Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
Profiles not stored in /etc/apparmor.d/, like snaps, libvirt, and lxd,
are removed when you run 'aa-remove-unknown'. Maybe skip those types by
default:
$ sudo aa-remove-unknown
[sudo] password for pfsmorigo:
Skipping profile in /etc/apparmor.d/disable: usr.sbin.rsyslogd
Remo
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Dimitar, I've just publish a new release with the fix
(1.0.2g-1ubuntu4.20+esm4) for the issue you had. Can you check if this
version is fine?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1976339
Hello Luis, did you manage to test the bionic package?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1971504
Title:
Multiple vulnerabilities in Bionic, Focal, Impish, Jammy and Kinetic
To manage no
** Changed in: containerd (Ubuntu)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: containerd (Ubuntu Focal)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: containerd (Ubuntu Impish)
Assignee: (unassigned) => Paulo
Hello Luís, thanks for the debdiffs. I've changed the changelog a little
bit in order to follow the security format and fit the patches into the
DEP-3 guidelines (some of them were missing some header elements). I
uploaded the packages into our security-proposed ppa and, if possible,
please test u
Hello Evren, hmm I just published both bionic (9.0.16-3ubuntu0.18.04.2)
and focal (9.0.31-1ubuntu0.2). I finished some tests yesterday. Foi
bionic I had to do some changes and add an extra commit to support one
of fixes.
** Changed in: tomcat9 (Ubuntu)
Status: Confirmed => Fix Released
--
Hello Evren, thanks for the debdiff. I'm using it to build the new
release for Focal. I did some checks today and will continue on Monday.
If all goes well I think we can have a new package in the archive next
week. Meanwhile, I'm working on the bionic version.
--
You received this bug notificati
** Changed in: tomcat9 (Ubuntu)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1915911
Title:
Tomcat9 package is old vers
What snapd version are you using?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1961418
Title:
snap failed to run with '/usr/bin/snap wait system seed.loaded'
To manage notifications about this bu
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks! I didn't add the LP number because it was in the previous
changelog entry. It seems that it needs to be in the latest one in order
to identify it correctly.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.l
I've just published focal and impish updates into the -security pocket.
focal: 5.12.8+dfsg-0ubuntu2.1
impish: 5.15.2+dfsg-12ubuntu1.1
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1950193
Tit
Hello, I'm doing build for the -security pocket as Marc suggested. Will
be published soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1950193
Title:
libqt5svg5 affected by CVE-2021-38593
Both 10.3 (focal) and 10.5 (hirsute) updates were released yesterday
https://ubuntu.com/security/notices/USN-5022-2
** Changed in: mariadb-10.5 (Ubuntu)
Importance: Undecided => Medium
** Changed in: mariadb-10.5 (Ubuntu)
Status: New => Fix Released
--
You received this bug notificati
** Changed in: mariadb-10.5 (Ubuntu)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1939188
Title:
CVE-2021-2389 & CVE-20
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Hello Hugo, Thanks for the help! I've published your backport for
bionic, focal, groovy, and hirsute. The changelog was a little different
to be in the format that we use. About the version number, we use major
numbers (like ubuntu1) when is a devel release otherwise we increment
the minor number (
abiano Smorigo (pfsmorigo)
** Changed in: libimage-exiftool-perl (Ubuntu Hirsute)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: libimage-exiftool-perl (Ubuntu Focal)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: libimage-e
@Andrew, hello. Focal and Groovy with your backports are fine and ready
to go. I still resistant about Bionic since I couldn't import the tests.
I'll try to manually test it a little more tomorrow and if everything
goes well I'll publish it on Monday.
--
You received this bug notification because
Thanks. I managed to backport version 1.2 to bionic (1.0.9). I had to
exclude the tests because the framework is very different between both
versions. I'll test in on Monday.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs
Just a heads up. Your focal backport seems fine, no problems there. I'm
working on the bionic version but, since it's based on 1.0.9, it's not
straightforward.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/
Ok thanks. I've tried to backport all commits with "Part-of: GHSA-4ppf-
fxf6-vxg2" for hirsute but it fails to build. More commits are required
in order to work.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.ne
Hello Andrew, it seems that there is no CVE assigned to it, right?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1911473
Title:
Placeholder for ghsa-4ppf-fxf6-vxg2
To manage notifications about thi
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1870514 ***
https://bugs.launchpad.net/bugs/1870514
For the record, running "apt install --reinstall containerd" is enough
to reproduce it. It seems fine after restarting it. Investigating...
root@sec-bionic-amd64:~# systemctl status docker
● docker.service
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Public bug reported:
I updated to focal this week and weechat fails to load python plugins.
It shows the following message:
Error: unable to load plugin
"/usr/lib/x86_64-linux-gnu/weechat/plugins/python.so":
/usr/lib/x86_64-linux-gnu/weechat/plugins/python.so: undefined symbol:
_Py_NoneStruct
I reviewed nfs-ganesha 3.0.3-0ubuntu1 as checked into focal. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
nfs-ganesha is an user-mode file server for NFS v3, 4.0, 4.1, 4.1 pNFS, and
4.2; and for 9P from the Plan9 operating system. It provides a FUSE-compat
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
I reviewed pmdk 1.7-1ubuntu1 as checked into focal. This shouldn't be
considered a full audit but rather a quick gauge of maintainability.
pmdk comes from Persistent Memory Development Kit and it's a collection of
libraries and tool which allows applications to access persistent memory as
memory-
Hello it0001, I did the triage and updated the link you referred to in
comment #7. This page is updated daily so you're only going to see the
new status, not-affected, tomorrow. As I said, only focal was affected
but it's already fixed. Trusty, xenial, bionic, and disco are not
affected, the code i
Hello it0001,
PMASA-2019-5 points to commit 4ba7d2fac6f384. Both afected files
(move.js and database_tables.twig) are only present in focal and the
last release (4:4.9.2+dfsg1-1) fixed the issue.
Can you clarify why the releases are affected?
--
You received this bug notification because you ar
Hi Lucas, I published the new version with the fix. Thanks. I made two
modifications in the changelog. The first was the version. Security
update uses minor version naming, so 0.1, not 1. In this update I ended
up using 0.2 because I made a mistake and had to upload the source again
so I burned 0.1
I just marked precise and trusty as invalid since they are out of
standard support. Xenial version will be uploaded soon.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853063
Title:
SQL injection a
** Changed in: redmine (Ubuntu Precise)
Status: New => Invalid
** Changed in: redmine (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1853063
Title:
** Changed in: redmine (Ubuntu)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: redmine (Ubuntu Trusty)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: redmine (Ubuntu Xenial)
Assignee: (unassigned) => Paulo Flabian
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
** Changed in: mariadb-10.1 (Ubuntu)
Assignee: Otto Kekäläinen (otto) => Paulo Flabiano Smorigo (pfsmorigo)
** Changed in: mariadb-10.3 (Ubuntu)
Assignee: Otto Kekäläinen (otto) => Paulo Flabiano Smorigo (pfsmorigo)
--
You received this bug notification because you are a mem
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1844487 ***
https://bugs.launchpad.net/bugs/1844487
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a
Thanks for taking the time to report this bug and helping to make Ubuntu
better. We appreciate the difficulties you are facing, but this appears
to be a "regular" (non-security) bug. I have unmarked it as a security
issue since this bug does not show evidence of allowing attackers to
cross privile
*** This bug is a duplicate of bug 1844487 ***
https://bugs.launchpad.net/bugs/1844487
** This bug has been marked a duplicate of bug 1844487
package ssmtp 2.64-8ubuntu1 failed to install/upgrade: le sous-processus
script post-installation installé a retourné une erreur de sortie d'état 1
** Changed in: apache2 (Ubuntu)
Status: New => Incomplete
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1832163
Title:
Me acaban de dar BANNN SIN NINGUNA RAZON POR QUE ESTABA JUGANDO SKYWAR
Hello Andrew, can you check/test if the packages bellow are working properly?
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=flatpak
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https
** Changed in: znc (Ubuntu Disco)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1821760
Title:
CVE-2019-9917 - Invalid encoding crash
To manage notifications abou
*** This bug is a duplicate of bug 1570053 ***
https://bugs.launchpad.net/bugs/1570053
** This bug has been marked a duplicate of bug 1570053
Screen content is fully visible after unlocking screen
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subs
*** This bug is a duplicate of bug 1769383 ***
https://bugs.launchpad.net/bugs/1769383
** This bug has been marked a duplicate of bug 1769383
Ubuntu dock/launcher is shown on the lock screen
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
*** This bug is a duplicate of bug 1769383 ***
https://bugs.launchpad.net/bugs/1769383
** This bug has been marked a duplicate of bug 1769383
Ubuntu dock/launcher is shown on the lock screen
** Information type changed from Private Security to Public Security
--
You received this bug not
*** This bug is a duplicate of bug 1570053 ***
https://bugs.launchpad.net/bugs/1570053
** This bug has been marked a duplicate of bug 1570053
Screen content is fully visible after unlocking screen
** Information type changed from Private Security to Public Security
--
You received this b
New version with the fix (0.6.1-2ubuntu0.3):
https://launchpad.net/~ubuntu-security-proposed/+archive/ubuntu/ppa/+packages?field.name_filter=xrdp
Please, use this new package and let me know if it's working fine.
--
You received this bug notification because you are a member of Ubuntu
Bugs, whic
Yes, I hit the error when I was doing the trusty version. It works if
you install the original version and then this version. It's trick. I'm
working on it.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bug
now it's working properly.
** Changed in: xrdp (Ubuntu)
Assignee: (unassigned) => Paulo Flabiano Smorigo (pfsmorigo)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1811122
Title:
Cannot use
91 matches
Mail list logo