A fix for this issue has been released, as per USN-6039-1
(https://ubuntu.com/security/notices/USN-6039-1).
** Changed in: openssl (Ubuntu)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
htt
** Changed in: ell (Ubuntu)
Status: New => In Progress
** Changed in: ell (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => Camila Camargo de
Matos (ccdm94)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Security team ACK for promoting python-cheroot to main.
** Changed in: python-cheroot (Ubuntu)
Assignee: Ubuntu Security Team (ubuntu-security) => (unassigned)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpa
I reviewed python-cheroot 8.5.2+ds1-1ubuntu2 as checked into jammy.
This shouldn't be considered a full audit but rather a quick gauge of
maintainability.
python-cheroot is a Python library that implements an HTTP server and
includes a WSGI module.
- CVE History: No CVEs in our UCT database.
- Th
creates Unix
sockets with the 0777 permission set. This could be an issue, so I would
like to know more about the uses that will be utilizing the Unix sockets
functionality, as well as if they should be considering permissions
other than 0777.
Thanks!
Regards,
Camila Camargo de Matos.
--
You received
** Changed in: python-cheroot (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1930111
Title:
[MIR] new dependencies of cherrypy3: jaraco.collections,
jarac
** Changed in: byobu (Ubuntu Xenial)
Status: Won't Fix => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1827202
Title:
Apport hook may expose sensitive information
To manage not
Hello Otto!
Thanks for the information.
I have published the packages and a related USN should come out soon!
Thank you once again!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1951709
Title:
CVE
Hello Otto,
Autopkgtests were run for the new package versions, and in general there
were no impeding issues, however, there was a regression that happened
for the mariadb-10.5 package for tests related to Ubuntu 21.10 version
on the ppc64el architecture. The following test is failing:
main.long_u
Hey Otto,
Thanks for the security updates! I have uploaded the new packages to the
following PPA: https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.laun
** Also affects: mariadb-10.3 (Ubuntu)
Importance: Undecided
Status: New
** Changed in: mariadb-10.3 (Ubuntu)
Assignee: (unassigned) => Camila Camargo de Matos (ccdm94)
** Changed in: mariadb-10.3 (Ubuntu)
Status: New => In Progress
** Changed in: mariadb-10.3 (
** Changed in: mariadb-10.5 (Ubuntu)
Assignee: (unassigned) => Camila Camargo de Matos (ccdm94)
** Changed in: mariadb-10.5 (Ubuntu)
Status: New => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
12 matches
Mail list logo