, Apr 03, 2023 at 06:57:36AM -, Ralf Dünkelmann wrote:
> the bug (https://bugs.launchpad.net/bugs/2013453), that nem000 created
> was marked as a duplicate of this one. This is the case for most of the
> related bugs listed here. So it seems that this here is the issue to go
> ahead
nem000 I'm sure I've seen this bug fixed a dozen times in the last
fifteen years or something. It's just a popular bug to re-implement.
Please file a bug with 'ubuntu-bug gnome-shell' if you're using Gnome;
replace 'gnome-shell' with whatever screenlocker you're using if you're
on a different
Hello Charles, the development release isn't intended for production
use; a lot of the things common to security updates in supported
releases just won't be present for the development release. It'll
eventually get a new kernel package based on a new upstream series and
we'll address whatever
** Information type changed from Private Security to Public Security
** Package changed: ubuntu => kscreenlocker (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2000304
Title:
** Information type changed from Private Security to Public Security
** Changed in: crasm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/220
** Information type changed from Private Security to Public Security
** Changed in: crasm (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/221
Hello Pedro, thanks for the report; this was an explicit decision:
https://wiki.ubuntu.com/SecurityTeam/FAQ#UFW
Making firewall rules that are tight enough to stop threats yet open
enough for the computer to still be useful in a wide variety of
environments is very challenging. We've decided that
On Mon, Sep 12, 2022 at 07:39:37AM -, Alkis Georgopoulos wrote:
> This change takes away the ability of the users to share some of their
> data WITHOUT involving the administrator.
Hello Alkis, do note that it is typical for users to own their own home
directory; if a user wishes to share,
Cool, thanks Josh
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1988010
Title:
systemd ignoring DHCP DNS servers and DNS servers set in Network
Manager GUI
To manage notifications about
Hello Josh, which GUI are you using to change dns or dhcp settings?
Thanks
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
*** This bug is a duplicate of bug 1986778 ***
https://bugs.launchpad.net/bugs/1986778
** Information type changed from Private Security to Public Security
** This bug has been marked a duplicate of bug 1986778
/var/apr-archives/amd64-microcode_3.2022.0411 trying to overwrite
** Information type changed from Private Security to Public Security
** Also affects: gnome-shell (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977506
Title:
installation crash
To manage notifications about this bug go to:
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/127626
Title:
.
To manage notifications about this bug go to:
** No longer affects: subversion (Ubuntu Impish)
** Changed in: subversion (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1970228
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976478
Title:
Telegram Desktop steals input on Lock screen
To manage
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976484
Title:
never sound ubuntu 20.04 22.04 alsamixer 1.2.6 card sof-hda-dsp
To manage
Hello Hans, the general outline of the update preparation is sketched
out on this wiki page
https://wiki.ubuntu.com/SecurityTeam/UpdatePreparation -- it's not
exhaustive, but it's a good start.
Thanks
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is
On Mon, May 30, 2022 at 09:38:52AM -, Tobias Heider wrote:
> I don't think it does, but you have a point. It might be a little safer
> not to touch the function signature. Here's an updated fix.
This isn't quite as easy to read but I do like that the signature is
unchanged. I sure hope
Hello Luís, 4.5MB feels pretty unlikely for a security fix; the diffstat
on that debdiff is all over the place:
$ diffstat spip_focal.debdiff
/tmp/9oDFeUYni8/spip-3.2.15/plugins-dist/medias/lib/mejs/mediaelement-flash-audio-ogg.swf
|binary
Hello Hans, the Ubuntu security team doesn't track security issues in
Launchpad; you can check the status in:
https://ubuntu.com/security/cve-2022-25762
tomcat9 is in universe, so it's community supported; there's currently a
handful of issues still open in the 18.04 LTS version:
** Information type changed from Private Security to Public Security
** Changed in: tomcat9 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976335
Title:
The usual approach in Ubuntu is to fix specific bugs in packages rather
than perform wholesale version updates:
https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions
You can see that a 4.x version is currently in Debian experimental:
https://packages.qa.debian.org/libp/libpod.html
When the
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976276
Title:
Hello sir/mam I am getting some problem regarding my brightness
control i
** Changed in: linux-oem-5.14 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976181
Title:
CVE-2021-28711 and CVE-2021-28712
To manage notifications about
Hello Tobias, just a quick question on the patch:
+-int set_fips_mode(const uint fips_mode, char
err_string[OPENSSL_ERROR_LENGTH]) {
++int set_fips_mode(uint fips_mode, char err_string[OPENSSL_ERROR_LENGTH]) {
does this change the ABI in any way that anything would care about or
notice?
Thanks
** Tags added: sec-1042
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975493
Title:
[MIR] manila
To manage notifications about this bug go to:
** Tags added: sec-1041
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971738
Title:
[MIR] ell
To manage notifications about this bug go to:
** Tags added: sec-1040
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971739
Title:
[MIR] iwd
To manage notifications about this bug go to:
** Tags added: sec-1034
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973033
Title:
[MIR] wpebackend-fdo
To manage notifications about this bug go to:
** Tags added: sec-1003
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973031
Title:
[MIR] libwpe
To manage notifications about this bug go to:
Hmm this thing seems to have its own TLS stack
https://git.kernel.org/pub/scm/libs/ell/ell.git/tree/ell/tls.c
as well as rc4 and rc2 implementations
https://git.kernel.org/pub/scm/libs/ell/ell.git/tree/ell/cipher.c
Does Intel have any guidance on this thing being certified FIPS / CC /
STIG /
Please use CVE-2022-1736 for the gnome-remote-desktop user service being
enabled on Ubuntu.
The Debian packaging, and derivatives of both Ubuntu and Debian, for
gnome-remote-desktop are probably very similar. The Debian policy
strongly encourages services to be running by default after
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973344
Title:
Converting PKCS#8 into PKCS#1 fails with openssl 3.0
To manage
** Tags added: sec-979
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1946359
Title:
[MIR] vulkan-tools
To manage notifications about this bug go to:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1973054
Title:
containerd regression for CVE-2022-23648 in latest version
Good job Loaf :3
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972889
Title:
Screen reader reads the data while computer is
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross
Alvaro, thanks for reporting back! I'm glad it worked.
I don't know the full details of which QoS settings changed in which
releases, but this email suggests that there was active interest in
changing which exact values were used:
http://lists.mindrot.org/pipermail/openssh-unix-
Public bug reported:
Hello, I'm very used to searching for software with:
apt-cache search foo bar baz
I was very surprised that snap does not support this:
$ snap search jira launchpad
error: too many arguments for command
$ snap search "jira launchpad"
NameVersion PublisherNotes
Alvaro, I wonder if your network is dropping packets with unexpected IP
QoS flags? Look for 'IPQoS' in ssh_config(5) to see the defaults and
available choices. This would be influenced by ssh settings but still
operate at TCP level.
Thanks
--
You received this bug notification because you are a
Are you sure pgbouncer is the package that is dragging in the postgresql
server in your environment? On Focal, the postgresql server is in
package postgresql-12 and apt-rdepends doesn't show this dependency:
$ apt-rdepends --reverse postgresql-12 | grep pgbouncer
Reading package lists... Done
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1972709
Title:
Pgbouncer installs full postgresql server just to get a service
1 - 100 of 6640 matches
Mail list logo