I am making this bug public as this regression is probably hitting more
than one person.
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/b
https://ubuntu.com/security/notices/USN-7337-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Noble)
Status: In Progress => Fix Rel
Thanks! Packages are now building in the security team PPA and will be
released soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2100975
Title:
CVE-2025-1080
To manage notifications about this b
Hi Rachanan,
Since the standard support for Ubuntu 16.04 LTS has ended, fixing this
will be available in the ESM repository only. Are you still interested
in us sponsoring your fix even if it is only available as an ESM update?
Thanks!
--
You received this bug notification because you are a memb
** Also affects: nginx (Ubuntu Jammy)
Importance: Undecided
Status: New
** Also affects: nginx (Ubuntu Focal)
Importance: Undecided
Status: New
** Changed in: nginx (Ubuntu Focal)
Status: New => Confirmed
** Changed in: nginx (Ubuntu Jammy)
Status: New => Confir
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1987228
Title:
Bug display when turning to hibernation
To manage notifications about
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977875
Title:
Ubuntu Desktop boot hangs absent zeroconf packets and after avahi-
daemon pu
** Changed in: nginx (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1977718
Title:
buffer overflow in nginx rtmp module
To manage notifications about this bu
** Changed in: gnome-shell (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976478
Title:
Telegram Desktop steals input on Lock screen (Xorg session)
To manage
** Changed in: pcre2 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942673
Title:
glibc AddressSanitizer:DEADLYSIGNAL
To manage notifications about this bu
Since the upstream bug is public, I am making this bug public too.
Thanks.
** Also affects: launchphplib
Importance: Undecided
Status: New
** No longer affects: launchphplib
** Information type changed from Private Security to Public Security
** Changed in: plib (Ubuntu)
Status
Please file a bug with the upstream jhead developers here:
https://github.com/Matthias-Wandel/jhead/issues
Once you have done that, please add a comment here with the bug number.
Thanks!
** Changed in: jhead (Ubuntu)
Status: New => Incomplete
--
You received this bug notification becaus
This is CVE-2016-2568, and there is no solution to this issue as of
today.
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-2568
** Bug watch added: Debian Bug tracker #816062
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=816062
** Also affects: policykit-1 (Debian) via
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
So, before systemd-tmpfiles was used, Ubuntu used tmpreaper to perform
periodic cleaning of the /tmp dir. tmpreaper had a list of exceptions:
--protect '/tmp/.X*-{lock,unix,unix/*}' \
--protect '/tmp/.ICE-{unix,unix/*}' \
--protect '/tmp/.iroha_{unix,unix/*}' \
--protect '/tmp/.ki2-{unix,unix/*}'
** Changed in: nvidia-graphics-drivers-535 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2097004
Title:
Security bug update to 535.230.02
To manage
** Changed in: linux (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073500
Title:
Ubuntu RT2x00 USB Driver Kernel Use-After-Free Vulnerability
To manage noti
** Changed in: pulseaudio (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2078822
Title:
With Bluetooth headset connect, a malicious program can crash
Pulsea
** Package changed: ubuntu => xscreensaver (Ubuntu)
** Changed in: xscreensaver (Ubuntu)
Status: New => Triaged
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2083047
Title:
Failure t
** Changed in: linux (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083312
Title:
linux-libc-dev package has vulnerabilities
To manage notifications about t
** Changed in: u-boot (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2086515
Title:
Cryptographically unsafe RNG used for FIT images
To manage notifications
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** No longer affects: systemd (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2088433
Title:
Problems with tigervncserver copying credential files to /tmp
To manage notifications about this
** Also affects: policykit-1 via
https://github.com/polkit-org/polkit/issues/545
Importance: Unknown
Status: Unknown
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2095001
Title:
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2097004
Title:
Security bug update to 535.230.02
To manage notifications about thi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Please also release this package into the security pocket as we want to
keep them in sync. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2070285
Title:
package tzdata 2024a-3ubuntu1.1 failed
These updates have been published. Thanks!
https://ubuntu.com/security/notices/USN-7228-1
** Changed in: libreoffice (Ubuntu Focal)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu Jammy)
Status: In Progress => Fix Released
** Changed in: libreoffice (Ubuntu
Thanks for these! I'll upload them for building and will release them
when done.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2095307
Title:
CVE-2024-12425 and CVE-2024-12426
To manage notificatio
I believe this is caused by the snippets plugin. When I disable it, I no
longer get a crash on exit. Unfortunately, it looks like the snippets
plugin was removed in later versions.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https:
Unfortunately, there was a security update published today to the
existing packages, so we definitely need to respin the proposed packages
to 23.11.3 and 21.11.9.
https://ubuntu.com/security/notices/USN-7178-1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which i
** Changed in: php7.4 (Ubuntu Jammy)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Noble)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Oracular)
Status: Confirmed => Invalid
** Changed in: php7.4 (Ubuntu Plucky)
Status: Confirmed => Invalid
Thanks for reporting this issue, we are currently investigating.
** Also affects: php7.4 (Ubuntu Oracular)
Importance: Undecided
Status: New
** Also affects: php7.4 (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: php7.4 (Ubuntu Jammy)
Importance: Undecide
Due to lack of activity from the original bug reporter, we are closing
this bug.
** Changed in: openconnect (Ubuntu Bionic)
Status: New => Invalid
** Changed in: openconnect (Ubuntu Focal)
Status: New => Invalid
** Changed in: openconnect (Ubuntu)
Status: In Progress => Inva
Due to lack of activity from the original bug reporter, we are closing
this bug.
** Changed in: mediawiki (Ubuntu Bionic)
Status: In Progress => Invalid
** Changed in: mediawiki (Ubuntu Focal)
Status: In Progress => Invalid
** Changed in: mediawiki (Ubuntu Jammy)
Status: Fix
This only affected Focal, the later releases include the second commit
already.
** Changed in: mpg123 (Ubuntu Jammy)
Status: New => Fix Released
** Changed in: mpg123 (Ubuntu Noble)
Status: New => Fix Released
** Changed in: mpg123 (Ubuntu Oracular)
Status: New => Fix Releas
*** This bug is a security vulnerability ***
Public security bug reported:
The fix for CVE-2024-10573 is insufficient in certain releases, pending
investigation. This is the tracking bug.
** Affects: mpg123 (Ubuntu)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur
Since the jq and libonig focal packages contain mostly the same major
versions as the packages which are in main in jammy, and the detailed
information in comment #15, ACK from the security team on promoting them
to main in focal.
--
You received this bug notification because you are a member of
I think this is a great idea. We should, at the very least, print a
warning about password authentication if it's enabled, as that is a
default configuration we know should ideally be changed once a system is
installed.
--
You received this bug notification because you are a member of Ubuntu
Bugs
I'm adding the openssh package to this bug, as the default configuration
file has a Debian/Ubuntu-specific include directory configured and I
think we should add an appropriate comment to inform the user that files
included in the directory may override the configuration items in
ssd_config. This w
If you google "how to disable ssh password authentication", there are
pages and pages of instructions that instruct to modify sshd_config. I'm
not sure how to correct user expectations. Maybe adding more explicit
comments to sshd_config could be okay.
How is cloud-init making sure another file in
Perhaps an acceptable solution could be to write the file only if cloud-
init needs to overwrite the value to "no", but if the value is "yes",
the openssh default, it shouldn't create the file. This would allow
continuing to use the .d directory, but would prevent confusion which
results in passwor
While the override directory is documented, it is quite unexpected that
a default installation will make use of it, which is why this bug exists
in the first place.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad
Is there a reason cloud-init needs to create an override in the first
place, rather than changing the setting in the main file?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2088207
Title:
cloud-ini
@james-page thanks for the tests, will publish today.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085851
Title:
Jammy package 2:20.3.1-0ubuntu1.4 is missing the upstream privsep
pieces
To mana
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: roundcube (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2085666
Title:
Roundcube CVE-2024-37383 and CVE-2024-37384
To manage notifications ab
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2086546
Title:
I get the bug as an esm bug problem when I write the command sudo apt
updat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: cinder (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Information type changed from Public to Public Security
** Changed in: cinder (Ubuntu Jammy)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: cinder (Ubuntu
webkit2gtk in supported releases is now more recent than the problematic
version listed in this bug, so I am closing it. Feel free to reopen it
if the issue persists. Thanks!
** Changed in: webkit2gtk (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because
** Also affects: libvirt (Ubuntu Noble)
Importance: Undecided
Status: New
** Also affects: Ubuntu Noble
Importance: Undecided
Status: New
** Also affects: libvirt (Ubuntu Oracular)
Importance: Undecided
Assignee: Hector CAO (hectorcao)
Status: In Progress
** Al
tatus: Fix Released => In Progress
** Changed in: unzip (Ubuntu Noble)
Status: New => In Progress
** Changed in: unzip (Ubuntu Noble)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: unzip (Ubuntu Oracular)
Assignee: (unassigned) => Marc Desl
grub-install worked, and the laptop reboot successfully. Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi/install_devices becoming stale due to by-id/nvme-eui.*
symlin
So now that we've identified the root cause, I have checked the box
beside the disk that is displayed, clicked the Next button and am
presented with a dialog with an unchecked box that says "Continue
without installing grub". If I don't check that, I get a warning and I
go back to the disk selectio
We have a winner!
01:00.0 Non-Volatile memory controller [0108]: SK hynix Gold P31 SSD
[1c5c:174a]
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi/install_devices becoming sta
/sys/class/block/nvme0n1/wwid is:
nvme.1c5c-465342334e3636383131343130334f3259-534b48796e69785f48464d35313247443348583031354e-0001
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
g
I didn't migrate the installation. It looks like I installed it with
jammy. Here are the /var/log/installer contents if that helps any.
** Attachment added: "Contents of /var/log/installer"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823468/+files/installer.tgz
-
** Attachment added: "Contents of /dev/disk/by-id"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823467/+files/by-id.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/20
Here's the output of debconf-show grub-pc.
debconf-show grub-efi-amd64 didn't return anything.
** Attachment added: "grub-pc debconf"
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/2083176/+attachment/5823439/+files/output.txt
--
You received this bug notification because you are a mem
The laptop is still waiting at this dialog in case there's some relevant
information that would be useful for this bug
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2083176
Title:
grub-efi install d
> Is it possible that something was changed about this installation /
computer since it was originally installed that could have caused the
install device to become invalid?
There nothing special about this device. It's just an HP laptop with a
single disk that was installed by me in a default way
Public bug reported:
A family member just sent me this dialog that popped up when they
installed their updates today. I'm not sure how a regular user is
supposed to be able to handle what is presented here. Do they check the
box? What happens if they don't?
Heck, even I don't know what the proper
** Changed in: cups (Ubuntu Oracular)
Status: New => Fix Committed
** Changed in: cups (Ubuntu Focal)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Jammy)
Assignee: Kevin bush (akjk32002) => (unassigned)
** Changed in: cups (Ubuntu Noble)
Assi
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2082335
Title:
Sept 2024 security issue tracking bug
To manage notifications about
** Information type changed from Private Security to Public Security
** Changed in: gnupg2 (Ubuntu)
Status: New => Confirmed
** Changed in: gnupg2 (Ubuntu)
Importance: Undecided => Wishlist
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscri
)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Jammy)
Importance: Undecided
Assignee: Marc Deslauriers (mdeslaur)
Status: In Progress
** Affects: ca-certificates (Ubuntu Noble)
Importance: Undecided
Thanks for taking the time to report this bug and helping to make Ubuntu
better. Since the package referred to in this bug is in universe or
multiverse, it is community maintained. If you are able, I suggest
coordinating with upstream and posting a debdiff for this issue. When a
debdiff is availabl
** Information type changed from Public Security to Public
** Tags added: noble
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073033
Title:
request to /storage/v2/edit_partition crashed with Excep
** Changed in: apache2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2073515
Title:
functionality loss in mod_proxy rewritten path
To manage notifications a
** Information type changed from Public Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/2076471
Title:
Screen locking issue
To manage notifications about this bug go to:
ht
** Also affects: pkgbinarymangler (Ubuntu)
Importance: Undecided
Status: New
** Changed in: pkgbinarymangler (Ubuntu)
Status: New => Confirmed
** Changed in: sunpy (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
** Changed in: opensbi (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076397
Title:
Ghostwrite mitigation
To manage notifications about this bug go to:
http
** Changed in: linux-aws-5.15 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2080555
Title:
ubunutu 20 has many vulnerability for the package linux-aws-5.15
** Changed in: libssh2 (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2079834
Title:
libssh2-1 lacks support for rsa-sha2-{512,256}
To manage notifications a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Information type changed from Private Security to Public
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2081605
Title:
3.32.2 Deprecated
To manage notifications about this bug go to:
https://bugs
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Bug watch added: github.com/python/cpython/issues #124170
https://github.com/python/cpython/issues/124170
** Also affects: python via
https://github.com/python/cpython/issues/124170
Importance: Unknown
Status: Unknown
** Bug watch added: Debian Bug tracker #1079780
https://b
Update has been published now, thanks for testing!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2075145
Title:
exfatprogs CVE-2023-45897 backport to jammy
To manage notifications about this bug go
Thanks for the debdiff for this issue. I've validated that that is the
only commit that affects jammy.
I have uploaded this package for building in the security team PPA here:
https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa/+packages
Once the package has finished building, c
I'll let someone else decide if this bug is still worth fixing even
though we aren't using the helper anymore.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell-portal-helper
Ah yes, this should be fixed now because of the security update. I meant
to update this bug, but forgot. Thanks for noticing.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2051574
Title:
gnome-shell
Thanks!
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2077001
Title:
Clipboard contents available at locked screen
To manage no
Thanks Rico!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libreoffice/+bug/2076
Hi Rico, the debdiff in comment #1 contains a patch that doesn't
actually apply to jammy. Could you please fix it? Thanks!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
Thanks for preparing these Rico, I'll prepare the security updates!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2076130
Title:
CVE-2024-6472
To manage notifications about this bug go to:
https://
** Changed in: nautilus-share (Ubuntu Focal)
Assignee: (unassigned) => Marc Deslauriers (mdeslaur)
** Changed in: nautilus-share (Ubuntu Focal)
Status: Triaged => In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
1 - 100 of 11772 matches
Mail list logo