I believe this fix should be backported into Ubuntu 18.04, 20.04 and
22.04 through an SRU.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to apport in Ubuntu.
https://bugs.launchpad.net/bugs/1889443
Title:
"ValueError: ['sepa
** Description changed:
The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
- I believe this deserves a feature freeze exception because it adds support to
UBuntu for several types of
- enterpris
** Description changed:
The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
- I believe this deserves a feature freeze exception because it adds support to
UBuntu for several types of
- enterpris
Public bug reported:
The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
I believe this deserves a feature freeze exception because it adds support to
UBuntu for several types of
enterprise VPNs in wid
Public bug reported:
The ubuntu-desktop package should recommend network-manager-openconnect-
gnome, that is undergoing a main inclusion review (MIR) at bug #1986592.
I believe this deserves a feature freeze exception because it adds
support to Ubuntu for several types of enterprise VPNs in wide
: Luís Cunha dos Reis Infante da Câmara (luis220413)
Status: New
** Information type changed from Private Security to Public Security
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-13962
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-17507
** CVE
This is most likely an hardware issue. Please run the following command
and retry:
$ sudo dpkg --configure -a
It is recommended that you upgrade to (or freshly install) a version of
Ubuntu under standard support, even though you are covered by ESM if
your machine has an Ubuntu Advantage subscript
** Changed in: apt (Ubuntu)
Status: Fix Released => Confirmed
** Summary changed:
- ddebs.ubuntu.com is down
+ ddebs.ubuntu.com is intermittently down
** Description changed:
When running apt-get update (a few days ago and a few minutes ago),
- ddebs.ubuntu.com is down, responding with
Fixed in https://gitlab.com/ubports/development/core/lomiri-download-
manager/-/commit/df3665685da5cfb559a06016d4e0339c29b903e1 (2015), that
first appeared in version 0.9+15.10.20150723.2-0ubuntu1.
** Changed in: ubuntu-download-manager (Ubuntu)
Status: Confirmed => Fix Released
--
You re
Thanks for confirming this bug! Next time you encounter the issue
described in a bug report, please mark yourself as affected by the bug
report, that will automatically change the bug status from New to
Confirmed.
I will report this issue to the #ubuntu IRC channel.
** Changed in: apt (Ubuntu)
Public bug reported:
When running apt-get update (a few days ago and a few minutes ago),
ddebs.ubuntu.com is down, responding with HTTP 503:
W: Failed to fetch http://ddebs.ubuntu.com/dists/focal/InRelease 503 Service
Unavailable [IP: 185.125.190.18 80]
W: Failed to fetch http://ddebs.ubuntu.c
Public bug reported:
nm appears to behave as if the -U flag took an argument:
$ nm -DU /usr/lib/x86_64-linux-gnu/libc.so.6
nm: 'a.out': No such file
$ nm -DU . /usr/lib/x86_64-linux-gnu/libc.so.6
[3006 lines]
ProblemType: Bug
DistroRelease: Ubuntu 22.10
Package: binutils 2.38.90.20220713-2ubuntu
*** This bug is a security vulnerability ***
Public security bug reported:
The version in Bionic is vulnerable to all CVEs listed below.
The versions in Focal and Jammy are vulnerable to CVE-2022-30067 and
CVE-2022-32990.
Please publish patched packages.
** Affects: gimp (Ubuntu)
Importan
** Changed in: gimp (Ubuntu)
Status: Confirmed => Fix Released
** Also affects: gtk+2.0 (Ubuntu)
Importance: Undecided
Status: New
** Bug watch added: bugzilla.gnome.org/ #586664
https://bugzilla.gnome.org/show_bug.cgi?id=586664
** Also affects: gtk via
https://bugzilla.gn
Public bug reported:
When running sudo apt update, I get the following warning after the
"Fetched" message:
Can not add an empty (zero-length) key to the cache
ProblemType: Bug
DistroRelease: Ubuntu 20.04
Package: apt 2.0.9
ProcVersionSignature: Ubuntu 5.15.0-41.44~20.04.1-generic 5.15.39
Uname:
Public bug reported:
When running update-manager in the command line, viewing the changelogs
for some updates and installing all updates, update-manager outputs the
following to standard error.
Gdk-Message: 07:32:40.867: Window 0x559accd09420 is a temporary window
without parent, application will
Impish reached end-of-life yesterday.
** Summary changed:
- Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal, Impish and Jammy
+ Multiple vulnerabilities in Trusty, Xenial, Bionic, Focal and Jammy
** Description changed:
- The versions in Trusty, Xenial, Bionic, Focal, Impish and Jammy
Fixed in versions 2:3.35-2ubuntu2.15 (18.04), 2:3.49.1-1ubuntu1.8
(20.04) and 2:3.68-1ubuntu1.2 (21.10). The version in Ubuntu 22.04 is
not vulnerable.
** Changed in: nss (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
To
Version 2:3.49.1-1ubuntu1.7 was released after this bug was reported and
does not contain a fix for this CVE.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1968922
Title:
lib
** Changed in: faad2 (Ubuntu)
Status: New => In Progress
** Changed in: faad2 (Ubuntu)
Assignee: (unassigned) => Luís Cunha dos Reis Infante da Câmara
(luis220413)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscri
Packages patched for CVE-2020-35522, CVE-2022-0561, CVE-2022-0562,
CVE-2022-0865 and CVE-2022-0891 are available for Bionic, Focal and
Impish at https://launchpad.net/~ubuntu-security-
proposed/+archive/ubuntu/ppa. (Impish is not affected by
CVE-2020-35522.)
Please patch the other CVEs and release
** Changed in: tiff (Ubuntu)
Status: Confirmed => In Progress
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchpad.net/bugs/1971001
Title:
Multiple vulnerabilities in Trusty, Xenial,
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-22844
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to tiff in Ubuntu.
https://bugs.launchp
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32276
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-32277
** Description changed:
The version in Bionic is vulnerable to all CVEs listed below.
+ The version in Focal is vulnerable to CVE-2021-32272, CVE-2
This is a bug in apt.
** Also affects: apt (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: apt (Ubuntu)
** Package changed: faad2 (Ubuntu) => apt (Ubuntu)
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscri
Please release a fix.
--
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to nss in Ubuntu.
https://bugs.launchpad.net/bugs/1968922
Title:
libnss3 is affected by CVE-2022-22747
Status in nss package in Ubuntu:
Confirmed
Bug de
26 matches
Mail list logo